Merge ~ahasenack/ubuntu/+source/strongswan:cosmic-strongswan-merge-5.6.3-1 into ubuntu/+source/strongswan:debian/sid

Proposed by Andreas Hasenack
Status: Merged
Approved by: Christian Ehrhardt 
Approved revision: 914d0606e00afd407437ea850454beba437a0ea2
Merge reported by: Andreas Hasenack
Merged at revision: 914d0606e00afd407437ea850454beba437a0ea2
Proposed branch: ~ahasenack/ubuntu/+source/strongswan:cosmic-strongswan-merge-5.6.3-1
Merge into: ubuntu/+source/strongswan:debian/sid
Diff against target: 2138 lines (+1596/-92)
19 files modified
debian/changelog (+1216/-0)
debian/control (+122/-6)
debian/ipsec.secrets.proto (+0/-3)
debian/libcharon-extra-plugins.install (+64/-12)
debian/libcharon-standard-plugins.install (+19/-0)
debian/libstrongswan-extra-plugins.install (+58/-0)
debian/libstrongswan.install (+11/-6)
debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch (+11/-0)
debian/patches/series (+1/-0)
debian/rules (+50/-6)
debian/strongswan-starter.install (+4/-0)
debian/strongswan-starter.postinst (+0/-57)
debian/strongswan-tnc-base.install (+16/-0)
debian/strongswan-tnc-client.install (+5/-0)
debian/strongswan-tnc-ifmap.install (+3/-0)
debian/strongswan-tnc-pdp.install (+3/-0)
debian/strongswan-tnc-server.install (+10/-0)
debian/usr.lib.ipsec.charon (+1/-1)
debian/usr.sbin.charon-systemd (+2/-1)
Reviewer Review Type Date Requested Status
Christian Ehrhardt  (community) Approve
Canonical Server packageset reviewers Pending
Review via email: mp+353642@code.launchpad.net

Description of the change

Merge with debian's 5.6.3, fixing CVE-2018-10811 and CVE-2018-5388, dropping one bit of delta that Christian submitted, acquiring another bit of delta.

https://bugs.launchpad.net/ubuntu/+source/strongswan/+bug/1776857 is requesting an update to 5.6.3, but for xenial. I could change that bug a bit, make it be about an upgrade to 5.6.3, close it with this upload and add a xenial task, but doubt we will do that kind of sru since xenial has 5.3.5.

Bileto ticket: https://bileto.ubuntu.com/#/ticket/3376

The DEP8 failure in neutron-vpnaas is because python3-paramiko (2.0.0-1ubuntu1) is not installable. If you look in the architectures where the test passed, there we have paramiko 2.4.1-0ubuntu1 which is fixed.

paramiko's own dep8 tests seem to be having trouble in migration at the moment (http://people.canonical.com/~ubuntu-archive/proposed-migration/update_excuses.html#paramiko)

qa regression test run with old and new strongswan:
old: gw1 (https://pastebin.ubuntu.com/p/qMH4d8YQ87/) and gw2 (https://pastebin.ubuntu.com/p/d7t7WnWTJV/)

Then dist-upgrade was run with the bileto ppa enabled (ppa:ci-train-ppa-service/3376):
new: gw1 (https://pastebin.ubuntu.com/p/v3YzP2Gmzx/) and gw2 (https://pastebin.ubuntu.com/p/MNWKHRpzx9/)

To post a comment you must log in.
Revision history for this message
Andreas Hasenack (ahasenack) wrote :

Paramiko's failures are due to an incorrect packaging of the 2.4.1 orig tarball I believe. The failures are because of the missing .pub files, which are present in the upstream 2.4.1 tarball, but not in our orig one:

https://pastebin.ubuntu.com/p/GKgxv64t2K/

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

- Deconstruct and Logical is good
- Changelogs are mostly good
- old changes are retained correctly (All 100% identical, you just updated the commit messages)
- as discussed the tests look good as well thanks for doing that two system test that I linked you

I only must ask to fixup the changelog in one place - the mentioning of 1784023.
That is
a) not added on the merge but in 5.6.2-2ubuntu2 (currently in Added changes)
b) please break the LP: #1784023 string so that tools will not try to close the bug again

Please fix this little thing in the changelog, then I think we can upload.

review: Needs Fixing
bb919ae... by Andreas Hasenack

merge-changelogs

1c941f6... by Andreas Hasenack

reconstruct-changelog

bcb24b5... by Andreas Hasenack

update-maintainer

914d060... by Andreas Hasenack

Cleanup d/changelog (removed signed-off lines)

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

Thanks for the fixup, looks good now.

review: Approve
Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

To ssh://git.launchpad.net/~usd-import-team/ubuntu/+source/strongswan
 * [new tag] upload/5.6.3-1ubuntu1 -> upload/5.6.3-1ubuntu1

Revision history for this message
Andreas Hasenack (ahasenack) wrote :

Uploaded, thanks

Revision history for this message
Andreas Hasenack (ahasenack) wrote :
Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

Jamie also accepted the related qa-regression-test change today.
So overall all should fit together :-)

