SHA256
1
0
forked from pool/ocserv
Commit Graph

29 Commits

Author SHA256 Message Date
Michael Du
3f069b6f40 Accepting request 1113393 from home:mnhauke:network
- Update to version 1.2.2
  * Fix session and accounting data tracking of ocserv. This
  reverts fix for #444 (#541)
  * No longer account ICMP and IGMP data for idle session detection
- Update URL

OBS-URL: https://build.opensuse.org/request/show/1113393
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=49
2023-09-28 16:05:09 +00:00
Michael Du
2a734b5edd Accepting request 1107938 from home:mnhauke:network
- Update to version 1.2.1
  * Accept the Clavister OneConnect VPN Android client.
  * No longer require to set device name per vhost.
  * Account the correct number of points when proxyproto is in use
  * nuttcp tests were replaced with iperf3 that is available
    in more environments
  * occtl: fix duplicate key in `occtl --json show users` output
- Update to version 1.2.0
  * Add support for Cisco Enterprise phones to authenticate via
    the /svc endpoint and the 'cisco-svc-client-compat' config
    option.
  * Enhanced radius group support to enable radius servers send
    multiple group class attributes
    See doc/README-radius.md for more information.
  * Enhanced the seccomp filters to open files related to FIPS
    compliance on SuSe.
  * Added "Camouflage" functionality that makes ocserv look like a
    web server to unauthorized parties.
  * Avoid login failure when the end point of server URI
    contains a query string.
  * Make sure we print proper JSON with `occtl --debug --json`
  * Eliminated the need for using the gnulib portability library.
- Update to version 1.1.7
  * Emit a LOG_ERR error message with plain authentication fails
  * The bundled inih was updated to r56.
  * The bundled protobuf-c was updated to 1.4.1.
  * Enhanced the seccomp filters for ARMv7 compatibility and musl
    libc
  * HTTP headers always capitalised as in RFC 9110

OBS-URL: https://build.opensuse.org/request/show/1107938
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=47
2023-09-02 11:14:37 +00:00
14fb2eaa63 Accepting request 1059390 from home:mgerstner:branches:network:vpn
- add ocserv-forwarding.sh: replace the sysctl drop-in file which was wrongly
  installed into /etc by a more tailored mechanism. Enabling IP routing
  globally and permanently, just because the package is installed is quite
  invasive. This new script will be invoked before and after the ocserv
  service to switch on and off forwarding, if necessary (bsc#1174722).

OBS-URL: https://build.opensuse.org/request/show/1059390
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=45
2023-03-07 12:02:19 +00:00
Michael Du
82e9a0ee9b Accepting request 995041 from home:stawidy
- Update to version 1.1.6
  * Fixed compatibility with clients on Windows ARM64.
  * Added futex() to the accepted list of seccomp. 
    It is required by Fedora 36’s libc.
  * Work around change of returned error code in GnuTLS 3.7.3 
    for gnutls_privkey_import_x509_raw().
- Changes in version 1.1.5
  * Fixed manpage output.
- Changes in version 1.1.4
  * Added newfstatat() and epoll_pwait() to the accepted list of 
    seccomp calls. This improves compatibility with certain libcs 
    and aarch64.
  * Do not allow assigning the same IPv6 as tun device address and 
    to the client. This allows using /127 as prefix (#430).

OBS-URL: https://build.opensuse.org/request/show/995041
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=43
2022-08-14 14:54:59 +00:00
Dominique Leuenberger
76ba281b0c Accepting request 983859 from home:dimstar:Factory
- explicitly buildignore libevent-devel, which is pulled in by
  ubound. We use libev here and can get away with this.

OBS-URL: https://build.opensuse.org/request/show/983859
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=41
2022-07-06 08:56:39 +00:00
Michael Du
6fda88b1c3 Accepting request 897666 from home:mnhauke:network
- Update to version 1.1.3
  * No longer close stdin and stdout on worker processes as they
    are already closed in main process.
  * Advertise X-CSTP-Session-Timeout.
  * No longer recommend building with system's libpcl but rather
    the bundled as it is not a very common shared library.
  * Corrected busyloop on failed DTLS handshakes.
  * Emit OWASP best practice headers for HTTP.

OBS-URL: https://build.opensuse.org/request/show/897666
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=39
2021-06-22 17:53:23 +00:00
Michael Du
08902fbc93 Accepting request 853618 from home:mnhauke:network
- Update to version 1.1.2
  * Allow setup of new DTLS session concurrent with old session.
  * Fixed an infinite loop on sec-mod crash when server-drain-ms
    is set.
  * Don't apply BanIP checks to clients on the same subnet.
  * Don't attempt TLS if the client closes the connection with
    zero data sent.
  * Increased the maximum configuration line; this allows banner
    messages longer than 200 characters.
  * Removed the listen-clear-file config option. This option was
    incompatible with several clients, and thus is unusable for a
    generic server.

