SHA256
1
0
forked from pool/strongswan

Commit Graph

  • 3e9069345b Accepting request 1181997 from network:vpn factory Ana Guerrero 2024-06-21 14:02:56 +0000
  • 233d1d3c87 - Update description of ipsec package: no longer mention /etc/init.d, which is not there for a long time anymore. - Drop legacy rc* -> sbin/service symlink. This was compatibilty boilerplate to transparently move between SySV and systemd [jsc#PED-264]. devel Jan Engelhardt 2024-06-20 17:00:41 +0000
  • 6f280319a6 Accepting request 1160698 from network:vpn Ana Guerrero 2024-03-26 18:24:36 +0000
  • f66e3493f1 - Update to release 5.9.14 Jan Engelhardt 2024-03-19 15:09:14 +0000
  • 254c06c48b Accepting request 1151765 from network:vpn Ana Guerrero 2024-02-27 21:45:09 +0000
  • a9e9a1d03f Accepting request 1151555 from home:dimstar:rpm4.20:s Mohd Saquib 2024-02-26 14:21:48 +0000
  • 5f45b7ef11 Accepting request 1132112 from network:vpn Dominique Leuenberger 2023-12-09 21:49:13 +0000
  • 83fb9474bf - Update to release 5.9.13 Jan Engelhardt 2023-12-01 10:34:18 +0000
  • caa40408d4 Accepting request 1129146 from network:vpn Ana Guerrero 2023-11-27 21:42:05 +0000
  • f19225222f - Update to release 5.9.12 Jan Engelhardt 2023-11-20 13:44:45 +0000
  • e08e5b1209 Accepting request 1094810 from network:vpn Dominique Leuenberger 2023-06-24 18:13:38 +0000
  • 26fbd0f033 Accepting request 1094809 from home:msaquib:branches:network:vpn Mohd Saquib 2023-06-23 09:01:07 +0000
  • 9c6e69afad Accepting request 1092643 from network:vpn Dominique Leuenberger 2023-06-14 14:28:35 +0000
  • 8c5539213c compact/trim changelog - https://en.opensuse.org/openSUSE:Creating_a_changes_file_(RPM) Jan Engelhardt 2023-06-12 15:57:20 +0000
  • a937e6040b OBS-URL: https://build.opensuse.org/package/show/network:vpn/strongswan?expand=0&rev=150 Jan Engelhardt 2023-06-12 15:55:07 +0000
  • 73a1c9e320 Accepting request 1092621 from home:msaquib:branches:network:vpn Mohd Saquib 2023-06-12 15:41:55 +0000
  • 657b2da015 Accepting request 1077378 from network:vpn Dominique Leuenberger 2023-04-07 16:16:14 +0000
  • 8148349f08 Accepting request 1077377 from home:msaquib:branches:network:vpn Mohd Saquib 2023-04-05 00:16:41 +0000
  • 89db574bcf Accepting request 1068724 from network:vpn Dominique Leuenberger 2023-03-03 21:24:35 +0000
  • 9178e03a23 upgrade note Jan Engelhardt 2023-03-02 14:21:28 +0000
  • 016cf7b1e8 - Update to release 5.9.10 Jan Engelhardt 2023-03-02 13:42:24 +0000
  • e8a63e6496 Accepting request 1068696 from home:msaquib:branches:network:vpn Mohd Saquib 2023-03-02 13:26:11 +0000
  • fe861579d5 Accepting request 1068689 from home:msaquib:branches:network:vpn Mohd Saquib 2023-03-02 12:45:07 +0000
  • 0da0fea063 Accepting request 1046554 from network:vpn Dominique Leuenberger 2023-01-04 17:10:26 +0000
  • 3ce027ac91 - Update to release 5.9.9 Jan Engelhardt 2023-01-03 13:25:43 +0000
  • 02464c0051 Accepting request 1009635 from network:vpn Dominique Leuenberger 2022-10-12 16:22:45 +0000
  • b632de741c - Update to release 5.9.8 Jan Engelhardt 2022-10-03 23:19:08 +0000
  • 4e2b66f537 Accepting request 991802 from network:vpn Dominique Leuenberger 2022-08-02 20:08:35 +0000
  • ae2f35131d heed changelog syntax requirements Jan Engelhardt 2022-07-30 09:44:05 +0000
  • abbd490880 Accepting request 991798 from home:p_conrad:branches Jan Engelhardt 2022-07-30 09:43:14 +0000
  • f3e86a936a Accepting request 975521 from network:vpn Dominique Leuenberger 2022-05-08 19:52:07 +0000