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/debian/changelog b/debian/changelog
2index 6270ae7..3be3a4a 100644
3--- a/debian/changelog
4+++ b/debian/changelog
5@@ -1,3 +1,58 @@
6+strongswan (5.6.3-1ubuntu1) cosmic; urgency=medium
7+
8+ * Merge with Debian unstable. Remaining changes:
9+ - Clean up d/strongswan-starter.postinst: section about runlevel changes
10+ - Clean up d/strongswan-starter.postinst: Removed entire section on
11+ opportunistic encryption disabling - this was never in strongSwan and
12+ won't be see upstream issue #2160.
13+ - d/rules: Removed patching ipsec.conf on build (not using the
14+ debconf-managed config.)
15+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
16+ used for debconf-managed include of private key).
17+ - Mass enablement of extra plugins and features to allow a user to use
18+ strongswan for a variety of extra use cases without having to rebuild.
19+ + d/control: Add required additional build-deps
20+ + d/control: Mention addtionally enabled plugins
21+ + d/rules: Enable features at configure stage
22+ + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
23+ + d/libstrongswan.install: Add plugins (so, conf)
24+ - d/strongswan-starter.install: Install pool feature, which is useful since
25+ we have attr-sql plugin enabled as well using it.
26+ - Add plugin kernel-libipsec to allow the use of strongswan in containers
27+ via this userspace implementation (please do note that this is still
28+ considered experimental by upstream).
29+ + d/libcharon-extra-plugins.install: Add kernel-libipsec components
30+ + d/control: List kernel-libipsec plugin at extra plugins description
31+ + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
32+ upstream recommends to not load kernel-libipsec by default.
33+ - Relocate tnc plugin
34+ + debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
35+ + Add new subpackage for TNC in d/strongswan-tnc-* and d/control
36+ - d/libstrongswan.install: Reorder conf and .so alphabetically
37+ - d/libstrongswan.install: Add kernel-netlink configuration files
38+ - Complete the disabling of libfast; This was partially accepted in Debian,
39+ it is no more packaging medcli and medsrv, but still builds and
40+ mentions it.
41+ + d/rules: Add --disable-fast to avoid build time and dependencies
42+ + d/control: Remove medcli, medsrv from package description
43+ - d/control: Mention mgf1 plugin which is in libstrongswan now
44+ - Add now built (since 5.5.1) libraries libtpmtss and nttfft to
45+ libstrongswan-extra-plugins (no deps from default plugins).
46+ - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
47+ plugins for the most common use cases from extra-plugins into a new
48+ standard-plugins package. This will allow those use cases without pulling
49+ in too much more plugins (a bit like the tnc package). Recommend that
50+ package from strongswan-libcharon.
51+ - d/usr.sbin.charon-systemd: allow to contact mysql for sql and
52+ attr-sql plugins (LP #1766240)
53+ - d/usr.lib.ipsec.charon, d/usr/sbin/charon-systemd: Add support for
54+ usr-merge, thanks to Christian Ehrhardt. LP #1784023
55+ * Dropped:
56+ - d/usr.sbin.charon-systemd: allow systemd notifications (LP: #1765652)
57+ [Fixed in 5.6.3-1]
58+
59+ -- Andreas Hasenack <andreas@canonical.com> Thu, 23 Aug 2018 13:05:11 -0300
60+
61 strongswan (5.6.3-1) unstable; urgency=medium
62
63 * New upstream version 5.6.2
64@@ -13,6 +68,78 @@ strongswan (5.6.3-1) unstable; urgency=medium
65
66 -- Yves-Alexis Perez <corsac@debian.org> Mon, 04 Jun 2018 10:23:22 +0200
67
68+strongswan (5.6.2-2ubuntu2) cosmic; urgency=medium
69+
70+ * Add support for usr-merge, thanks to Christian Ehrhardt. LP: #1784023
71+
72+ -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 21 Aug 2018 00:42:38 +0100
73+
74+strongswan (5.6.2-2ubuntu1) cosmic; urgency=medium
75+
76+ * Merge with Debian unstable, closes LP: #1773814 and LP: #1772705.
77+ Remaining changes:
78+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
79+ + Clean up d/strongswan-starter.postinst: Removed entire section on
80+ opportunistic encryption disabling - this was never in strongSwan and
81+ won't be see upstream issue #2160.
82+ + d/rules: Removed patching ipsec.conf on build (not using the
83+ debconf-managed config.)
84+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
85+ used for debconf-managed include of private key).
86+ + Mass enablement of extra plugins and features to allow a user to use
87+ strongswan for a variety of extra use cases without having to rebuild.
88+ - d/control: Add required additional build-deps
89+ - d/control: Mention addtionally enabled plugins
90+ - d/rules: Enable features at configure stage
91+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
92+ - d/libstrongswan.install: Add plugins (so, conf)
93+ + d/strongswan-starter.install: Install pool feature, which is useful since
94+ we have attr-sql plugin enabled as well using it.
95+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
96+ via this userspace implementation (please do note that this is still
97+ considered experimental by upstream).
98+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
99+ - d/control: List kernel-libipsec plugin at extra plugins description
100+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
101+ upstream recommends to not load kernel-libipsec by default.
102+ + Relocate tnc plugin
103+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
104+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
105+ + d/libstrongswan.install: Reorder conf and .so alphabetically
106+ + d/libstrongswan.install: Add kernel-netlink configuration files
107+ + Complete the disabling of libfast; This was partially accepted in Debian,
108+ it is no more packaging medcli and medsrv, but still builds and
109+ mentions it.
110+ - d/rules: Add --disable-fast to avoid build time and dependencies
111+ - d/control: Remove medcli, medsrv from package description
112+ + d/control: Mention mgf1 plugin which is in libstrongswan now
113+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
114+ libstrongswan-extra-plugins (no deps from default plugins).
115+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
116+ plugins for the most common use cases from extra-plugins into a new
117+ standard-plugins package. This will allow those use cases without pulling
118+ in too much more plugins (a bit like the tnc package). Recommend that
119+ package from strongswan-libcharon.
120+ * Dropped Changes (no more needed after 18.04)
121+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
122+ missed that, droppable after 18.04)
123+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
124+ libstrongswan as we dropped relocating ccm and test-vectors.
125+ (droppable >18.04).
126+ + d/control: add breaks/replace from libstrongswan to
127+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
128+ (droppable >18.04).
129+ + d/control: bump breaks/replaces for the move of the updown plugin
130+ (Missed Changelog entry on last merge)
131+ + d/control: fix dependencies of strongswan-libcharon due to the move
132+ the updown plugin (droppable >18.04).
133+ * Added Changes:
134+ + d/usr.sbin.charon-systemd: allow to contact mysql for sql and
135+ attr-sql plugins (LP: #1766240)
136+ + d/usr.sbin.charon-systemd: allow systemd notifications (LP: #1765652)
137+
138+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 29 May 2018 08:21:42 +0200
139+
140 strongswan (5.6.2-2) unstable; urgency=medium
141
142 * charon-nm: Fix building list of DNS/MDNS servers with libnm
143@@ -23,6 +150,74 @@ strongswan (5.6.2-2) unstable; urgency=medium
144
145 -- Yves-Alexis Perez <corsac@debian.org> Fri, 13 Apr 2018 13:46:04 +0200
146
147+strongswan (5.6.2-1ubuntu2) bionic; urgency=medium
148+
149+ * d/control: fix dependencies of strongswan-libcharon due to the move
150+ the updown plugin.
151+
152+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 20 Mar 2018 07:37:29 +0100
153+
154+strongswan (5.6.2-1ubuntu1) bionic; urgency=medium
155+
156+ * Merge with Debian unstable (LP: #1753018). Remaining changes:
157+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
158+ + Clean up d/strongswan-starter.postinst: Removed entire section on
159+ opportunistic encryption disabling - this was never in strongSwan and
160+ won't be see upstream issue #2160.
161+ + Ubuntu is not using the debconf triggered private key generation
162+ - d/rules: Removed patching ipsec.conf on build (not using the
163+ debconf-managed config.)
164+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
165+ used for debconf-managed include of private key).
166+ + Mass enablement of extra plugins and features to allow a user to use
167+ strongswan for a variety of extra use cases without having to rebuild.
168+ - d/control: Add required additional build-deps
169+ - d/control: Mention addtionally enabled plugins
170+ - d/rules: Enable features at configure stage
171+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
172+ - d/libstrongswan.install: Add plugins (so, conf)
173+ + d/strongswan-starter.install: Install pool feature, which is useful since
174+ we have attr-sql plugin enabled as well using it.
175+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
176+ via this userspace implementation (please do note that this is still
177+ considered experimental by upstream).
178+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
179+ - d/control: List kernel-libipsec plugin at extra plugins description
180+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
181+ upstream recommends to not load kernel-libipsec by default.
182+ + Relocate tnc plugin
183+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
184+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
185+ + d/libstrongswan.install: Reorder conf and .so alphabetically
186+ + d/libstrongswan.install: Add kernel-netlink configuration files
187+ + Complete the disabling of libfast; This was partially accepted in Debian,
188+ it is no more packaging medcli and medsrv, but still builds and
189+ mentions it.
190+ - d/rules: Add --disable-fast to avoid build time and dependencies
191+ - d/control: Remove medcli, medsrv from package description
192+ + d/control: Mention mgf1 plugin which is in libstrongswan now
193+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
194+ libstrongswan-extra-plugins (no deps from default plugins).
195+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
196+ missed that, droppable after 18.04)
197+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
198+ plugins for the most common use cases from extra-plugins into a new
199+ standard-plugins package. This will allow those use cases without pulling
200+ in too much more plugins (a bit like the tnc package). Recommend that
201+ package from strongswan-libcharon.
202+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
203+ libstrongswan as we dropped relocating ccm and test-vectors.
204+ (droppable >18.04).
205+ + d/control: add breaks/replace from libstrongswan to
206+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
207+ (droppable >18.04).
208+ * Added Changes:
209+ + d/control: bump breaks/replaces from strongswan-libcharon to strongswan-
210+ starter as we followed Debian to move the updown plugin but need to
211+ match Ubuntu versions (Droppable >18.04).
212+
213+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Fri, 16 Mar 2018 11:08:47 +0100
214+
215 strongswan (5.6.2-1) unstable; urgency=medium
216
217 * d/NEWS: add information about disabled algorithms (closes: #883072)
218@@ -45,6 +240,129 @@ strongswan (5.6.1-3) unstable; urgency=medium
219
220 -- Yves-Alexis Perez <corsac@debian.org> Sun, 17 Dec 2017 16:40:39 +0100
221
222+strongswan (5.6.1-2ubuntu4) bionic; urgency=medium
223+
224+ * SECURITY UPDATE: DoS via crafted RSASSA-PSS signature
225+ - debian/patches/CVE-2018-6459.patch: Properly handle MGF1 algorithm
226+ identifier without parameters in
227+ src/libstrongswan/credentials/keys/signature_params.c.
228+ - CVE-2018-6459
229+
230+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 07 Mar 2018 14:52:02 +0100
231+
232+strongswan (5.6.1-2ubuntu3) bionic; urgency=medium
233+
234+ * No-change rebuild against libcurl4
235+
236+ -- Steve Langasek <steve.langasek@ubuntu.com> Wed, 28 Feb 2018 08:52:09 +0000
237+
238+strongswan (5.6.1-2ubuntu2) bionic; urgency=high
239+
240+ * No change rebuild against openssl1.1.
241+
242+ -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 12 Feb 2018 16:00:24 +0000
243+
244+strongswan (5.6.1-2ubuntu1) bionic; urgency=medium
245+
246+ * Merge with Debian unstable (LP: #1717343).
247+ Also fixes and issue with multiple psk's (LP: #1734207). Remaining changes:
248+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
249+ + Clean up d/strongswan-starter.postinst: Removed entire section on
250+ opportunistic encryption disabling - this was never in strongSwan and
251+ won't be see upstream issue #2160.
252+ + Ubuntu is not using the debconf triggered private key generation
253+ - d/rules: Removed patching ipsec.conf on build (not using the
254+ debconf-managed config.)
255+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
256+ used for debconf-managed include of private key).
257+ + Mass enablement of extra plugins and features to allow a user to use
258+ strongswan for a variety of extra use cases without having to rebuild.
259+ - d/control: Add required additional build-deps
260+ - d/control: Mention addtionally enabled plugins
261+ - d/rules: Enable features at configure stage
262+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
263+ - d/libstrongswan.install: Add plugins (so, conf)
264+ + d/strongswan-starter.install: Install pool feature, which is useful since
265+ we have attr-sql plugin enabled as well using it.
266+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
267+ via this userspace implementation (please do note that this is still
268+ considered experimental by upstream).
269+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
270+ - d/control: List kernel-libipsec plugin at extra plugins description
271+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
272+ upstream recommends to not load kernel-libipsec by default.
273+ + Relocate tnc plugin
274+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