- Update to version 1.1.1:
  * Improved rate-limit-ms and made it dependent on secmod backlog.
    This makes the server more resilient (and prevents connection
    failures) on multiple concurrent connections
  - Added namespace support for listen address by introducing the
    listen-netns option.
  - Disable TLS1.3 when cisco client compatibility is enabled. New
    anyconnect clients seem to supporting TLS1.3 but are unable to
     handle a client with an RSA key.
  - Enable a race free user disconnection via occtl.
  - Added the config option of a pre-login-banner.
  - Ocserv siwtched to using multiple ocserv-sm processes to
    improve scale, with the number of ocserv-sm process dependent
    on maximum clients and number of CPUs. Configuration option
    sec-mod-scale can be used to override the heuristics.
  - Fixed issue with group selection on radius servers sending
    multiple group class attribute.

OBS-URL: https://build.opensuse.org/request/show/853618
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=37
2021-01-02 21:13:41 +00:00
Dominique Leuenberger
62258b8971 Accepting request 827856 from home:gmbr3:libexecdir
- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)

OBS-URL: https://build.opensuse.org/request/show/827856
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=35
2020-08-27 11:41:14 +00:00
Michael Du
0da65a902f Accepting request 818635 from home:stawidy
Fix source verification.

OBS-URL: https://build.opensuse.org/request/show/818635
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=32
2020-07-03 18:10:14 +00:00
Michael Du
c9af49cb23 Accepting request 818634 from home:stawidy
- Update to version 1.1.0:
  * Switch from fork to fork/exec model to achieve better scaling 
    and ASLR protection. This introduces an ocserv-worker application 
    which should be installed at the same path as ocserv (#285).
  * When Linux OOM takes control kill ocserv workers before 
    ocserv-main or ocserv-secmod (#283).
  * Disable TCP queuing on the TLS port.
  * Fix leak of GnuTLS session when DTLS connection is 
    re-established (#293).
- Verify source with keyring before build.

OBS-URL: https://build.opensuse.org/request/show/818634
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=31
2020-07-03 18:01:09 +00:00
Michael Du
ecec316348 Accepting request 796111 from home:mnhauke:network
- Add signature and keyring for source verification
- Build with support for maxminddb
- Build with support for OATH
- Update to version 1.0.1
  * Prevent clients that use broken versions of gnutls from
    connecting using DTLS.
  * occtl: added machine-readable fields in json output.
  * occtl: IPs in ban list value is now reflecting the actual
    banned IPs rather than the database size.
- Update to version 1.0.0
  * Avoid crash on invalid configuration values.
  * Updated manpage generation to work with newer versions of ronn.
  * Ensure scripts have all the information on all disconnection
    types.
  * Several updates to further restrict the control that worker
    processes have on the main process.
  * Add support for RFC6750 bearer tokens. This adds the "auth=oidc"
    config option. See doc/README-oidc.md for more information.
  * Add USER_AGENT, DEVICE_TYPE and DEVICE_PLATFORM environment
    variables when connect/disconnect scripts execute.
  * Corrected issue with DTLS-PSK negotiation which prevented it
    from being enabled.
  * Improved IPv6 handling of AnyConnect client for Apple ios.
  * Fixed issue with Radius accounting.
- Update to version 0.12.6
  * Improved IPv6 support for anyconnect clients.
  * The 'split-dns' configuration directive can be used per-user.
  * The max-same-clients=1 configuration option no longer refuses
    the reconnection of an already connected user.
  * Added openat() to the accepted list of seccomp calls. This

OBS-URL: https://build.opensuse.org/request/show/796111
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=30
2020-07-03 11:12:30 +00:00
Dominique Leuenberger
da1b247839 Accepting request 758221 from home:dimstar:Factory
- BuildRequire pkgconfig(libsystemd) instead of systemd-devel:
  Allow OBS to shortcut through the -mini flavors.

OBS-URL: https://build.opensuse.org/request/show/758221
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=28
2020-01-21 13:52:29 +00:00
Marguerite Su
08cc8669c9 Accepting request 718270 from home:mgerstner:branches:network:vpn
- removal of SuSEfirewall2 service, since SuSEfirewall2 has been replaced by
  firewalld, see [1].
  [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html

OBS-URL: https://build.opensuse.org/request/show/718270
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=26
2019-08-14 08:37:25 +00:00
Marguerite Su
9cd679700d Accepting request 697022 from home:stawidy
- Update to version 0.12.3:
  * Fixed crash when no DTLS ciphersuite is negotiated.
  * Fixed crash happening arbitrarily depending on handled string 
    sizes (#197).
  * Fixed compatibility issue with GnuTLS 3.3.x (#201).
  * occtl: print the TLS session information, even if the DTLS 
    channel is not established.