  • 0bed40c9cb - Update to release 5.9.6 Jan Engelhardt 2022-04-30 08:43:01 +0000
  • 2455babbdb Accepting request 963708 from network:vpn Dominique Leuenberger 2022-03-23 19:15:41 +0000
  • e1b454dc30 Accepting request 962674 from home:msmeissn:branches:network:vpn Jan Engelhardt 2022-03-21 14:06:21 +0000
  • 7ab7c7ff71 Accepting request 960587 from network:vpn Dominique Leuenberger 2022-03-11 20:41:06 +0000
  • 00a00a6acf Accepting request 960489 from home:msmeissn:branches:network:vpn Jan Engelhardt 2022-03-09 18:30:05 +0000
  • de536ef929 Accepting request 950403 from network:vpn Dominique Leuenberger 2022-02-03 23:45:45 +0000
  • 08b9de7ac5 Accepting request 950382 from home:msmeissn:branches:network:vpn Jan Engelhardt 2022-02-01 11:40:00 +0000
  • 3e374b588f Accepting request 949260 from network:vpn Dominique Leuenberger 2022-01-26 20:26:51 +0000
  • 61572aaddb - Update to release 5.9.5 Jan Engelhardt 2022-01-26 12:33:44 +0000
  • d2eb7d5564 Accepting request 949255 from home:msmeissn:branches:network:vpn Jan Engelhardt 2022-01-26 12:24:59 +0000
  • ff45f5ef5d Accepting request 934253 from network:vpn Dominique Leuenberger 2021-12-01 19:46:40 +0000
  • 0e5610efdc Accepting request 933481 from home:jsegitz:branches:systemdhardening:network:vpn Jan Engelhardt 2021-11-27 14:21:41 +0000
  • 86d1597046 Accepting request 933164 from network:vpn Dominique Leuenberger 2021-11-26 23:50:27 +0000
  • 9d37f89cf7 Accepting request 933151 from home:iznogood:branches:network:vpn Jan Engelhardt 2021-11-22 20:53:44 +0000
  • 722030227c Accepting request 921963 from network:vpn Dominique Leuenberger 2021-09-29 18:18:12 +0000
  • 22be53cdf9 Accepting request 921885 from home:iznogood:branches:network:vpn Jan Engelhardt 2021-09-28 09:20:42 +0000
  • 0a0c8efb6c Accepting request 834251 from network:vpn Dominique Leuenberger 2020-09-23 16:36:53 +0000
  • 2a35cd6ca5 - Update to release 5.9.0 Jan Engelhardt 2020-09-07 08:40:36 +0000
  • 2e1fd31c95 Accepting request 831324 from network:vpn Dominique Leuenberger 2020-09-05 21:57:31 +0000
  • f54d9f5083 Accepting request 831323 from home:monosoul:branches:network:vpn Jan Engelhardt 2020-09-01 22:39:10 +0000
  • b9f4a82f2e - Enable bypass-lan strongswan plugin Jan Engelhardt 2020-09-01 16:31:18 +0000
  • 3babeff858 Accepting request 831234 from home:monosoul:branches:network:vpn Jan Engelhardt 2020-09-01 15:38:16 +0000
  • b280c57b1d Accepting request 800175 from network:vpn Dominique Leuenberger 2020-05-07 13:05:48 +0000
  • 29d549ad98 Accepting request 800173 from home:iznogood:branches:network:vpn Jan Engelhardt 2020-05-04 22:37:00 +0000
  • e87376d36d Accepting request 790269 from network:vpn Dominique Leuenberger 2020-04-02 15:42:30 +0000
  • 8b73a0ccc0 Accepting request 790268 from home:mmnelemane:branches:network:vpn Jan Engelhardt 2020-03-31 16:48:51 +0000
  • e110a9611f Accepting request 775000 from network:vpn Dominique Leuenberger 2020-02-22 17:59:49 +0000
  • faa4319798 Accepting request 774999 from home:ojkastl_buildservice:branches:network:vpn Jan Engelhardt 2020-02-17 20:41:20 +0000
  • 12fdfc6265 Accepting request 769616 from network:vpn Dominique Leuenberger 2020-02-06 12:18:28 +0000
  • 2811ed33c6 Accepting request 768830 from home:iznogood:branches:network:vpn Jan Engelhardt 2020-02-03 14:33:45 +0000
  • 152d7b558c osc copypac from project:openSUSE:Factory package:strongswan revision:70 Madhu Mohan Nelemane 2020-01-30 15:50:32 +0000