275+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
276+ + d/libstrongswan.install: Reorder conf and .so alphabetically
277+ + d/libstrongswan.install: Add kernel-netlink configuration files
278+ + Complete the disabling of libfast; This was partially accepted in Debian,
279+ it is no more packaging medcli and medsrv, but still builds and
280+ mentions it.
281+ - d/rules: Add --disable-fast to avoid build time and dependencies
282+ - d/control: Remove medcli, medsrv from package description
283+ + d/control: Mention mgf1 plugin which is in libstrongswan now
284+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
285+ libstrongswan-extra-plugins (no deps from default plugins).
286+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
287+ missed that, droppable after 18.04)
288+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
289+ plugins for the most common use cases from extra-plugins into a new
290+ standard-plugins package. This will allow those use cases without pulling
291+ in too much more plugins (a bit like the tnc package). Recommend that
292+ package from strongswan-libcharon.
293+ * Added changes:
294+ + d/strongswan-tnc-client.install (relocate tnc) swidtag creation changed
295+ in 5.6
296+ + d/strongswan-tnc-server.install (relocate tnc) pacman no more needed
297+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
298+ libstrongswan as we dropped relocating ccm and test-vectors.
299+ (droppable >18.04).
300+ - d/control: add breaks/replace from libstrongswan to
301+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
302+ (droppable >18.04).
303+ * Dropped changes:
304+ + Update init/service handling (debian default matches Ubuntu past now)
305+ Dropping this fixes (LP: #1734886)
306+ - d/rules: Change init/systemd program name to strongswan
307+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
308+ patching upstream
309+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
310+ linking to upstream
311+ + d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call
312+ (this is a never failing no-op for us, no need for Delta).
313+ + d/strongswan-starter.prerm: Stop strongswan service on package removal
314+ (ipsec now maps to strongswan service, so this works as-is).
315+ + Clean up d/strongswan-starter.postinst: rename service ipsec to
316+ strongswan (ipsec now maps to strongswan service, so this works as-is)
317+ + Clean up d/strongswan-starter.postinst: daemon enable/disable (the
318+ whole section is disabled, so no need for delta)
319+ + (is upstream) CVE-2017-11185 patches
320+ + (is upstream) FTBFS upstream fix for changed include files
321+ + (is upstream) debian/patches/increase-bliss-test-timeout.patch: Under
322+ QEMU/KVM autopkgtest the bliss test takes longer than the default
323+ + (in Debian) add now built (since 5.5.1) mgf1 plugin to
324+ libstrongswan-extra-plugins.
325+ + (in Debian) d/strongswan-starter.install: install stroke apparmor profile
326+ + (this was enabled as part of the former delta, squash changes to no-up)
327+ d/rules: Disable duplicheck.
328+ + (not needed) Relocate plugins test-vectors from extra-plugins to
329+ libstrongswan
330+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
331+ - d/libstrongswan.install: Add plugins/confiles
332+ - d/control: move package descriptions and add required breaks/replaces
333+ + (not needed) Relocate plugins ccm from extra-plugins to libstrongswan
334+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
335+ - d/libstrongswan.install: Add plugins/confiles
336+ - d/control: move package descriptions and add required breaks/replaces
337+ + (while using it requires special kernel, it does not hurt to be
338+ available in the package) Remove ha plugin
339+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
340+ - d/rules: Do not enable ha plugin
341+ - d/control: Drop listing the ha plugin in the package description
342+
343+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 29 Nov 2017 15:55:18 +0100
344+
345 strongswan (5.6.1-2) unstable; urgency=medium
346
347 * move counters plugin from -starter to -libcharon. closes: #882431
348@@ -131,6 +449,213 @@ strongswan (5.5.2-1) experimental; urgency=medium
349
350 -- Yves-Alexis Perez <corsac@debian.org> Fri, 19 May 2017 11:32:00 +0200
351
352+strongswan (5.5.1-4ubuntu3) bionic; urgency=medium
353+
354+ * Fix Artful FTBFS due to newer glibc (LP: #1724859)
355+ - d/p/utils-Include-stdint.h.patch: upstream fix for changed include
356+ files.
357+
358+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 19 Oct 2017 15:18:52 +0200
359+
360+strongswan (5.5.1-4ubuntu2) artful; urgency=medium
361+
362+ * SECURITY UPDATE: Fix RSA signature verification
363+ - debian/patches/CVE-2017-11185.patch: does some
364+ verifications in order to avoid null-point dereference
365+ in src/libstrongswan/gmp/gmp_rsa_public_key.c
366+ - CVE-2017-11185
367+
368+ -- Leonidas S. Barbosa <leo.barbosa@canonical.com> Tue, 15 Aug 2017 14:49:49 -0300
369+
370+strongswan (5.5.1-4ubuntu1) artful; urgency=medium
371+
372+ * Merge from Debian to pick up latest security changes (CVE-2017-9022,
373+ CVE-2017-9023).
374+ * Remaining Changes:
375+ + Update init/service handling
376+ - d/rules: Change init/systemd program name to strongswan
377+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
378+ patching upstream
379+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
380+ linking to upstream
381+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
382+ - d/strongswan-starter.prerm: Stop strongswan service on package
383+ removal (as opposed to using the old init.d script).
384+ + Clean up d/strongswan-starter.postinst:
385+ - Removed section about runlevel changes
386+ - Adapted service restart section for Upstart (kept to be Trusty
387+ backportable).
388+ - Remove old symlinks to init.d files is necessary.
389+ - Removed further out-dated code
390+ - Removed entire section on opportunistic encryption - this was never in
391+ strongSwan.
392+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
393+ + Mass enablement of extra plugins and features to allow a user to use
394+ strongswan for a variety of use cases without having to rebuild.
395+ - d/control: Add required additional build-deps
396+ - d/rules: Enable features at configure stage
397+ - d/control: Mention addtionally enabled plugins
398+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
399+ - d/libstrongswan.install: Add plugins (so, conf)
400+ + d/rules: Disable duplicheck as per
401+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
402+ + Remove ha plugin (requires special kernel)
403+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
404+ - d/rules: Do not enable ha plugin
405+ - d/control: Drop listing the ha plugin in the package description
406+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
407+ via this userspace implementation (please do note that this is still
408+ considered experimental by upstream).
409+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
410+ - d/control: List kernel-libipsec plugin at extra plugins description
411+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
412+ upstream recommends to not load kernel-libipsec by default.
413+ + Relocate tnc plugin
414+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
415+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
416+ + d/strongswan-starter.install: Install pool feature, that useful due to
417+ having attr-sql plugin that is enabled now.
418+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
419+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
420+ - d/libstrongswan.install: Add plugins/confiles
421+ - d/control: move package descriptions and add required breaks/replaces
422+ + d/libstrongswan.install: Reorder conf and .so alphabetically
423+ + d/libstrongswan.install: Add kernel-netlink configuration files
424+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
425+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
426+ autopkgtest the bliss test takes longer than the default (Upstream in
427+ 5.5.2 via issue 2204)
428+ + Complete the disabling of libfast; This was partially accepted in Debian,
429+ it is no more packaging medcli and medsrv, but still builds and
430+ mentions it.
431+ - d/rules: Add --disable-fast to avoid build time and dependencies
432+ - d/control: Remove medcli, medsrv from package description
433+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
434+ "only" to extra-plugins Mgf1 is not listed as default plugin at
435+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
436+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
437+ libstrongswan-extra-plugins.
438+ + Add missing mention of md4 plugin in d/control
439+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
440+ missed that)
441+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
442+ plugins for the most common use cases from extra-plugins into a new
443+ standard-plugins package. This will allow those use cases without pulling
444+ in too much more plugins (a bit like the tnc package). Recommend that
445+ package from strongswan-libcharon.
446+
447+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 31 May 2017 15:57:54 +0200
448+
449+strongswan (5.5.1-3ubuntu1) artful; urgency=medium
450+
451+ * Merge from Debian to pick up latest changes. Among others this includes:
452+ - a lot of the Delta we upstreamed to Debian (more discussions are ongoing
453+ but likely have to wait until Debian stretch was released)
454+ - enabling mediation support (LP: #1657413)
455+ * Remaining Changes:
456+ + Update init/service handling
457+ - d/rules: Change init/systemd program name to strongswan
458+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
459+ patching upstream
460+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
461+ linking to upstream
462+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
463+ - d/strongswan-starter.prerm: Stop strongswan service on package
464+ removal (as opposed to using the old init.d script).
465+ + Clean up d/strongswan-starter.postinst:
466+ - Removed section about runlevel changes
467+ - Adapted service restart section for Upstart (kept to be Trusty
468+ backportable).
469+ - Remove old symlinks to init.d files is necessary.
470+ - Removed further out-dated code
471+ - Removed entire section on opportunistic encryption - this was never in
472+ strongSwan.
473+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
474+ + Mass enablement of extra plugins and features to allow a user to use
475+ strongswan for a variety of use cases without having to rebuild.
476+ - d/control: Add required additional build-deps
477+ - d/rules: Enable features at configure stage
478+ - d/control: Mention addtionally enabled plugins
479+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
480+ - d/libstrongswan.install: Add plugins (so, conf)
481+ + d/rules: Disable duplicheck as per
482+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
483+ + Remove ha plugin (requires special kernel)
484+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
485+ - d/rules: Do not enable ha plugin
486+ - d/control: Drop listing the ha plugin in the package description
487+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
488+ via this userspace implementation (please do note that this is still
489+ considered experimental by upstream).
490+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
491+ - d/control: List kernel-libipsec plugin at extra plugins description
492+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
493+ upstream recommends to not load kernel-libipsec by default.
494+ + Relocate tnc plugin
495+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
496+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
497+ + d/strongswan-starter.install: Install pool feature, that useful due to
498+ having attr-sql plugin that is enabled now.
499+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
500+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
501+ - d/libstrongswan.install: Add plugins/confiles
502+ - d/control: move package descriptions and add required breaks/replaces
503+ + d/libstrongswan.install: Reorder conf and .so alphabetically
504+ + d/libstrongswan.install: Add kernel-netlink configuration files
505+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
506+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
507+ autopkgtest the bliss test takes longer than the default (Upstream in
508+ 5.5.2 via issue 2204)
509+ + Complete the disabling of libfast; This was partially accepted in Debian,
510+ it is no more packaging medcli and medsrv, but still builds and
511+ mentions it.
512+ - d/rules: Add --disable-fast to avoid build time and dependencies
513+ - d/control: Remove medcli, medsrv from package description
514+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
515+ "only" to extra-plugins Mgf1 is not listed as default plugin at
516+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
517+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
518+ libstrongswan-extra-plugins.
519+ + Add missing mention of md4 plugin in d/control
520+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
521+ missed that)
522+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
523+ plugins for the most common use cases from extra-plugins into a new
524+ standard-plugins package. This will allow those use cases without pulling
525+ in too much more plugins (a bit like the tnc package). Recommend that
526+ package from strongswan-libcharon.
527+ * Dropped Changes:
528+ + Add and install apparmor profiles (in Debian)
529+ - d/rules: Install AppArmor profiles
530+ - d/control: Add dh-apparmor build-dep
531+ - d/usr.lib.ipsec.{charon, lookip, stroke}: Add latest AppArmor profiles
532+ for charon, lookip and stroke
533+ - d/libcharon-extra-plugins.install: Install profile for lookip
534+ - d/strongswan-charon.install: Install profile for charon
535+ - d/strongswan-starter.install: Install profile for stroke
536+ - Fix strongswan ipsec status issue with apparmor
537+ - Fix Dep8 tests for the now extra strongswan-pki package for pki
538+ - Fix Dep8 tests for the now extra strongswan-scepclient package
539+ + d/rules: Sorted and only one enable option per configure line (in
540+ Debian)
541+ + Add updated logcheck rules (in Debian)
