forked from pool/strongswan
Jan Engelhardt
d2eb7d5564
This adds bug references to changes file that are in SLES 15 SP2, to allow potential reintegration to SLES. old: network:vpn/strongswan new: home:msmeissn:branches:network:vpn/strongswan rev None Index: strongswan.changes =================================================================== --- strongswan.changes (revision 129) +++ strongswan.changes (revision 2) @@ -12,12 +12,12 @@ was caused by an integer overflow when processing RSASSA-PSS signatures with very large salt lengths. This vulnerability has been registered as CVE-2021-41990. Please refer to our blog for - details. + details. (bsc#1191367) * Fixed a denial-of-service vulnerability in the in-memory certificate cache if certificates are replaced and a very large random value caused an integer overflow. This vulnerability has been registered as CVE-2021-41991. Please refer to our blog for - details. + details. (bsc#1191435) * Fixed a related flaw that caused the daemon to accept and cache an infinite number of versions of a valid certificate by modifying the parameters in the signatureAlgorithm field of the @@ -46,7 +46,7 @@ - Update to version 5.9.3: * Added AES-ECB, SHA-3 and SHAKE-256 support to the wolfssl plugin. - * Added AES-CCM support to the openssl plugin (#353). + * Added AES-CCM support to the openssl plugin (#353 bsc#1185363). * The x509 and the openssl plugins now consider the authorityKeyIdentifier, if available, before verifying signatures, which avoids unnecessary signature verifications @@ -70,6 +70,9 @@ - Replace libsoup-devel with pkgconfig(libsoup-2.4) BuildRequires, as this is what really checks for. Needed as libsoup-3.0 is released. +- 5.9.1 + - README: added a missing " to pki example command (bsc#1167880) + - fixed a libgcrypt call in FIPS mode (bsc#1180801) ------------------------------------------------------------------- Mon Sep 7 08:38:01 UTC 2020 - Jan Engelhardt <jengelh@inai.de> OBS-URL: https://build.opensuse.org/request/show/949255 OBS-URL: https://build.opensuse.org/package/show/network:vpn/strongswan?expand=0&rev=130 |
||
---|---|---|
.gitattributes | ||
.gitignore | ||
0005-ikev1-Don-t-retransmit-Aggressive-Mode-response.patch | ||
fips-enforce.conf | ||
fipscheck.sh.in | ||
harden_strongswan.service.patch | ||
README.SUSE | ||
strongswan_fipscheck.patch | ||
strongswan_ipsec_service.patch | ||
strongswan-5.9.4.tar.bz2 | ||
strongswan-5.9.4.tar.bz2.sig | ||
strongswan-rpmlintrc | ||
strongswan.changes | ||
strongswan.init.in | ||
strongswan.keyring | ||
strongswan.spec |
Dear Customer, please note, that the strongswan release 4.5 changes the keyexchange mode to IKEv2 as default -- from strongswan-4.5.0/NEWS: "[...] IMPORTANT: the default keyexchange mode 'ike' is changing with release 4.5 from 'ikev1' to 'ikev2', thus commemorating the five year anniversary of the IKEv2 RFC 4306 and its mature successor RFC 5996. The time has definitively come for IKEv1 to go into retirement and to cede its place to the much more robust, powerful and versatile IKEv2 protocol! [...]" This requires adoption of either the "conn %default" or all other IKEv1 "conn" sections in the /etc/ipsec.conf to use explicit: keyexchange=ikev1 The charon daemon in strongswan 5.x versions supports IKEv1 and IKEv2, thus a separate pluto IKEv1 daemon is not needed / not shipped any more. The strongswan package does not provide any files except of this README, but triggers the installation of the charon daemon and the "traditional" strongswan-ipsec package providing the "ipsec" script and service. The ipsec.service is an alias link to the "strongswan.service" systemd service unit and created by "systemctl enable strongswan.service". There is a new strongswan-nm package with a NetworkManager specific charon-nm binary controlling the charon daemon through D-Bus and designed to work using the NetworkManager-strongswan graphical user interface. It does not depend on the traditional starter scripts, but on the IKEv2 charon daemon and plugins only. The stongswan-hmac package provides the fips hmac hash files, a _fipscheck script and a /etc/strongswan.d/charon/zzz_fips-enforce.conf config file, which disables all non-openssl algorithm implementations. When fips operation mode is enabled in the kernel using the fips=1 boot parameter, the strongswan fips checks are executed in front of any start action of the "ipsec" script provided by the "strongswan-ipsec" package and a verification problem causes a failure as required by fips-140-2. Further, it is not required to enable the fips_mode in the openssl plugin (/etc/strongswan.d/charon/openssl.conf); the kernel entablement enables it automatically as needed. The "ipsec _fipscheck" command allows to execute the fips checks manually without a check if fips is enabled (/proc/sys/crypto/fips_enabled is 1), e.g. for testing purposes. Have a lot of fun...