  • b84f3a369a osc copypac from project:openSUSE:Leap:15.2 package:strongswan revision:16 Madhu Mohan Nelemane 2020-01-30 09:34:36 +0000
  • f840ebb27d Accepting request 767305 from network:vpn Dominique Leuenberger 2020-01-29 12:10:50 +0000
  • f51dbccc77 Add note about service name change Jan Engelhardt 2020-01-26 09:22:43 +0000
  • 509c30e68d Accepting request 761676 from home:iznogood:branches:network:vpn Jan Engelhardt 2020-01-26 08:50:51 +0000
  • a348ee0611 Accepting request 624096 from network:vpn Dominique Leuenberger 2018-07-21 08:25:06 +0000
  • 876d8e4544 Accepting request 614748 from home:iznogood:branches:network:vpn Madhu Mohan Nelemane 2018-07-19 15:17:25 +0000
  • d48e33c256 Accepting request 613646 from network:vpn Dominique Leuenberger 2018-06-08 21:13:27 +0000
  • 6fe1f53373 Accepting request 597862 from GNOME:Next Madhu Mohan Nelemane 2018-06-02 09:22:27 +0000
  • ea65466835 Accepting request 590079 from network:vpn Dominique Leuenberger 2018-03-24 15:15:16 +0000
  • 1857167427 Accepting request 587821 from home:mmnelemane:branches:network:vpn Madhu Mohan Nelemane 2018-03-22 11:11:56 +0000
  • adcc79ae6b Accepting request 573411 from network:vpn Dominique Leuenberger 2018-02-07 17:41:10 +0000
  • 4ee9977c46 Accepting request 534431 from home:jengelh:branches:network:vpn Dominique Leuenberger 2018-02-06 17:07:40 +0000
  • a848a3d65d Accepting request 521289 from network:vpn Dominique Leuenberger 2017-09-07 20:15:13 +0000
  • 062c69a06d Accepting request 521273 from home:ndas:branches:network:vpn Nirmoy Das 2017-09-05 15:38:01 +0000
  • e17322a559 Accepting request 521079 from home:ndas:branches:network:vpn Nirmoy Das 2017-09-05 10:08:54 +0000
  • 5ffb8e04a6 Accepting request 521071 from home:ndas:branches:network:vpn Nirmoy Das 2017-09-05 09:57:57 +0000
  • ce390f0920 Accepting request 514549 from network:vpn Dominique Leuenberger 2017-08-24 16:45:53 +0000
  • 339326d8bc Accepting request 514548 from home:ndas:branches:network:vpn Nirmoy Das 2017-08-04 11:47:37 +0000
  • 8cfc35877a Accepting request 513652 from home:ndas:branches:network:vpn Nirmoy Das 2017-08-01 07:21:05 +0000
  • 253288c928 Accepting request 442527 from network:vpn Dominique Leuenberger 2016-11-29 11:50:28 +0000
  • d3507c65d4 Accepting request 406438 from home:dkosovic:branches:network:vpn Marius Tomaschewski 2016-11-29 08:32:29 +0000
  • f3a0b7cca7 Accepting request 344762 from network:vpn Dominique Leuenberger 2015-11-17 13:23:11 +0000
  • 406171b31d - Applied upstream fix for a authentication bypass vulnerability in the eap-mschapv2 plugin (CVE-2015-8023,bsc#953817). [+ 0007-strongswan-4.4.0-5.3.3_eap_mschapv2_state.patch] Marius Tomaschewski 2015-11-16 15:23:01 +0000
  • ba2bed6a95 Accepting request 311158 from network:vpn Dominique Leuenberger 2015-06-09 06:49:35 +0000
  • cfde0c0ea7 - Applied upstream fix for a rogue servers vulnerability, that may enable rogue servers able to authenticate itself with certificate issued by any CA the client trusts, to gain user credentials from a client in certain IKEv2 setups (bsc#933591,CVE-2015-4171). [+ 0006-strongswan-5.1.0-5.3.1_enforce_remote_auth.patch] - Fix to apply unknown_payload patch if fips is disabled (<= 13.1) and renamed it to use number prefix corresponding with patch nr. [- strongswan-5.2.2-5.3.0_unknown_payload.patch, + 0005-strongswan-5.2.2-5.3.0_unknown_payload.patch] Marius Tomaschewski 2015-06-08 13:41:42 +0000
  • a596ccdfc9 Accepting request 309675 from network:vpn Dominique Leuenberger 2015-06-02 08:12:05 +0000