542+ - debian/libstrongswan.strongswan.logcheck.*: Remove outdated files
543+ - debian/strongswan.logcheck: Add updated logcheck rules
544+ + Add updated DEP8 tests (in Debian)
545+ - d/tests/*: Add DEP8 tests
546+ - d/control: Enable autotestpkg
547+ + d/rules: do not strip for library integrity checking (After Discussion
548+ with Debian this isn't acceptable there, but at the same time it turned
549+ out the real use-case of this never uses this lib but instead third
550+ party checks of checksums for e.g. FIPS cert; so drop the Delta)
551+ - Use override_dh_strip to to avoid overwriting user build flags.
552+ - Add missing mention of libchecksum integrity test in d/control
553+ + d/rules: Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths
554+ in tests to avoid issues in low entropy environments. (Debian has
555+ disabled !x86 tests for the same reason, one solution is enough)
556+
557+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 04 May 2017 14:06:23 +0200
558+
559 strongswan (5.5.1-3) unstable; urgency=medium
560
561 [ Christian Ehrhardt ]
562@@ -164,6 +689,136 @@ strongswan (5.5.1-2) unstable; urgency=medium
563
564 -- Yves-Alexis Perez <corsac@debian.org> Wed, 07 Dec 2016 08:34:52 +0100
565
566+strongswan (5.5.1-1ubuntu2) zesty; urgency=medium
567+
568+ * Update Maintainers which was missed while merging 5.5.1-1.
569+
570+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 19 Dec 2016 16:02:40 +0100
571+
572+strongswan (5.5.1-1ubuntu1) zesty; urgency=medium
573+
574+ * Merge from Debian (complex delta, discussions and broken out changes can be
575+ found in the merge proposal linked from the merge bug LP: #1631198)
576+ * Remaining Changes:
577+ + d/rules: Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity
578+ checking.
579+ + d/rules: Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths
580+ in tests to avoid issues in low entropy environments.
581+ + Update init/service handling
582+ - d/rules: Change init/systemd program name to strongswan
583+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
584+ patching upstream
585+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
586+ linking to upstream
587+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
588+ - d/strongswan-starter.prerm: Stop strongswan service on package
589+ removal (as opposed to using the old init.d script).
590+ + Clean up d/strongswan-starter.postinst:
591+ - Removed section about runlevel changes
592+ - Adapted service restart section for Upstart (kept to be Trusty
593+ backportable).
594+ - Remove old symlinks to init.d files is necessary.
595+ - Removed further out-dated code
596+ - Removed entire section on opportunistic encryption - this was never in
597+ strongSwan.
598+ + Add and install apparmor profiles
599+ - d/rules: Install AppArmor profiles
600+ - d/control: Add dh-apparmor build-dep
601+ - d/usr.lib.ipsec.{charon, lookip, stroke}: Add latest AppArmor profiles
602+ for charon, lookip and stroke
603+ - d/libcharon-extra-plugins.install: Install profile for lookip
604+ - d/strongswan-charon.install: Install profile for charon
605+ - d/strongswan-starter.install: Install profile for stroke
606+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
607+ + d/rules: Sorted and only one enable option per configure line
608+ + Mass enablement of extra plugins and features to allow a user to use
609+ strongswan for a variety of use cases without having to rebuild.
610+ - d/control: Add required additional build-deps
611+ - d/rules: Enable features at configure stage
612+ - d/control: Mention addtionally enabled plugins
613+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
614+ - d/libstrongswan.install: Add plugins (so, conf)
615+ + d/rules: Disable duplicheck as per
616+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
617+ + Remove ha plugin (requires special kernel)
618+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
619+ - d/rules: Do not enable ha plugin
620+ - d/control: Drop listing the ha plugin in the package description
621+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
622+ via this userspace implementation (please do note that this is still
623+ considered experimental by upstream).
624+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
625+ - d/control: List kernel-libipsec plugin at extra plugins description
626+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
627+ upstream recommends to not load kernel-libipsec by default.
628+ + Relocate tnc plugin
629+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
630+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
631+ + d/strongswan-starter.install: Install pool feature, that useful due to
632+ having attr-sql plugin that is enabled now.
633+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
634+ - d/libstrongswan-extra-plugins.install: Remove plugins
635+ - d/libstrongswan.install: Add plugins
636+ + d/libstrongswan.install: Reorder conf and .so alphabetically
637+ + d/libstrongswan.install: Add kernel-netlink configuration files
638+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
639+ + Add updated logcheck rules
640+ - debian/libstrongswan.strongswan.logcheck.*: Remove outdated files
641+ - debian/strongswan.logcheck: Add updated logcheck rules
642+ + Add updated DEP8 tests
643+ - d/tests/*: Add DEP8 tests
644+ - d/control: Enable autotestpkg
645+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
646+ autopkgtest the bliss test takes longer than the default
647+ + Complete the disabling of libfast
648+ - Note: This was partially accepted in Debian, it is no more
649+ packaging medcli and medsrv, but still builds and mentions it
650+ - d/rules: Add --disable-fast to avoid build time and dependencies
651+ - d/control: Remove medcli, medsrv from package description
652+ * Dropped Changes:
653+ + Adding build-dep to iptables-dev (no change, was only in Changelog)
654+ + Dropping of build deps libfcgi-dev, clearsilver-dev (in Debian)
655+ + Adding strongswan-plugin-* virtual packages for dist-upgrade (no
656+ upgrade path left needing them)
657+ + Most of "disabling libfast" (Debian dropped it from package content)
658+ + Transition for ipsec service (no upgrade path left)
659+ + Reverted part of the cleanup to d/strongswan-starter.postinst as using
660+ service should rather use invoke-rc.d (so it is a partial revert of our
661+ delta)
662+ + Transition handling (breaks/replaces) from per-plugin packages to the
663+ three grouped plugin packages (no upgrade path left)
664+ + debian/strongswan-starter.dirs: Don't touch /etc/init.d. (while "correct"
665+ it is effectively a no-op still, so not worth the delta)
666+ + Lower dpkg-dev to 1.16.1 from 1.16.2 to enable backporting to Precise
667+ (no more needed)
668+ + d/rules: Remove configure option --enable-unit-test (unit tests run by
669+ default)
670+ * Added Changes:
671+ + Fix strongswan ipsec status issue with apparmor (LP: #1587886)
672+ + d/control, d/libstrongswan.install, d/libstrongswan-extra-plugins: Fixup
673+ the relocation of the ccm plugin which missed to move the conffiles.
674+ + Complete move of test-vectors (was missing in d/control)
675+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
676+ "only" to extra-plugins Mgf1 is not listed as default plugin at
677+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
678+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
679+ libstrongswan-extra-plugins.
680+ + Add missing mention of md4 plugin in d/control
681+ + Add missing mention of libchecksum integrity test in d/control
682+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
683+ missed that)
684+ + Use override_dh_strip to to fix library integrity checking instead of
685+ DEB_BUILD_OPTION to avoid overwriting user build flags.
686+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
687+ plugins for the most common use cases from extra-plugins into a new
688+ standard-plugins package. This will allow those use cases without pulling
689+ in too much more plugins (a bit like the tnc package). Recommend that
690+ package from strongswan-libcharon (LP: #1640826).
691+ + Fix Dep8 tests for the now extra strongswan-pki package for pki
692+ + Fix Dep8 tests for the now extra strongswan-scepclient package
693+
694+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 07 Nov 2016 16:16:41 +0100
695+
696 strongswan (5.5.1-1) unstable; urgency=medium
697
698 * New upstream bugfix release.
699@@ -280,6 +935,177 @@ strongswan (5.3.5-2) unstable; urgency=medium
700
701 -- Yves-Alexis Perez <corsac@debian.org> Mon, 14 Mar 2016 23:53:34 +0100
702
703+strongswan (5.3.5-1ubuntu4) yakkety; urgency=medium
704+
705+ * Build-depend on libjson-c-dev instead of libjson0-dev.
706+ * Rebuild against libjson-c3.
707+
708+ -- Graham Inggs <ginggs@ubuntu.com> Fri, 29 Apr 2016 19:04:22 +0200
709+
710+strongswan (5.3.5-1ubuntu3) xenial; urgency=medium
711+
712+ * Rebuild against libmysqlclient20.
713+
714+ -- Robie Basak <robie.basak@ubuntu.com> Tue, 05 Apr 2016 13:02:48 +0000
715+
716+strongswan (5.3.5-1ubuntu2) xenial; urgency=medium
717+
718+ * debian/tests/plugins: rdrand may or may not be loaded, depending on the
719+ cpu features.
720+
721+ -- Iain Lane <iain@orangesquash.org.uk> Mon, 22 Feb 2016 17:13:01 +0000
722+
723+strongswan (5.3.5-1ubuntu1) xenial; urgency=medium
724+
725+ * debian/{rules,control,libstrongswan-extra-plugins.install}
726+ Enable bliss plugin
727+ * debian/{rules,control,libstrongswan-extra-plugins.install}
728+ Enable chapoly plugin
729+ * debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch
730+ Upstream suggests to not load this plugin by default as it has
731+ some limitations.
732+ https://wiki.strongswan.org/projects/strongswan/wiki/Kernel-libipsec
733+ * debian/patches/increase-bliss-test-timeout.patch
734+ Under QEMU/KVM for autopkgtest bliss test takes a bit longer then default
735+ * Update Apparmor profiles
736+ - usr.lib.ipsec.charon
737+ - add capability audit_write for xauth-pam (LP: #1470277)
738+ - add capability dac_override (needed by agent plugin)
739+ - allow priv dropping (LP: #1333655)
740+ - allow caching CRLs (LP: #1505222)
741+ - allow rw access to /dev/net/tun for kernel-libipsec (LP: #1309594)
742+ - usr.lib.ipsec.stroke
743+ - allow priv dropping (LP: #1333655)
744+ - add local include
745+ - usr.lib.ipsec.lookip
746+ - add local include
747+ * Merge from Debian, which includes fixes for all previous CVEs
748+ Fixes (LP: #1330504, #1451091, #1448870, #1470277)
749+ Remaining changes:
750+ * debian/control
751+ - Lower dpkg-dev to 1.16.1 from 1.16.2 to enable backporting to Precise
752+ - Update Maintainer for Ubuntu
753+ - Add build-deps
754+ - dh-apparmor
755+ - iptables-dev
756+ - libjson0-dev
757+ - libldns-dev
758+ - libmysqlclient-dev
759+ - libpcsclite-dev
760+ - libsoup2.4-dev
761+ - libtspi-dev
762+ - libunbound-dev
763+ - Drop build-deps
764+ - libfcgi-dev
765+ - clearsilver-dev
766+ - Create virtual packages for all strongswan-plugin-* for dist-upgrade
767+ - Set XS-Testsuite: autopkgtest
768+ * debian/rules:
769+ - Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity checking.
770+ - Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths in
771+ tests.
772+ - Change init/systemd program name to strongswan
773+ - Install AppArmor profiles
774+ - Removed pieces on 'patching ipsec.conf' on build.
775+ - Enablement of features per Ubuntu current config suggested from
776+ upstream recommendation
777+ - Unpack and sort enabled features to one-per-line
778+ - Disable duplicheck as per
779+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
780+ - Disable libfast (--disable-fast):
781+ Requires dropping medsrv, medcli plugins which depend on libfast
782+ - Add configure options
783+ --with-tss=trousers
784+ - Remove configure options:
785+ --enable-ha (requires special kernel)
786+ --enable-unit-test (unit tests run by default)
787+ - Drop logcheck install
788+ * debian/tests/*
789+ - Add DEP8 test for strongswan service and plugins
790+ * debian/strongswan-starter.strongswan.service
791+ - Add new systemd file instead of patching upstream
792+ * debian/strongswan-starter.links
793+ - removed, use Ubuntu systemd file instead of linking to upstream
794+ * debian/usr.lib.ipsec.{charon, lookip, stroke}
795+ - added AppArmor profiles for charon, lookip and stroke
796+ * debian/libcharon-extra-plugins.install
797+ - Add plugins
798+ - kernel-libipsec.{so, lib, conf, apparmor}
799+ - Remove plugins
800+ - libstrongswan-ha.so
801+ - Relocate plugins
802+ - libstrongswan-tnc-tnccs.so (strongswan-tnc-base.install)
803+ * debian/libstrongswan-extra-plugins.install
804+ - Add plugins (so, lib, conf)
805+ - acert
806+ - attr-sql
807+ - coupling
808+ - dnscert
809+ - fips-prf
810+ - gmp
811+ - ipseckey
812+ - load-tester
813+ - mysql
814+ - ntru
815+ - radattr
816+ - soup
817+ - sqlite
818+ - sql
819+ - systime-fix
820+ - unbound
821+ - whitelist
822+ - Relocate plugins (so, lib, conf)
823+ - ccm (libstrongswan.install)
824+ - test-vectors (libstrongswan.install)
825+ * debian/libstrongswan.install
826+ - Sort sections
827+ - Add plugins (so, lib, conf)
828+ - libchecksum
829+ - ccm
830+ - eap-identity
831+ - md4
832+ - test-vectors
833+ * debian/strongswan-charon.install
834+ - Add AppArmor profile for charon
835+ * debian/strongswan-starter.install
836+ - Add tools, manpages, conf
837+ - openac
838+ - pool
839+ - _updown_espmark
840+ - Add AppArmor profile for stroke
841+ * debian/strongswan-tnc-base.install
842+ - Add new subpackage for TNC
843+ - remove non-existent (dropped in 5.2.1) libpts library files
844+ * debian/strongswan-tnc-client.install
845+ - Add new subpackage for TNC
846+ * debian/strongswan-tnc-ifmap.install
847+ - Add new subpackage for TNC
848+ * debian/strongswan-tnc-pdp.install
849+ - Add new subpackage for TNC
850+ * debian/strongswan-tnc-server.install
851+ - Add new subpackage for TNC
852+ * debian/strongswan-starter.postinit:
853+ - Removed section about runlevel changes, it's almost 2014.
854+ - Adapted service restart section for Upstart.
855+ - Remove old symlinks to init.d files is necessary.
856+ * debian/strongswan-starter.dirs: Don't touch /etc/init.d.
857+ * debian/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
858+ * debian/strongswan-starter.prerm: Stop strongswan service on package