OBS-URL: https://build.opensuse.org/request/show/697022
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=24
2019-04-26 00:37:25 +00:00
Marguerite Su
80b3ab7667 Accepting request 668674 from home:stawidy:branches:network:vpn
- Update to version 0.12.2:
  * Added support for AES256-SHA legacy cipher. This allows the 
    anyconnect clients to use AES256.
  * Added support for the DTLS1.2 protocol hack used by new 
    Anyconnect clients.

OBS-URL: https://build.opensuse.org/request/show/668674
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=22
2019-01-25 16:12:44 +00:00
Marguerite Su
56992945f2 Accepting request 610047 from home:stawidy:branches:network:vpn
- Update to version 0.12.1:
  * Fixed crash on initialization when server was running on background
  * Work around issues with GnuTLS 3.4.x on ubuntu 16.04, at the cost of a memory leak on key reload

OBS-URL: https://build.opensuse.org/request/show/610047
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=20
2018-05-29 02:28:44 +00:00
Marguerite Su
74a3d776b3 Accepting request 606481 from home:stawidy:branches:network:vpn
- Update to version 0.12.0
  * Allow DTLS stream to come from different IP from TLS stream. There are situations where internet providers send the UDP stream from different IP.
  * Increased possibilities of allowed combinations of authentication methods.
  * Corrected regression since 0.11.8 with OTP authentication.
  * Added support for hostname-based virtual hosts, utilizing TLS SNI. With that change it is possible to configure multiple servers running over the same port.
  * Rename the tun device on BSD systems which support SIOCSIFNAME ioctl.
  * Correctly handle proxy-protocol’s health commands. That eliminates few connection drops when proxy protocol is in use.
  * Corrected crash on certain cases when proxy protocol is in use.
- Update ocserv.config.patch due to upstream changes

OBS-URL: https://build.opensuse.org/request/show/606481
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=18
2018-05-13 01:22:59 +00:00
Marguerite Su
6faec63675 OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=16 2018-02-27 13:30:18 +00:00
Marguerite Su
fc2bf22693 Accepting request 580402 from home:MargueriteSu:branches:network:vpn
- add firewalld service

OBS-URL: https://build.opensuse.org/request/show/580402
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=15
2018-02-27 03:21:12 +00:00
Marguerite Su
99d43d9130 Accepting request 580000 from home:MargueriteSu:branches:network:vpn
- update version 0.11.10
  * see NEWS
- drop boo1021353-ocserv-doc-racing-in-parallel-build.patch
  * upstreamed
- add ocserv-LZ4_compress_default.patch
  * leap doesn't have LZ4_compress_default

OBS-URL: https://build.opensuse.org/request/show/580000
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=13
2018-02-26 02:10:00 +00:00
Dominique Leuenberger
6ca2389310 Accepting request 495452 from home:dimstar:Factory
Fix build in openSUSE:Factory by doing the right thing

OBS-URL: https://build.opensuse.org/request/show/495452
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=11
2017-05-29 12:02:01 +00:00
Marguerite Su
e7f943d8ec Accepting request 452013 from home:MargueriteSu:branches:network:vpn
OBS-URL: https://build.opensuse.org/request/show/452013
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=9
2017-01-23 16:50:28 +00:00
Marguerite Su
f9e09ce079 Accepting request 447315 from home:MargueriteSu:branches:network:vpn
OBS-URL: https://build.opensuse.org/request/show/447315
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=7
2016-12-21 15:24:26 +00:00
Dominique Leuenberger
8a24fc7bba Accepting request 361427 from network:vpn
OBS-URL: https://build.opensuse.org/request/show/361427
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/ocserv?expand=0&rev=1
2016-03-07 12:23:06 +00:00
Marguerite Su
9b957043e0 Accepting request 361424 from home:MargueriteSu:branches:network:vpn
OBS-URL: https://build.opensuse.org/request/show/361424
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=5
2016-02-25 14:38:11 +00:00
Marguerite Su
c41a829d18 Accepting request 352518 from home:MargueriteSu:branches:network:vpn
OBS-URL: https://build.opensuse.org/request/show/352518
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=4
2016-01-08 00:14:52 +00:00
Marguerite Su
376aa70200 Accepting request 340259 from home:MargueriteSu:branches:network:vpn
OBS-URL: https://build.opensuse.org/request/show/340259
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=3
2015-10-21 13:26:19 +00:00
Marguerite Su
8a5c4768e9 Accepting request 314133 from home:MargueriteSu
OBS-URL: https://build.opensuse.org/request/show/314133
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=2
2015-06-28 05:23:02 +00:00
Tomáš Chvátal
c5d48392d7 Accepting request 285939 from home:MargueriteSu
OBS-URL: https://build.opensuse.org/request/show/285939
OBS-URL: https://build.opensuse.org/package/show/network:vpn/ocserv?expand=0&rev=1
2015-02-26 20:07:11 +00:00