  • 76b52dda20 added references to patch file Marius Tomaschewski 2015-06-01 16:28:51 +0000
  • 288621ec30 - Applied upstream fix for a DoS and potential remote code execution vulnerability through payload type (bsc#931272,CVE-2015-3991) [+ strongswan-5.2.2-5.3.0_unknown_payload.patch] Marius Tomaschewski 2015-06-01 16:25:25 +0000
  • 4a7fa03a80 - reverted last commit, not needed here Marius Tomaschewski 2015-03-09 09:28:29 +0000
  • b401bc1d51 - Applied a fix by Marcus Meissner for a loop check in ipsec pki causing a segfault on attempt to create certificates when fips is enabled (bsc#918474,https://wiki.strongswan.org/issues/881) [+ 0006-strongswan-pkifix.918474.patch] Marius Tomaschewski 2015-03-09 09:02:18 +0000
  • d688e99dd5 Accepting request 287701 from network:vpn Dominique Leuenberger 2015-02-27 09:59:38 +0000
  • 8a2afb449d removed obsolete patch files [deletion noted in changelog already] Marius Tomaschewski 2015-02-18 12:24:33 +0000
  • 055879bc1c - Updated to strongSwan 5.2.2 providing the following changes: Changes in version 5.2.2: * Fixed a denial-of-service vulnerability triggered by an IKEv2 Key Exchange payload that contains the Diffie-Hellman group 1025. This identifier was used internally for DH groups with custom generator and prime. Because these arguments are missing when creating DH objects based on the KE payload an invalid pointer dereference occurred. This allowed an attacker to crash the IKE daemon with a single IKE_SA_INIT message containing such a KE payload. The vulnerability has been registered as CVE-2014-9221. * The left/rightid options in ipsec.conf, or any other identity in strongSwan, now accept prefixes to enforce an explicit type, such as email: or fqdn:. Note that no conversion is done for the remaining string, refer to ipsec.conf(5) for details. * The post-quantum Bimodal Lattice Signature Scheme (BLISS) can be used as an IKEv2 public key authentication method. The pki tool offers full support for the generation of BLISS key pairs and certificates. * Fixed mapping of integrity algorithms negotiated for AH via IKEv1. This could cause interoperability issues when connecting to older versions of charon. Changes in version 5.2.1: * The new charon-systemd IKE daemon implements an IKE daemon tailored for use with systemd. It avoids the dependency on ipsec starter and uses swanctl as configuration backend, building a simple and lightweight solution. It supports native systemd journal logging. * Support for IKEv2 fragmentation as per RFC 7383 has been added. Like IKEv1 fragmentation it can be enabled by setting fragmentation=yes in ipsec.conf. * Support of the TCG TNC IF-M Attribute Segmentation specification proposal. All attributes can be segmented. Additionally TCG/SWID Tag, TCG/SWID Tag ID and IETF/Installed Packages attributes can be processed incrementally on a per segment basis. Marius Tomaschewski 2015-01-05 14:41:37 +0000
  • fadffa6d60 - Disallow brainpool elliptic curve groups in fips mode (bnc#856322). [* strongswan_fipsfilter.patch] Marius Tomaschewski 2015-01-05 13:04:19 +0000
  • 1902611f9f Accepting request 262968 from network:vpn Dominique Leuenberger 2014-11-26 09:33:53 +0000
  • 820c7f86b7 [- strongswan-fips-disablegcrypt.patch] Marius Tomaschewski 2014-11-25 11:29:20 +0000
  • e05aebd3de - Updated strongswan-hmac package description (bsc#856322). Marius Tomaschewski 2014-11-25 11:25:10 +0000
  • f8e5433fa6 guard also patches Marius Tomaschewski 2014-11-21 15:26:23 +0000