859+ removal (as opposed to using the old init.d script).
860+ * debian/libstrongswan.strongswan.logcheck combined into debian/strongswan.logcheck
861+ - logcheck patterns updated to be helpful
862+ * debian/strongswan-starter.postinst: Removed further out-dated code and
863+ entire section on opportunistic encryption - this was never in strongSwan.
864+ * debian/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
865+ Drop changes:
866+ * debian/control
867+ - Per-plugin package breakup: Reducing packaging delta from Debian
868+ - Don't build dhcp, farp subpackages: Reduce packging delta from Debian
869+ * debian/watch: Already exists in Debian merge
870+ * debian/upstream/signing-key.asc: Upstream has newer version.
871+
872+ -- Ryan Harper <ryan.harper@canonical.com> Fri, 12 Feb 2016 11:24:53 -0600
873+
874 strongswan (5.3.5-1) unstable; urgency=medium
875
876 * New upstream bugfix release.
877@@ -552,6 +1378,210 @@ strongswan (5.1.2-1) unstable; urgency=medium
878
879 -- Yves-Alexis Perez <corsac@debian.org> Wed, 12 Mar 2014 11:22:38 +0100
880
881+strongswan (5.1.2-0ubuntu8) xenial; urgency=medium
882+
883+ * Import FTBFS for s390x from Debian 5.1.2-3 upload. (LP: #1521240)
884+
885+ -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 30 Nov 2015 15:46:06 +0000
886+
887+strongswan (5.1.2-0ubuntu7) xenial; urgency=medium
888+
889+ * SECURITY UPDATE: authentication bypass in eap-mschapv2 plugin
890+ - debian/patches/CVE-2015-8023.patch: only succeed authentication if
891+ MSK was established in
892+ src/libcharon/plugins/eap_mschapv2/eap_mschapv2.c.
893+ - CVE-2015-8023
894+ * debian/patches/disable_ntru_test.patch: disable test causing FTBFS
895+ until regression is properly investigated.
896+
897+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 19 Nov 2015 14:00:17 -0500
898+
899+strongswan (5.1.2-0ubuntu6) wily; urgency=medium
900+
901+ * SECURITY UPDATE: user credential disclosure to rogue servers
902+ - debian/patches/CVE-2015-4171.patch: enforce remote authentication
903+ config before proceeding with own authentication in
904+ src/libcharon/sa/ikev2/tasks/ike_auth.c.
905+ - CVE-2015-4171
906+ * debian/rules: don't FTBFS from unused service file
907+
908+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 08 Jun 2015 12:50:38 -0400
909+
910+strongswan (5.1.2-0ubuntu5) vivid; urgency=medium
911+
912+ * Add a systemd unit corresponding to strongswan-starter.strongswan.upstart.
913+
914+ -- Martin Pitt <martin.pitt@ubuntu.com> Fri, 16 Jan 2015 08:27:54 +0100
915+
916+strongswan (5.1.2-0ubuntu4) vivid; urgency=medium
917+
918+ * SECURITY UPDATE: denial of service via DH group 1025
919+ - debian/patches/CVE-2014-9221.patch: define MODP_CUSTOM outside of
920+ IKE DH range in src/libstrongswan/crypto/diffie_hellman.c,
921+ src/libstrongswan/crypto/diffie_hellman.h.
922+ - CVE-2014-9221
923+
924+ -- Tyler Hicks <tyhicks@canonical.com> Mon, 05 Jan 2015 08:25:29 -0500
925+
926+strongswan (5.1.2-0ubuntu3) utopic; urgency=low
927+
928+ * Added "libgcrypt20-dev | libgcrypt11-dev" to build dependencies to fix
929+ build.
930+
931+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 15 Oct 2014 16:49:18 +0000
932+
933+strongswan (5.1.2-0ubuntu2) trusty; urgency=medium
934+
935+ * SECURITY UPDATE: remote authentication bypass
936+ - debian/patches/CVE-2014-2338.patch: reject CREATE_CHILD_SA exchange
937+ on unestablished IKE_SAs in src/libcharon/sa/ikev2/task_manager_v2.c.
938+ - CVE-2014-2338
939+
940+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 14 Apr 2014 11:24:34 -0400
941+
942+strongswan (5.1.2-0ubuntu1) trusty; urgency=low
943+
944+ * New upstream release.
945+
946+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 01 Mar 2014 08:53:17 +0000
947+
948+strongswan (5.1.2~rc2-0ubuntu2) trusty; urgency=low
949+
950+ * debian/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
951+ * debian/usr.lib.ipsec.charon: Allow read access to /run/charon.
952+
953+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 19 Feb 2014 13:07:16 +0000
954+
955+strongswan (5.1.2~rc2-0ubuntu1) trusty; urgency=low
956+
957+ * New upstream release candidate.
958+
959+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 19 Feb 2014 12:59:21 +0000
960+
961+strongswan (5.1.2~rc1-0ubuntu4) trusty; urgency=medium
962+
963+ * debian/strongswan-tnc-*.install: Fixed files so libraries go into correct
964+ packages.
965+ * debian/usr.lib.ipsec.stroke: Allow access to strongswan.d directories.
966+
967+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 17 Feb 2014 18:12:38 +0000
968+
969+strongswan (5.1.2~rc1-0ubuntu3) trusty; urgency=low
970+
971+ * debian/rules: Exclude rdrand.conf in dh_install's --fail-missing.
972+
973+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:46:46 +0000
974+
975+strongswan (5.1.2~rc1-0ubuntu2) trusty; urgency=low
976+
977+ * debian/libstrongswan.install: Moved rdrand plugin configuration to rules
978+ as it's only useful on amd64.
979+ * debian/watch: Added opts=pgpsigurlmangle option.
980+ * debian/upstream/signing-key.asc: Added key: 0xB34DBA77.
981+
982+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:32:10 +0000
983+
984+strongswan (5.1.2~rc1-0ubuntu1) trusty; urgency=medium
985+
986+ * New upstream release candidate.
987+ * debian/*.install - include new configuration files for plugins in
988+ appropiate packages.
989+
990+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:03:14 +0000
991+
992+strongswan (5.1.2~dr3+git20130120-0ubuntu3) trusty; urgency=low
993+
994+ * debian/control:
995+ - Added Breaks/Replaces for all library files which have been moved
996+ about (LP: #1278176).
997+ - Removed build-dependency on check and added one on dh-apparmor.
998+ * debian/strongswan-starter.postinst: Removed further out-dated code and
999+ entire section on opportunistic encryption - this was never in strongSwan.
1000+ * debian/rules: Removed pieces on 'patching ipsec.conf' on build.
1001+
1002+ -- Jonathan Davies <jonathan.davies@canonical.com> Sun, 09 Feb 2014 23:53:23 +0000
1003+
1004+strongswan (5.1.2~dr3+git20130120-0ubuntu2) trusty; urgency=low
1005+
1006+ * debian/control: Fixed references to plugin-fips-prf.
1007+
1008+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 22 Jan 2014 11:22:14 +0000
1009+
1010+strongswan (5.1.2~dr3+git20130120-0ubuntu1) trusty; urgency=low
1011+
1012+ * Upstream Git snapshot for build fixes with regards to entropy.
1013+ * debian/rules:
1014+ - Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity checking.
1015+ - Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths in
1016+ tests.
1017+
1018+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 20 Jan 2014 19:00:59 +0000
1019+
1020+strongswan (5.1.2~dr3-0ubuntu1) trusty; urgency=low
1021+
1022+ * New upstream developer release.
1023+ * Made changes to packaging per upstream suggestions.
1024+ - Dropped medcli and medsrv packages - not recommended by upstream at this
1025+ time.
1026+ - Dropped ha plugin - needs special kernel.
1027+ - Improved all package descriptions in general.
1028+ - Drop build-dep on clearsilver-dev and libfcgi-dev - no longer needed.
1029+ - Removed debian/*logcheck* files - not relevant to strongSwan.
1030+ - Split dhcp and farp packages into sub-packages.
1031+ - Build kernel-libipsec, ntru, systime-fix, and xauth-noauth plugins.
1032+ - Changes to TNC-related packages.
1033+ * Created AppArmor profiles for lookip and stroke.
1034+
1035+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 15 Jan 2014 22:52:53 +0000
1036+
1037+strongswan (5.1.2~dr2+git20130106-0ubuntu2) trusty; urgency=low
1038+
1039+ * libstrongswan.install: Removed lingering unit-tester.so reference.
1040+
1041+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 06 Jan 2014 20:29:59 +0000
1042+
1043+strongswan (5.1.2~dr2+git20130106-0ubuntu1) trusty; urgency=low
1044+
1045+ * Git snapshot of commit 94e10f15e51ead788d9947e966878ebfdc95b7ce.
1046+ Incorporates upstream fixes for:
1047+ - Integrity testing.
1048+ - Unit test failures on little endian systems.
1049+ * Dropped debian/patches/02_test_asn1_fix_32bit_time_test.patch - fixed
1050+ upstream.
1051+ * debian/rules:
1052+ - Stop using CK_TIMEOUT_MULTIPLIER.
1053+ - Stop enabling the test suite only on non-powerpc arches (it runs
1054+ anyway).
1055+
1056+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 06 Jan 2014 20:17:20 +0000
1057+
1058+strongswan (5.1.2~dr2-0ubuntu3) trusty; urgency=low
1059+
1060+ * debian/control: Reinstate missing comma in dependencies.
1061+
1062+ -- Jonathan Davies <jonathan.davies@canonical.com> Fri, 03 Jan 2014 05:39:13 +0000
1063+
1064+strongswan (5.1.2~dr2-0ubuntu2) trusty; urgency=low
1065+
1066+ * Added debian/patches/02_test_asn1_fix_32bit_time_test.patch - fixes issue
1067+ where test for >2038 tests on 32-bit platforms is broken.
1068+ - Reported upstream: https://wiki.strongswan.org/issues/477
1069+ * debian/control: Added strongswan-plugin-ntru to strongswan-ike Suggests.
1070+
1071+ -- Jonathan Davies <jonathan.davies@canonical.com> Fri, 03 Jan 2014 05:02:32 +0000
1072+
1073+strongswan (5.1.2~dr2-0ubuntu1) trusty; urgency=low
1074+
1075+ * New upstream developer release.
1076+ * debian/rules: Configure with: --enable-af-alg, --enable-ntru, --enable-soup,
1077+ and --enable-unity.
1078+ * debian/control:
1079+ - New plugin packages created for the above
1080+ - Split fips-prf into its own package.
1081+ - Added build-dependency on libsoup2.4-dev.
1082+
1083+ -- Jonathan Davies <jonathan.davies@canonical.com> Thu, 02 Jan 2014 17:37:33 +0000
1084+
1085 strongswan (5.1.1-3) unstable; urgency=low
1086
1087 * Upload to unstable.
1088@@ -643,6 +1673,192 @@ strongswan (5.1.1-1) unstable; urgency=low
1089
1090 -- Yves-Alexis Perez <corsac@debian.org> Fri, 24 Jan 2014 21:22:32 +0100
1091
1092+strongswan (5.1.1-0ubuntu17) trusty; urgency=low
1093+
1094+ * debian/control:
1095+ - Make strongswan-ike depend on iproute2.
1096+ - Added xauth plugin dependency on strongswan-plugin-eap-gtc.
1097+ - Created strongswan-libfast package.
1098+
1099+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 01 Jan 2014 17:04:45 +0000
1100+
1101+strongswan (5.1.1-0ubuntu16) trusty; urgency=low
1102+
1103+ * debian/control:
1104+ - Further splitting of plugins into subpackages (such as all EAP plugins
1105+ to their own packages).
1106+ - Added libpcsclite-dev to build-dependencies.
1107+ * debian/rules:
1108+ - Sort configure options in alphabetical order.
1109+ - Added configure option of --enable-eap-aka-3gpp2, --enable-eap-dynamic,
1110+ --enable-eap-sim-file, --enable-eap-sim-pcsc,
1111+ --enable-eap-simaka-pseudonym, --enable-eap-simaka-reauth and
1112+ --enable-eap-simaka-sql.
1113+ - Don't exclude medsrv from install.
1114+ * Moved eap-identity.so to libstrongswan package as it's used by all the
1115+ other EAP plugins.
1116+
1117+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 21:25:50 +0000
1118+
1119+strongswan (5.1.1-0ubuntu15) trusty; urgency=low
1120+
1121+ * debian/control:
1122+ - Split plugins from libstrongswan package into modular subpackages.
1123+ - Added libmysqlclient-dev to build-dependencies.
1124+ - strongswan-ike: Set to depend on either strongswan-plugins-openssl or
1125+ strongswan-plugins-gcrypt.
1126+ - strongswan-ike: All other plugins added to Suggests.
1127+ - Created two new TNC packages: strongswan-tnc-ifmap and
1128+ strongswan-tnc-pdp and added to tnc-imcvs Suggests.
1129+ * debian/rules: Added to CONFIGUREARGS: --enable-certexpire,
1130+ --enable-error-notify, --enable-mysql, --enable-load-tester,
1131+ --enable-radattr, --enable-tnc-pdp, and --enable-whitelist.
1132+ * debian/strongswan-ike.install: Moved eap-identity.so to -tnc-imcvs package.
1133+
1134+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 16:15:32 +0000
1135+
1136+strongswan (5.1.1-0ubuntu14) trusty; urgency=low
1137+
1138+ * debian/rules:
1139+ - CK_TIMEOUT_MULTIPLIER back down to 6.
1140+ - Disable unit tests on powerpc.
1141+
1142+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:39:48 +0000
1143+
1144+strongswan (5.1.1-0ubuntu13) trusty; urgency=low
1145+
1146+ * debian/rules: CK_TIMEOUT_MULTIPLIER to 10 as just powerppc is being stubborn.
1147+
1148+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:23:42 +0000
1149+
1150+strongswan (5.1.1-0ubuntu12) trusty; urgency=low
1151+
1152+ * debian/rules: Bring CK_TIMEOUT_MULTIPLIER up to 6 to fix powerppc and
1153+ armhf.
1154+
1155+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:03:40 +0000
1156+
1157+strongswan (5.1.1-0ubuntu11) trusty; urgency=low
1158+
1159+ * 02_increase-test_rsa_generate-timeout.patch: Removed - only fixed build on
1160+ one extra arch.
1161+ * debian/rules: Set CK_TIMEOUT_MULTIPLIER to 4.
1162+
1163+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 06:51:47 +0000
1164+
1165+strongswan (5.1.1-0ubuntu10) trusty; urgency=low
1166+
1167+ * debian/patches: Added patch 02_increase-test_rsa_generate-timeout.patch -
1168+ - Increases RSA key generate test timeout to 30 seconds so that it doesn't
1169+ fail on armhf, arm64, and powerppc.
1170+ * Contrary to what the last changelog entry says, we are still running
1171+ strongswan as root (with AppArmor protection).
1172+
1173+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 06:06:47 +0000
1174+
1175+strongswan (5.1.1-0ubuntu9) trusty; urgency=low
1176+
1177+ * debian/rules: Added to configure options:
1178+ - --enable-tnc-ifmap: enable TNC IF-MAP module.
1179+ - --enable-duplicheck: enable duplicheck plugin.
1180+ - --enable-imv-swid, --enable-imc-swid: Added.
1181+ - Run strongswan as it's own user.
1182+ * debian/strongswan-starter.install: Install duplicheck.
1183+ * debian/strongswan-tnc-imcvs.install: Install swidtags.
1184+
1185+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 19:33:27 +0000
1186+
1187+strongswan (5.1.1-0ubuntu8) trusty; urgency=low
1188+
1189+ * debian/rules: Added to configure options:
1190+ - --enable-unit-tests: check unit testing on build.
1191+ - --enable-unbound: for validating DNS lookups.
1192+ - --enable-dnscert: for DNSCERT peer authentication.
1193+ - --enable-ipseckey: for IPSEC key authentication.
1194+ - --enable-lookip: for LookIP functionality.
1195+ - --enable-coupling: certificate coupling functionality.
1196+ * debian/control: Added check, libldns-dev, libunbound-dev to
1197+ build-dependencies.
1198+ * debian/libstrongswan.install: Install new plugin .so's.
1199+ * debian/strongswan-starter.install: Added lookip.
1200+
1201+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:52:07 +0000
1202+
1203+strongswan (5.1.1-0ubuntu7) trusty; urgency=low
1204+
1205+ * strongswan-starter.install: Moved pt-tls-client to tnc-imcvs (to prevent
1206+ the former from depending on the latter).
1207+
1208+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:30:19 +0000
1209+
1210+strongswan (5.1.1-0ubuntu6) trusty; urgency=low
1211+
1212+ * debian/strongswan-starter.prerm: Stop strongswan service on package
1213+ removal (as opposed to using the old init.d script).
1214+
1215+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:22:10 +0000
1216+
1217+strongswan (5.1.1-0ubuntu5) trusty; urgency=low
1218+
1219+ * debian/rules:
1220+ - CONFIGUREARGS: Merged Debian and RPM options.
1221+ - Brings in TNC functionality.
1222+ * debian/control:
1223+ - Added build-dependency on libtspi-dev.
1224+ - Created strongswan-tnc-imcvs binary package for TNC components.
1225+ - Added strongswan-tnc-imcvs to libstrongswan's Suggests.
1226+ * debian/libstrongswan.install:
1227+ - Included newly built MD4 and SQLite libraries.
1228+ - Removed 'tnc' references (moved to TNC package).
1229+ * debian/strongswan-tnc-imcvs.install: Created - handle new TNC libraries and
1230+ binaries.
1231+ * debian/usr.lib.ipsec.charon: Allow access to TNC modules.
1232+
1233+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 14:05:43 +0000
1234+
1235+strongswan (5.1.1-0ubuntu4) trusty; urgency=low
1236+
1237+ * debian/usr.lib.ipsec.charon: Added - AppArmor profile for charon.
1238+ * debian/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1239+ * debian/control: strongswan-ike - Stop depending on ipsec-tools.
1240+
1241+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 05:35:17 +0000
1242+
1243+strongswan (5.1.1-0ubuntu3) trusty; urgency=low
1244+
1245+ * strongswan-starter.strongswan.upstart - Only start strongSwan when a
1246+ network connection is available.
1247+ * debian/control: Downgrade build-dep version of dpkg-dev from 1.16.2 to
1248+ 1.16.1 - to make precise backporting easier.
1249+
1250+ -- Jonathan Davies <jonathan.davies@canonical.com> Thu, 12 Dec 2013 10:43:15 +0000
1251+
1252+strongswan (5.1.1-0ubuntu2) trusty; urgency=low
1253+
1254+ * strongswan-starter.strongswan.upstart - Created Upstart job for
1255+ strongSwan.
1256+ * debian/rules: Set dh_installinit to install above file.
1257+ * debian/strongswan-starter.postinit:
1258+ - Removed section about runlevel changes, it's almost 2014.
1259+ - Adapted service restart section for Upstart.
1260+ - Remove old symlinks to init.d files is necessary.
1261+ * debian/strongswan-starter.dirs: Don't touch /etc/init.d.
1262+
1263+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 11 Dec 2013 23:10:28 +0000
1264+
1265+strongswan (5.1.1-0ubuntu1) trusty; urgency=low
1266+
1267+ * New upstream release.
1268+ * Removed: debian/patches/CVE-2013-6075, CVE-2013-6076.patch - upsteamed.
1269+ * debian/control: Updated Standards-Version to 3.9.5 and applied
1270+ XSBC-Original-Maintainer policy.
1271+ * strongswan-starter.install:
1272+ - pki tool is now in /usr/bin.
1273+ - Install pt-tls-client.
1274+ - Install manpages (LP: #1206263).
1275+
1276+ -- Jonathan Davies <jpds@ubuntu.com> Sun, 01 Dec 2013 17:43:59 +0000
1277+
1278 strongswan (5.1.0-3) unstable; urgency=high
1279
1280 * urgency=high for the security fixes.
1281diff --git a/debian/control b/debian/control
1282index 4f12140..5792e50 100644
1283--- a/debian/control
1284+++ b/debian/control
1285@@ -1,7 +1,8 @@
1286 Source: strongswan
1287 Section: net
1288 Priority: optional
1289-Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org>
1290+Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
1291+XSBC-Original-Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org>
1292 Uploaders: Rene Mayrhofer <rmayr@debian.org>,
1293 Yves-Alexis Perez <corsac@debian.org>
1294 Standards-Version: 4.1.2
1295@@ -19,14 +20,21 @@ Build-Depends: bison,
1296 libcurl4-openssl-dev | libcurl3-dev | libcurl2-dev,
1297 libgcrypt20-dev | libgcrypt11-dev,
1298 libgmp3-dev,
1299+ libjson-c-dev,
1300 libkrb5-dev,
1301 libldap2-dev,
1302+ libldns-dev,
1303+ libmysqlclient-dev,
1304 libnm-dev [linux-any],
1305 libpam0g-dev,
1306+ libpcsclite-dev,
1307+ libsoup2.4-dev,
1308 libsqlite3-dev,
1309 libssl-dev (>= 0.9.8),
1310 libsystemd-dev [linux-any],
1311 libtool,
1312+ libtspi-dev,
1313+ libunbound-dev,
1314 libxml2-dev,
1315 pkg-config,
1316 po-debconf,
1317@@ -68,7 +76,9 @@ Description: strongSwan utility and crypto library
1318 - fips-prf (PRF specified by FIPS, used by EAP-SIM/AKA algorithms)
1319 - gmp (RSA/DH crypto backend based on libgmp)
1320 - hmac (HMAC wrapper using various hashers)
1321+ - md4 (MD4 hasher software implementation)
1322 - md5 (MD5 hasher software implementation)
1323+ - mgf1 (Mask Generation Functions based on the SHA-1, SHA-256 and SHA-512)
1324 - nonce (Default nonce generation plugin)
1325 - pem (PEM encoding/decoding routines)
1326 - pgp (PGP encoding/decoding routines)
1327@@ -131,22 +141,57 @@ Description: strongSwan utility and crypto library (extra plugins)
1328 cryptographic library.
1329 .
1330 Included plugins are:
1331+ - acert (Support of X.509 attribute certificates (since 5.1.3))
1332 - af-alg [linux] (AF_ALG Linux crypto API interface, provides
1333 ciphers/hashers/hmac/xcbc)
1334+ - attr-sql (provide IKE attributes read from a database to peers)
1335+ - bliss (Bimodal Lattice Signature Scheme (BLISS) post-quantum computer
1336+ signature scheme)
1337 - ccm (CCM cipher mode wrapper)
1338+ - chapoly (ChaCha20/Poly1305 AEAD implementation)
1339 - cmac (CMAC cipher mode wrapper)
1340 - ctr (CTR cipher mode wrapper)
1341+ - coupling (Permanent peer certificate coupling)
1342 - curl (libcurl based HTTP/FTP fetcher)
1343 - curve25519 (support for Diffie-Hellman group 31 using Curve25519 and
1344 support for the Ed25519 digital signature algorithm for IKEv2)
1345+ - dnscert (authentication via CERT RRs protected by DNSSEC)
1346 - gcrypt (Crypto backend based on libgcrypt, provides
1347 RSA/DH/ciphers/hashers/rng)
1348+ - ipseckey (authentication via IPSECKEY RRs protected by DNSSEC)
1349 - ldap (LDAP fetching plugin based on libldap)
1350+ - load-tester (perform IKE load tests against self or gateway)
1351+ - mysql (database backend)
1352+ - ntru (key exchanged based on post-quantum computer NTRU)
1353+ - nttfft (Number Theoretic Transform via the FFT algorithm)
1354 - padlock (VIA padlock crypto backend, provides AES128/SHA1)
1355 - pkcs11 (PKCS#11 smartcard backend)
1356+ - radattr (inject and process custom RADIUS attributes as IKEv2 client)
1357+ - sql (SQL configuration and creds engine)
1358+ - sqlite (SQLite database backend)
1359+ - soup (libsoup based HTTP fetcher)
1360+ - tpmtss (TPM 1.2 and TPM 2.0 Trusted Platform Modules)
1361 - rdrand (High quality / high performance random source using the Intel
1362 rdrand instruction found on Ivy Bridge processors)
1363 - test-vectors (Set of test vectors for various algorithms)
1364+ - unbound (DNSSEC enabled resolver using libunbound)
1365+ - whitelist (peer verification against a whitelist)
1366+
1367+Package: libcharon-standard-plugins
1368+Architecture: any
1369+Depends: libstrongswan (= ${binary:Version}),
1370+ ${misc:Depends},
1371+ ${shlibs:Depends}
1372+Breaks: libcharon-extra-plugins (<< 5.5.1-1ubuntu1~)
1373+Replaces: libcharon-extra-plugins (<< 5.5.1-1ubuntu1~)
1374+Description: strongSwan charon library (standard plugins)
1375+ The strongSwan VPN suite uses the native IPsec stack in the standard
1376+ Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
1377+ .
1378+ This package provides standard plugins for the charon library:
1379+ - eap-mschapv2 (EAP-MSCHAPv2 protocol handler using passwords/NT hashes)
1380+ - xauth-generic (Generic XAuth backend that provides passwords from
1381+ ipsec.secrets and other credential sets)
1382
1383 Package: libcharon-extra-plugins
1384 Architecture: any
1385@@ -162,13 +207,13 @@ Description: strongSwan charon library (extra plugins)
1386 This package provides extra plugins for the charon library:
1387 - addrblock (Narrow traffic selectors to RFC 3779 address blocks in X.509
1388 certificates)
1389+ - dhcp (Forwarding of DHCP requests for virtual IPs to DHCP server)
1390 - certexpire (Export expiration dates of used certificates)
1391 - eap-aka (Generic EAP-AKA protocol handler using different backends)
1392 - eap-gtc (EAP-GTC protocol handler authenticating with XAuth backends)
1393 - eap-identity (EAP-Identity identity exchange algorithm, to use with other
1394 EAP protocols)
1395 - eap-md5 (EAP-MD5 protocol handler using passwords)
1396- - eap-mschapv2 (EAP-MSCHAPv2 protocol handler using passwords/NT hashes)
1397 - eap-radius (EAP server proxy plugin forwarding EAP conversations to a
1398 RADIUS server)
1399 - eap-tls (EAP-TLS protocol handler, to authenticate with certificates in
1400@@ -176,17 +221,25 @@ Description: strongSwan charon library (extra plugins)
1401 - eap-tnc (EAP-TNC protocol handler, Trusted Network Connect in a TLS tunnel)
1402 - eap-ttls (EAP-TTLS protocol handler, wraps other EAP methods securely)
1403 - error-notify (Notification about errors via UNIX socket)
1404+ - farp (fake ARP responses for requests to virtual IP address)
1405 - ha (High-Availability clustering)
1406+ - kernel-libipsec (Userspace IPsec Backend with TUN devices)
1407 - led (Let Linux LED subsystem LEDs blink on IKE activity)
1408 - lookip (Virtual IP lookup facility using a UNIX socket)
1409- - medcli (Web interface based mediation client interface)
1410- - medsrv (Web interface based mediation server interface)
1411 - tnc (Trusted Network Connect)
1412 - unity (Cisco Unity extensions for IKEv1)
1413 - xauth-eap (XAuth backend that uses EAP methods to verify passwords)
1414- - xauth-generic (Generic XAuth backend that provides passwords from
1415- ipsec.secrets and other credential sets)
1416 - xauth-pam (XAuth backend that uses PAM modules to verify passwords)
1417+ - eap-aka-3gpp2 (EAP-AKA backend implementing standard 3GPP2 algorithm in software)
1418+ - eap-dynamic (EAP proxy plugin that dynamically selects an EAP method requested/supported by the client (since 5.0.1))
1419+ - eap-peap (EAP-PEAP protocol handler, wraps other EAP methods securely)
1420+ - eap-sim (Generic EAP-SIM protocol handler using different backends)
1421+ - eap-sim-file (EAP-SIM backend reading triplets from a file)
1422+ - eap-sim-pcsc (EAP-SIM backend based on a PC/SC smartcard reader)
1423+ - eap-simaka-pseudonym (EAP-SIM/AKA in-memory pseudonym identity database)
1424+ - eap-simaka-reauth (EAP-SIM/AKA in-memory reauthentication identity database)
1425+ - eap-simaka-sql (EAP-SIM/AKA backend reading triplets/quintuplets from a SQL database)
1426+ - xauth-noauth (XAuth backend that does not do any authentication (since 5.0.3))
1427
1428 Package: strongswan-starter
1429 Architecture: any
1430@@ -212,6 +265,7 @@ Depends: libstrongswan (= ${binary:Version}),
1431 ${shlibs:Depends}
1432 Breaks: strongswan-starter (<= 5.6.1-2)
1433 Replaces: strongswan-starter (<= 5.6.1-2)
1434+Recommends: libcharon-standard-plugins
1435 Suggests: libcharon-extra-plugins
1436 Description: strongSwan charon library
1437 The strongSwan VPN suite uses the native IPsec stack in the standard
1438@@ -255,6 +309,68 @@ Description: strongSwan plugin to interact with NetworkManager
1439 in conjunction with the network-manager-strongswan package, providing
1440 a simple graphical frontend to configure IPsec based VPNs.
1441
1442+Package: strongswan-tnc-ifmap
1443+Architecture: any
1444+Depends: ${shlibs:Depends}, ${misc:Depends}, libstrongswan (= ${binary:Version})
1445+Description: strongSwan plugin for Trusted Network Connect's (TNC) IF-MAP client
1446+ The strongSwan VPN suite uses the native IPsec stack in the standard
1447+ Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
1448+ .
1449+ This package provides Trusted Network Connect's (TNC) IF-MAP 2.0 client.
1450+
1451+Package: strongswan-tnc-base
1452+Architecture: any
1453+Depends: ${shlibs:Depends}, ${misc:Depends}, libstrongswan (= ${binary:Version})
1454+Suggests: strongswan-tnc-ifmap, strongswan-tnc-pdp
1455+Description: strongSwan Trusted Network Connect's (TNC) - base files
1456+ The strongSwan VPN suite uses the native IPsec stack in the standard
1457+ Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
1458+ .
1459+ This package provides the base files for strongSwan's Trusted Network
1460+ Connect's (TNC) functionality.
1461+ .
1462+ strongSwan's IMC/IMV dynamic libraries can be used by any third party TNC
1463+ client/server implementation possessing a standard IF-IMC/IMV interface.
1464+
1465+Package: strongswan-tnc-client
1466+Architecture: any
1467+Depends: ${shlibs:Depends}, ${misc:Depends},
1468+ libstrongswan (= ${binary:Version}), strongswan-tnc-base (= ${binary:Version})
1469+Suggests: libcharon-extra-plugins
1470+Description: strongSwan Trusted Network Connect's (TNC) - client files
1471+ The strongSwan VPN suite uses the native IPsec stack in the standard
1472+ Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
1473+ .
1474+ This package provides the client functionality for strongSwan's Trusted Network
1475+ Connect's (TNC) features.
1476+ .
1477+ It includes the OS, scanner, test, SWID, and attestation IMCs.
1478+
1479+Package: strongswan-tnc-server
1480+Architecture: any
1481+Depends: ${shlibs:Depends}, ${misc:Depends},
1482+ libstrongswan (= ${binary:Version}),
1483+ strongswan-tnc-base (= ${binary:Version}),
1484+ libstrongswan-extra-plugins (= ${binary:Version})
1485+Description: strongSwan Trusted Network Connect's (TNC) - server files
1486+ The strongSwan VPN suite uses the native IPsec stack in the standard
1487+ Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
1488+ .
1489+ This package provides the server functionality for strongSwan's Trusted Network
1490+ Connect's (TNC) features.
1491+
1492+Package: strongswan-tnc-pdp
1493+Architecture: any
1494+Depends: ${shlibs:Depends}, ${misc:Depends},
1495+ libstrongswan (= ${binary:Version}),
1496+ strongswan-tnc-server (= ${binary:Version})
1497+Description: strongSwan plugin for Trusted Network Connect's (TNC) PDP
1498+ The strongSwan VPN suite uses the native IPsec stack in the standard
1499+ Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
1500+ .
1501+ This package provides Trusted Network Connect's (TNC) Policy Decision Point
1502+ (PDP) with RADIUS server interface.
1503+
1504 Package: charon-cmd
1505 Architecture: any
1506 Depends: libstrongswan (= ${binary:Version}),
1507diff --git a/debian/ipsec.secrets.proto b/debian/ipsec.secrets.proto
1508index dfa6dde..309e3fc 100644
1509--- a/debian/ipsec.secrets.proto
1510+++ b/debian/ipsec.secrets.proto
1511@@ -3,6 +3,3 @@
1512 # RSA private key for this host, authenticating it to any other host
1513 # which knows the public part.
1514
1515-# this file is managed with debconf and will contain the automatically created private key
1516-include /var/lib/strongswan/ipsec.secrets.inc
1517-
1518diff --git a/debian/libcharon-extra-plugins.install b/debian/libcharon-extra-plugins.install
1519index 1b0cbca..cb539ec 100644
1520--- a/debian/libcharon-extra-plugins.install
1521+++ b/debian/libcharon-extra-plugins.install
1522@@ -1,50 +1,102 @@
1523 # libcharon plugins
1524 usr/lib/ipsec/plugins/libstrongswan-addrblock.so
1525 usr/lib/ipsec/plugins/libstrongswan-certexpire.so
1526-usr/lib/ipsec/plugins/libstrongswan-eap*.so
1527+usr/lib/ipsec/plugins/libstrongswan-eap-aka-3gpp2.so
1528+usr/lib/ipsec/plugins/libstrongswan-eap-aka.so
1529+usr/lib/ipsec/plugins/libstrongswan-eap-dynamic.so
1530+usr/lib/ipsec/plugins/libstrongswan-eap-gtc.so
1531+usr/lib/ipsec/plugins/libstrongswan-eap-identity.so
1532+usr/lib/ipsec/plugins/libstrongswan-eap-md5.so
1533+usr/lib/ipsec/plugins/libstrongswan-eap-peap.so
1534+usr/lib/ipsec/plugins/libstrongswan-eap-radius.so
1535+usr/lib/ipsec/plugins/libstrongswan-eap-sim-file.so
1536+usr/lib/ipsec/plugins/libstrongswan-eap-sim-pcsc.so
1537+usr/lib/ipsec/plugins/libstrongswan-eap-sim.so
1538+usr/lib/ipsec/plugins/libstrongswan-eap-simaka-pseudonym.so
1539+usr/lib/ipsec/plugins/libstrongswan-eap-simaka-reauth.so
1540+usr/lib/ipsec/plugins/libstrongswan-eap-simaka-sql.so
1541+usr/lib/ipsec/plugins/libstrongswan-eap-tls.so
1542+usr/lib/ipsec/plugins/libstrongswan-eap-tnc.so
1543+usr/lib/ipsec/plugins/libstrongswan-eap-ttls.so
1544 usr/lib/ipsec/plugins/libstrongswan-error-notify.so
1545 usr/lib/ipsec/plugins/libstrongswan-ha.so
1546+usr/lib/ipsec/plugins/libstrongswan-kernel-libipsec.so
1547 usr/lib/ipsec/plugins/libstrongswan-led.so
1548 usr/lib/ipsec/plugins/libstrongswan-lookip.so
1549 #usr/lib/ipsec/plugins/libstrongswan-medsrv.so
1550 #usr/lib/ipsec/plugins/libstrongswan-medcli.so
1551-usr/lib/ipsec/plugins/libstrongswan-tnc-tnccs.so
1552 usr/lib/ipsec/plugins/libstrongswan-unity.so
1553-usr/lib/ipsec/plugins/libstrongswan-xauth-*.so
1554+usr/lib/ipsec/plugins/libstrongswan-xauth-eap.so
1555+usr/lib/ipsec/plugins/libstrongswan-xauth-noauth.so
1556+usr/lib/ipsec/plugins/libstrongswan-xauth-pam.so
1557 # standard configuration files
1558 usr/share/strongswan/templates/config/plugins/addrblock.conf
1559 usr/share/strongswan/templates/config/plugins/certexpire.conf
1560-usr/share/strongswan/templates/config/plugins/eap-*.conf
1561+usr/share/strongswan/templates/config/plugins/eap-aka-3gpp2.conf
1562+usr/share/strongswan/templates/config/plugins/eap-aka.conf
1563+usr/share/strongswan/templates/config/plugins/eap-dynamic.conf
1564+usr/share/strongswan/templates/config/plugins/eap-gtc.conf
1565+usr/share/strongswan/templates/config/plugins/eap-identity.conf
1566+usr/share/strongswan/templates/config/plugins/eap-md5.conf
1567+usr/share/strongswan/templates/config/plugins/eap-peap.conf
1568+usr/share/strongswan/templates/config/plugins/eap-radius.conf
1569+usr/share/strongswan/templates/config/plugins/eap-sim-file.conf
1570+usr/share/strongswan/templates/config/plugins/eap-sim-pcsc.conf
1571+usr/share/strongswan/templates/config/plugins/eap-sim.conf
1572+usr/share/strongswan/templates/config/plugins/eap-simaka-pseudonym.conf
1573+usr/share/strongswan/templates/config/plugins/eap-simaka-reauth.conf
1574+usr/share/strongswan/templates/config/plugins/eap-simaka-sql.conf
1575+usr/share/strongswan/templates/config/plugins/eap-tls.conf
1576+usr/share/strongswan/templates/config/plugins/eap-tnc.conf
1577+usr/share/strongswan/templates/config/plugins/eap-ttls.conf
1578 usr/share/strongswan/templates/config/plugins/error-notify.conf
1579 usr/share/strongswan/templates/config/plugins/ha.conf
1580+usr/share/strongswan/templates/config/plugins/kernel-libipsec.conf
1581 usr/share/strongswan/templates/config/plugins/led.conf
1582 usr/share/strongswan/templates/config/plugins/lookip.conf
1583 #usr/share/strongswan/templates/config/plugins/medsrv.conf
1584 #usr/share/strongswan/templates/config/plugins/medcli.conf
1585-usr/share/strongswan/templates/config/plugins/tnc-tnccs.conf
1586 usr/share/strongswan/templates/config/plugins/unity.conf
1587-usr/share/strongswan/templates/config/plugins/xauth-*.conf
1588-usr/share/strongswan/templates/config/strongswan.d/tnc.conf
1589-etc/strongswan.d/tnc.conf
1590+usr/share/strongswan/templates/config/plugins/xauth-eap.conf
1591+usr/share/strongswan/templates/config/plugins/xauth-noauth.conf
1592+usr/share/strongswan/templates/config/plugins/xauth-pam.conf
1593 etc/strongswan.d/charon/addrblock.conf
1594 etc/strongswan.d/charon/certexpire.conf
1595-etc/strongswan.d/charon/eap-*.conf
1596+etc/strongswan.d/charon/eap-aka-3gpp2.conf
1597+etc/strongswan.d/charon/eap-aka.conf
1598+etc/strongswan.d/charon/eap-dynamic.conf
1599+etc/strongswan.d/charon/eap-gtc.conf
1600+etc/strongswan.d/charon/eap-identity.conf
1601+etc/strongswan.d/charon/eap-md5.conf
1602+etc/strongswan.d/charon/eap-peap.conf
1603+etc/strongswan.d/charon/eap-radius.conf
1604+etc/strongswan.d/charon/eap-sim-file.conf
1605+etc/strongswan.d/charon/eap-sim-pcsc.conf
1606+etc/strongswan.d/charon/eap-sim.conf
1607+etc/strongswan.d/charon/eap-simaka-pseudonym.conf
1608+etc/strongswan.d/charon/eap-simaka-reauth.conf
1609+etc/strongswan.d/charon/eap-simaka-sql.conf
1610+etc/strongswan.d/charon/eap-tls.conf
1611+etc/strongswan.d/charon/eap-tnc.conf
1612+etc/strongswan.d/charon/eap-ttls.conf
1613 etc/strongswan.d/charon/error-notify.conf
1614 etc/strongswan.d/charon/ha.conf
1615+etc/strongswan.d/charon/kernel-libipsec.conf
1616 etc/strongswan.d/charon/led.conf
1617 etc/strongswan.d/charon/lookip.conf
1618 #etc/strongswan.d/charon/medsrv.conf
1619 #etc/strongswan.d/charon/medcli.conf
1620-etc/strongswan.d/charon/tnc-tnccs.conf
1621 etc/strongswan.d/charon/unity.conf
1622-etc/strongswan.d/charon/xauth-*.conf
1623+etc/strongswan.d/charon/xauth-eap.conf
1624+etc/strongswan.d/charon/xauth-noauth.conf
1625+etc/strongswan.d/charon/xauth-pam.conf
1626 debian/usr.lib.ipsec.lookip /etc/apparmor.d/
1627 # support libs
1628 #usr/lib/ipsec/libfast.so*
1629+usr/lib/ipsec/libipsec.so*
1630 usr/lib/ipsec/libpttls.so*
1631 usr/lib/ipsec/libradius.so*
1632 usr/lib/ipsec/libsimaka.so*
1633-usr/lib/ipsec/libtnccs.so*
1634 usr/lib/ipsec/libtls.so*
1635 # binaries
1636 usr/bin/pt-tls-client
1637diff --git a/debian/libcharon-standard-plugins.install b/debian/libcharon-standard-plugins.install
1638new file mode 100644
1639index 0000000..25e580c
1640--- /dev/null
1641+++ b/debian/libcharon-standard-plugins.install
1642@@ -0,0 +1,19 @@
1643+# most commonly used libcharon plugins
1644+# 1) eap-mschapv2 is required on the client side to connect to VPN
1645+# concentrators configured for Windows 7+ and modern OSX/iOS using IKEv2.
1646+# In such scenario, the VPN concentrator identifies itself with a public
1647+# key and asks the client to authenticate with MSCHAPv2.
1648+# 2) xauth-generic is required on the client side to connect to VPN
1649+# concentrators configured for Android and older OSX/iOS using IKEv1 and
1650+# XAUTH. In such scenario, the VPN concentrator identifies itself with a
1651+# public key or a shared secret and asks the client to authenticate with a
1652+# XAUTH password.
1653+# plugins
1654+usr/lib/ipsec/plugins/libstrongswan-eap-mschapv2.so
1655+usr/lib/ipsec/plugins/libstrongswan-xauth-generic.so
1656+# config templates
1657+usr/share/strongswan/templates/config/plugins/eap-mschapv2.conf
1658+usr/share/strongswan/templates/config/plugins/xauth-generic.conf
1659+# configuration files
1660+etc/strongswan.d/charon/eap-mschapv2.conf
1661+etc/strongswan.d/charon/xauth-generic.conf
1662diff --git a/debian/libstrongswan-extra-plugins.install b/debian/libstrongswan-extra-plugins.install
1663index cfa5978..4cd01d4 100644
1664--- a/debian/libstrongswan-extra-plugins.install
1665+++ b/debian/libstrongswan-extra-plugins.install
1666@@ -1,37 +1,95 @@
1667 # Tool for TPM PCR extension
1668 usr/bin/tpm_extendpcr
1669 # libstrongswan plugins
1670+usr/lib/ipsec/plugins/libstrongswan-acert.so
1671+usr/lib/ipsec/plugins/libstrongswan-attr-sql.so
1672+usr/lib/ipsec/plugins/libstrongswan-bliss.so
1673 usr/lib/ipsec/plugins/libstrongswan-ccm.so
1674+usr/lib/ipsec/plugins/libstrongswan-chapoly.so
1675 usr/lib/ipsec/plugins/libstrongswan-cmac.so
1676+usr/lib/ipsec/plugins/libstrongswan-coupling.so
1677 usr/lib/ipsec/plugins/libstrongswan-ctr.so
1678 usr/lib/ipsec/plugins/libstrongswan-curl.so
1679 usr/lib/ipsec/plugins/libstrongswan-curve25519.so
1680+usr/lib/ipsec/plugins/libstrongswan-dnscert.so
1681 usr/lib/ipsec/plugins/libstrongswan-gcrypt.so
1682+usr/lib/ipsec/plugins/libstrongswan-ipseckey.so
1683 usr/lib/ipsec/plugins/libstrongswan-ldap.so
1684+usr/lib/ipsec/plugins/libstrongswan-load-tester.so
1685+usr/lib/ipsec/plugins/libstrongswan-mysql.so
1686+usr/lib/ipsec/plugins/libstrongswan-ntru.so
1687 usr/lib/ipsec/plugins/libstrongswan-pkcs11.so
1688+usr/lib/ipsec/plugins/libstrongswan-radattr.so
1689+usr/lib/ipsec/plugins/libstrongswan-soup.so
1690+usr/lib/ipsec/plugins/libstrongswan-sqlite.so
1691+usr/lib/ipsec/plugins/libstrongswan-sql.so
1692+usr/lib/ipsec/plugins/libstrongswan-systime-fix.so
1693 usr/lib/ipsec/plugins/libstrongswan-test-vectors.so
1694 usr/lib/ipsec/plugins/libstrongswan-tpm.so
1695+usr/lib/ipsec/plugins/libstrongswan-unbound.so
1696+usr/lib/ipsec/plugins/libstrongswan-whitelist.so
1697 # default configuration files
1698+usr/share/strongswan/templates/config/plugins/acert.conf
1699+usr/share/strongswan/templates/config/plugins/attr-sql.conf
1700+usr/share/strongswan/templates/config/plugins/bliss.conf
1701 usr/share/strongswan/templates/config/plugins/ccm.conf
1702+usr/share/strongswan/templates/config/plugins/chapoly.conf
1703 usr/share/strongswan/templates/config/plugins/cmac.conf
1704+usr/share/strongswan/templates/config/plugins/coupling.conf
1705 usr/share/strongswan/templates/config/plugins/ctr.conf
1706 usr/share/strongswan/templates/config/plugins/curl.conf
1707 usr/share/strongswan/templates/config/plugins/curve25519.conf
1708+usr/share/strongswan/templates/config/plugins/dnscert.conf
1709 usr/share/strongswan/templates/config/plugins/gcrypt.conf
1710+usr/share/strongswan/templates/config/plugins/ipseckey.conf
1711 usr/share/strongswan/templates/config/plugins/ldap.conf
1712+usr/share/strongswan/templates/config/plugins/load-tester.conf
1713+usr/share/strongswan/templates/config/plugins/mysql.conf
1714+usr/share/strongswan/templates/config/plugins/ntru.conf
1715 usr/share/strongswan/templates/config/plugins/pkcs11.conf
1716+usr/share/strongswan/templates/config/plugins/radattr.conf
1717+usr/share/strongswan/templates/config/plugins/soup.conf
1718+usr/share/strongswan/templates/config/plugins/sql.conf
1719+usr/share/strongswan/templates/config/plugins/sqlite.conf
1720+usr/share/strongswan/templates/config/plugins/systime-fix.conf
1721 usr/share/strongswan/templates/config/plugins/test-vectors.conf
1722 usr/share/strongswan/templates/config/plugins/tpm.conf
1723+usr/share/strongswan/templates/config/plugins/unbound.conf
1724+usr/share/strongswan/templates/config/plugins/whitelist.conf
1725+usr/share/strongswan/templates/database/sql/mysql.sql
1726+usr/share/strongswan/templates/database/sql/sqlite.sql
1727+etc/strongswan.d/charon/acert.conf
1728+etc/strongswan.d/charon/attr-sql.conf
1729+etc/strongswan.d/charon/bliss.conf
1730 etc/strongswan.d/charon/ccm.conf
1731+etc/strongswan.d/charon/chapoly.conf
1732 etc/strongswan.d/charon/cmac.conf
1733+etc/strongswan.d/charon/coupling.conf
1734 etc/strongswan.d/charon/ctr.conf
1735 etc/strongswan.d/charon/curl.conf
1736 etc/strongswan.d/charon/curve25519.conf
1737+etc/strongswan.d/charon/dnscert.conf
1738 etc/strongswan.d/charon/gcrypt.conf
1739+etc/strongswan.d/charon/ipseckey.conf
1740 etc/strongswan.d/charon/ldap.conf
1741+etc/strongswan.d/charon/load-tester.conf
1742+etc/strongswan.d/charon/mysql.conf
1743+etc/strongswan.d/charon/ntru.conf
1744 etc/strongswan.d/charon/pkcs11.conf
1745+etc/strongswan.d/charon/radattr.conf
1746+etc/strongswan.d/charon/soup.conf
1747+etc/strongswan.d/charon/sql.conf
1748+etc/strongswan.d/charon/sqlite.conf
1749+etc/strongswan.d/charon/systime-fix.conf
1750 etc/strongswan.d/charon/test-vectors.conf
1751 etc/strongswan.d/charon/tpm.conf
1752 # TPM libs
1753 usr/lib/ipsec/libtpmtss.so.*
1754 usr/lib/ipsec/libtpmtss.so
1755+etc/strongswan.d/charon/unbound.conf
1756+etc/strongswan.d/charon/whitelist.conf
1757+usr/lib/ipsec/load-tester
1758+usr/lib/ipsec/whitelist
1759+# support libs
1760+usr/lib/ipsec/libtpmtss.so*
1761+usr/lib/ipsec/libnttfft.so*
1762diff --git a/debian/libstrongswan.install b/debian/libstrongswan.install
1763index 072ff7e..5d458bb 100644
1764--- a/debian/libstrongswan.install
1765+++ b/debian/libstrongswan.install
1766@@ -6,15 +6,16 @@ usr/lib/ipsec/plugins/libstrongswan-dnskey.so
1767 usr/lib/ipsec/plugins/libstrongswan-fips-prf.so
1768 usr/lib/ipsec/plugins/libstrongswan-gmp.so
1769 usr/lib/ipsec/plugins/libstrongswan-hmac.so
1770+usr/lib/ipsec/plugins/libstrongswan-md4.so
1771 usr/lib/ipsec/plugins/libstrongswan-md5.so
1772 usr/lib/ipsec/plugins/libstrongswan-mgf1.so
1773 usr/lib/ipsec/plugins/libstrongswan-nonce.so
1774-usr/lib/ipsec/plugins/libstrongswan-pgp.so
1775 usr/lib/ipsec/plugins/libstrongswan-pem.so
1776+usr/lib/ipsec/plugins/libstrongswan-pgp.so
1777 usr/lib/ipsec/plugins/libstrongswan-pkcs1.so
1778+usr/lib/ipsec/plugins/libstrongswan-pkcs12.so
1779 usr/lib/ipsec/plugins/libstrongswan-pkcs7.so
1780 usr/lib/ipsec/plugins/libstrongswan-pkcs8.so
1781-usr/lib/ipsec/plugins/libstrongswan-pkcs12.so
1782 usr/lib/ipsec/plugins/libstrongswan-pubkey.so
1783 usr/lib/ipsec/plugins/libstrongswan-random.so
1784 usr/lib/ipsec/plugins/libstrongswan-rc2.so
1785@@ -31,15 +32,17 @@ usr/share/strongswan/templates/config/plugins/dnskey.conf
1786 usr/share/strongswan/templates/config/plugins/fips-prf.conf
1787 usr/share/strongswan/templates/config/plugins/gmp.conf
1788 usr/share/strongswan/templates/config/plugins/hmac.conf
1789+usr/share/strongswan/templates/config/plugins/kernel-netlink.conf
1790+usr/share/strongswan/templates/config/plugins/md4.conf
1791 usr/share/strongswan/templates/config/plugins/md5.conf
1792 usr/share/strongswan/templates/config/plugins/mgf1.conf
1793 usr/share/strongswan/templates/config/plugins/nonce.conf
1794-usr/share/strongswan/templates/config/plugins/pgp.conf
1795 usr/share/strongswan/templates/config/plugins/pem.conf
1796+usr/share/strongswan/templates/config/plugins/pgp.conf
1797 usr/share/strongswan/templates/config/plugins/pkcs1.conf
1798+usr/share/strongswan/templates/config/plugins/pkcs12.conf
1799 usr/share/strongswan/templates/config/plugins/pkcs7.conf
1800 usr/share/strongswan/templates/config/plugins/pkcs8.conf
1801-usr/share/strongswan/templates/config/plugins/pkcs12.conf
1802 usr/share/strongswan/templates/config/plugins/pubkey.conf
1803 usr/share/strongswan/templates/config/plugins/random.conf
1804 usr/share/strongswan/templates/config/plugins/rc2.conf
1805@@ -55,15 +58,17 @@ etc/strongswan.d/charon/dnskey.conf
1806 etc/strongswan.d/charon/fips-prf.conf
1807 etc/strongswan.d/charon/gmp.conf
1808 etc/strongswan.d/charon/hmac.conf
1809+etc/strongswan.d/charon/kernel-netlink.conf
1810+etc/strongswan.d/charon/md4.conf
1811 etc/strongswan.d/charon/md5.conf
1812 etc/strongswan.d/charon/mgf1.conf
1813 etc/strongswan.d/charon/nonce.conf
1814-etc/strongswan.d/charon/pgp.conf
1815 etc/strongswan.d/charon/pem.conf
1816+etc/strongswan.d/charon/pgp.conf
1817+etc/strongswan.d/charon/pkcs12.conf
1818 etc/strongswan.d/charon/pkcs1.conf
1819 etc/strongswan.d/charon/pkcs7.conf
1820 etc/strongswan.d/charon/pkcs8.conf
1821-etc/strongswan.d/charon/pkcs12.conf
1822 etc/strongswan.d/charon/pubkey.conf
1823 etc/strongswan.d/charon/random.conf
1824 etc/strongswan.d/charon/rc2.conf
1825diff --git a/debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch b/debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch
1826new file mode 100644
1827index 0000000..004b50b
1828--- /dev/null
1829+++ b/debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch
1830@@ -0,0 +1,11 @@
1831+--- a/conf/plugins/kernel-libipsec.conf
1832++++ b/conf/plugins/kernel-libipsec.conf
1833+@@ -5,7 +5,7 @@
1834+
1835+ # Whether to load the plugin. Can also be an integer to increase the
1836+ # priority of this plugin.
1837+- load = yes
1838++ load = no
1839+
1840+ }
1841+
1842diff --git a/debian/patches/series b/debian/patches/series
1843index fde45f5..c72895f 100644
1844--- a/debian/patches/series
1845+++ b/debian/patches/series
1846@@ -2,3 +2,4 @@
1847 02_disable-bypass-lan.patch
1848 03_systemd-service.patch
1849 04_disable-libtls-tests.patch
1850+dont-load-kernel-libipsec-plugin-by-default.patch
1851diff --git a/debian/rules b/debian/rules
1852index d1dbf8a..d3450c7 100755
1853--- a/debian/rules
1854+++ b/debian/rules
1855@@ -4,20 +4,36 @@ export DEB_LDFLAGS_MAINT_APPEND=-Wl,--as-needed -Wl,-O1
1856 export DEB_BUILD_MAINT_OPTIONS=hardening=+all
1857
1858 CONFIGUREARGS := --libdir=/usr/lib --libexecdir=/usr/lib \
1859+ --with-tss=trousers \
1860+ --enable-acert \
1861 --enable-addrblock \
1862 --enable-agent \
1863 --enable-bypass-lan \
1864+ --enable-attr-sql \
1865+ --enable-bliss \
1866 --enable-ccm \
1867 --enable-certexpire \
1868+ --enable-chapoly \
1869 --enable-cmd \
1870+ --enable-coupling \
1871 --enable-ctr \
1872 --enable-curl \
1873+ --enable-dnscert \
1874 --enable-eap-aka \
1875+ --enable-eap-aka-3gpp2 \
1876+ --enable-eap-dynamic \
1877 --enable-eap-gtc \
1878 --enable-eap-identity \
1879 --enable-eap-md5 \
1880 --enable-eap-mschapv2 \
1881+ --enable-eap-peap \
1882 --enable-eap-radius \
1883+ --enable-eap-sim \
1884+ --enable-eap-simaka-pseudonym \
1885+ --enable-eap-simaka-reauth \
1886+ --enable-eap-simaka-sql \
1887+ --enable-eap-sim-file \
1888+ --enable-eap-sim-pcsc \
1889 --enable-eap-tls \
1890 --enable-eap-tnc \
1891 --enable-eap-ttls \
1892@@ -25,18 +41,52 @@ CONFIGUREARGS := --libdir=/usr/lib --libexecdir=/usr/lib \
1893 --enable-gcm \
1894 --enable-gcrypt \
1895 --enable-ha \
1896+ --enable-imc-attestation \
1897+ --enable-imc-os \
1898+ --enable-imc-scanner \
1899+ --enable-imc-swid \
1900+ --enable-imc-test \
1901+ --enable-imv-attestation \
1902+ --enable-imv-os \
1903+ --enable-imv-scanner \
1904+ --enable-imv-swid \
1905+ --enable-imv-test \
1906+ --enable-ipseckey \
1907+ --enable-kernel-libipsec \
1908 --enable-ldap \
1909 --enable-led \
1910+ --enable-load-tester \
1911 --enable-lookip \
1912 --enable-mediation \
1913+ --enable-md4 \
1914+ --enable-mysql \
1915+ --enable-ntru \
1916 --enable-openssl \
1917 --enable-pkcs11 \
1918+ --enable-radattr \
1919+ --enable-soup \
1920+ --enable-sql \
1921+ --enable-sqlite \
1922+ --enable-systime-fix \
1923 --enable-test-vectors \
1924 --enable-tpm \
1925+ --enable-tnccs-11 \
1926+ --enable-tnccs-20 \
1927+ --enable-tnccs-dynamic \
1928+ --enable-tnc-ifmap \
1929+ --enable-tnc-imc \
1930+ --enable-tnc-imv \
1931+ --enable-tnc-pdp \
1932+ --enable-unbound \
1933+ --enable-unit-tests \
1934 --enable-unity \
1935+ --enable-whitelist \
1936 --enable-xauth-eap \
1937+ --enable-xauth-generic \
1938+ --enable-xauth-noauth \
1939 --enable-xauth-pam \
1940 --disable-blowfish \
1941+ --disable-fast \
1942 --disable-des # BSD-Young license
1943 #--with-user=strongswan --with-group=nogroup
1944 # --enable-kernel-pfkey --enable-kernel-klips \
1945@@ -190,12 +240,6 @@ endif
1946
1947 # add additional files not covered by upstream makefile...
1948 install --mode=0600 $(CURDIR)/debian/ipsec.secrets.proto $(CURDIR)/debian/strongswan-starter/etc/ipsec.secrets
1949- # also "patch" ipsec.conf to include the debconf-managed file
1950- echo >> $(CURDIR)/debian/strongswan-starter/etc/ipsec.conf
1951- echo "include /var/lib/strongswan/ipsec.conf.inc" >> $(CURDIR)/debian/strongswan-starter/etc/ipsec.conf
1952- # and to enable both IKEv1 and IKEv2 by default
1953- sed -r 's/^[ \t]+# *charonstart=(yes|no) */\tcharonstart=yes/' < $(CURDIR)/debian/strongswan-starter/etc/ipsec.conf > $(CURDIR)/debian/strongswan-starter/etc/ipsec.conf.tmp
1954- mv $(CURDIR)/debian/strongswan-starter/etc/ipsec.conf.tmp $(CURDIR)/debian/strongswan-starter/etc/ipsec.conf
1955
1956 # set permissions on ipsec.secrets and private key directories
1957 chmod 600 $(CURDIR)/debian/strongswan-starter/etc/ipsec.secrets
1958diff --git a/debian/strongswan-starter.install b/debian/strongswan-starter.install
1959index 9a4c0d1..b5250dc 100644
1960--- a/debian/strongswan-starter.install
1961+++ b/debian/strongswan-starter.install
1962@@ -16,3 +16,7 @@ usr/lib/ipsec/plugins/libstrongswan-stroke.so
1963 usr/share/strongswan/templates/config/plugins/stroke.conf
1964 etc/strongswan.d/charon/stroke.conf
1965 debian/usr.lib.ipsec.stroke /etc/apparmor.d/
1966+#pool
1967+usr/lib/ipsec/pool
1968+usr/share/strongswan/templates/config/strongswan.d/pool.conf
1969+etc/strongswan.d/pool.conf
1970diff --git a/debian/strongswan-starter.postinst b/debian/strongswan-starter.postinst
1971index 9e4d7b1..9b7c734 100644
1972--- a/debian/strongswan-starter.postinst
1973+++ b/debian/strongswan-starter.postinst
1974@@ -220,63 +220,6 @@ case "$1" in
1975 db_set strongswan/install_x509_certificate false
1976 fi
1977
1978- # lets see if we are already using dependency based booting or the correct runlevel parameters
1979- if ! ( [ "`find /etc/init.d/ -name '.depend.*'`" ] || [ "$runlevels" = "0K841K842S163S164S165S166K84" ] ); then
1980- db_fset strongswan/runlevel_changes seen false
1981- db_input high strongswan/runlevel_changes || true
1982- db_go
1983-
1984- # if the admin did not change the runlevels which got installed by older packages we can modify them
1985- if [ "$runlevels" = "0K346K34SS41" ] || [ "$runlevels" = "0K301K302S153S154S155S156K30" ] || [ "$runlevels" = "0K191K192S213S214S215S216K19" ]; then
1986- update-rc.d -f ipsec remove
1987- fi
1988-
1989- update-rc.d ipsec defaults 16 84 > /dev/null
1990- fi
1991-
1992- db_get strongswan/enable-oe
1993- if [ "$RET" != "true" ]; then
1994- echo -n "Disabling opportunistic encryption (OE) in config file ... "
1995- if [ -e $CONF_FILE ] && egrep -q "include /etc/ipsec.d/examples/no_oe.conf$" $CONF_FILE; then
1996- # also update to new-style config
1997- sed 's/.*include \/etc\/ipsec.d\/examples\/no_oe.conf/#include \/etc\/ipsec.d\/examples\/oe.conf/' < $CONF_FILE > $CONF_FILE.tmp
1998- mv $CONF_FILE.tmp $CONF_FILE
1999- echo -n "converted old config line to new format"
2000- fi
2001- if [ -e $CONF_FILE ] && egrep -q "^include /etc/ipsec.d/examples/oe.conf$" $CONF_FILE; then
2002- sed 's/include \/etc\/ipsec.d\/examples\/oe.conf/#include \/etc\/ipsec.d\/examples\/oe.conf/' < $CONF_FILE > $CONF_FILE.tmp
2003- mv $CONF_FILE.tmp $CONF_FILE
2004- echo "done"
2005- elif [ ! -e $CONF_FILE ]; then
2006- echo "#include /etc/ipsec.d/examples/oe.conf" > $CONF_FILE
2007- else
2008- echo "already disabled"
2009- fi
2010- else
2011- echo -n "Enabling opportunistic encryption (OE) in config file ... "
2012- if [ -e $CONF_FILE ] && egrep -q "include /etc/ipsec.d/examples/no_oe.conf$" $CONF_FILE; then
2013- # also update to new-style config
2014- sed 's/.*include \/etc\/ipsec.d\/examples\/no_oe.conf/include \/etc\/ipsec.d\/examples\/oe.conf/' < $CONF_FILE > $CONF_FILE.tmp
2015- mv $CONF_FILE.tmp $CONF_FILE
2016- echo -n "converted old config line to new format"
2017- fi
2018- if [ -e $CONF_FILE ] && egrep -q "^include /etc/ipsec.d/examples/oe.conf$" $CONF_FILE; then
2019- echo "already enabled"
2020- elif [ -e $CONF_FILE ] && egrep -q "^#.*include /etc/ipsec.d/examples/oe.conf$" $CONF_FILE; then
2021- sed 's/#.*include \/etc\/ipsec.d\/examples\/oe.conf/include \/etc\/ipsec.d\/examples\/oe.conf/' < $CONF_FILE > $CONF_FILE.tmp
2022- mv $CONF_FILE.tmp $CONF_FILE
2023- echo "done"
2024- elif [ ! -e $CONF_FILE ]; then
2025- echo "include /etc/ipsec.d/examples/oe.conf" > $CONF_FILE
2026- else
2027- cat <<EOF >> $CONF_FILE
2028-#Enable Opportunistic Encryption
2029-include /etc/ipsec.d/examples/oe.conf
2030-EOF
2031- echo "done"
2032- fi
2033- fi
2034-
2035 # disabled for now, until we can solve the don't-edit-conffiles issue
2036 #db_get strongswan/ikev1
2037 #if [ "$RET" != "true" ]; then
2038diff --git a/debian/strongswan-tnc-base.install b/debian/strongswan-tnc-base.install
2039new file mode 100644
2040index 0000000..a9e3f32
2041--- /dev/null
2042+++ b/debian/strongswan-tnc-base.install
2043@@ -0,0 +1,16 @@
2044+etc/strongswan.d/charon/tnccs-11.conf
2045+etc/strongswan.d/charon/tnccs-20.conf
2046+etc/strongswan.d/charon/tnccs-dynamic.conf
2047+etc/strongswan.d/charon/tnc-tnccs.conf
2048+etc/strongswan.d/imcv.conf
2049+etc/strongswan.d/tnc.conf
2050+usr/lib/ipsec/libimcv.*
2051+usr/lib/ipsec/libtnccs.so*
2052+usr/lib/ipsec/plugins/libstrongswan-tnccs-*.so
2053+usr/lib/ipsec/plugins/libstrongswan-tnc-tnccs.so
2054+usr/share/strongswan/templates/config/plugins/tnccs-11.conf
2055+usr/share/strongswan/templates/config/plugins/tnccs-20.conf
2056+usr/share/strongswan/templates/config/plugins/tnccs-dynamic.conf
2057+usr/share/strongswan/templates/config/plugins/tnc-tnccs.conf
2058+usr/share/strongswan/templates/config/strongswan.d/imcv.conf
2059+usr/share/strongswan/templates/config/strongswan.d/tnc.conf
2060diff --git a/debian/strongswan-tnc-client.install b/debian/strongswan-tnc-client.install
2061new file mode 100644
2062index 0000000..88449c6
2063--- /dev/null
2064+++ b/debian/strongswan-tnc-client.install
2065@@ -0,0 +1,5 @@
2066+etc/strongswan.d/charon/tnc-imc.conf
2067+usr/lib/ipsec/imcvs/imc-*.so
2068+usr/lib/ipsec/plugins/libstrongswan-tnc-imc.so
2069+usr/share/strongswan/swidtag/strongswan.org__strongSwan-*.swidtag
2070+usr/share/strongswan/templates/config/plugins/tnc-imc.conf
2071diff --git a/debian/strongswan-tnc-ifmap.install b/debian/strongswan-tnc-ifmap.install
2072new file mode 100644
2073index 0000000..3c8083b
2074--- /dev/null
2075+++ b/debian/strongswan-tnc-ifmap.install
2076@@ -0,0 +1,3 @@
2077+etc/strongswan.d/charon/tnc-ifmap.conf
2078+usr/lib/ipsec/plugins/libstrongswan-tnc-ifmap.so
2079+usr/share/strongswan/templates/config/plugins/tnc-ifmap.conf
2080diff --git a/debian/strongswan-tnc-pdp.install b/debian/strongswan-tnc-pdp.install
2081new file mode 100644
2082index 0000000..2534386
2083--- /dev/null
2084+++ b/debian/strongswan-tnc-pdp.install
2085@@ -0,0 +1,3 @@
2086+etc/strongswan.d/charon/tnc-pdp.conf
2087+usr/lib/ipsec/plugins/libstrongswan-tnc-pdp.so
2088+usr/share/strongswan/templates/config/plugins/tnc-pdp.conf
2089diff --git a/debian/strongswan-tnc-server.install b/debian/strongswan-tnc-server.install
2090new file mode 100644
2091index 0000000..da633f6
2092--- /dev/null
2093+++ b/debian/strongswan-tnc-server.install
2094@@ -0,0 +1,10 @@
2095+etc/strongswan.d/attest.conf
2096+etc/strongswan.d/charon/tnc-imv.conf
2097+usr/lib/ipsec/attest
2098+usr/lib/ipsec/imcvs/imv-*.so
2099+usr/lib/ipsec/_imv_policy
2100+usr/lib/ipsec/imv_policy_manager
2101+usr/lib/ipsec/plugins/libstrongswan-tnc-imv.so
2102+usr/share/strongswan/templates/config/plugins/tnc-imv.conf
2103+usr/share/strongswan/templates/config/strongswan.d/attest.conf
2104+usr/share/strongswan/templates/database/imv/*.sql
2105diff --git a/debian/usr.lib.ipsec.charon b/debian/usr.lib.ipsec.charon
2106index 9e24c74..14cfa6d 100644
2107--- a/debian/usr.lib.ipsec.charon
2108+++ b/debian/usr.lib.ipsec.charon
2109@@ -41,7 +41,7 @@
2110 network,
2111 network raw,
2112
2113- /bin/dash rmPUx,
2114+ /{,usr/}bin/dash rmPUx,
2115
2116 # libchron-extra-plugins: kernel-libipsec
2117 /dev/net/tun rw,
2118diff --git a/debian/usr.sbin.charon-systemd b/debian/usr.sbin.charon-systemd
2119index 920fe72..940de46 100644
2120--- a/debian/usr.sbin.charon-systemd
2121+++ b/debian/usr.sbin.charon-systemd
2122@@ -19,6 +19,7 @@
2123 #include <abstractions/authentication>
2124 #include <abstractions/openssl>
2125 #include <abstractions/p11-kit>
2126+ #include <abstractions/mysql>
2127
2128 capability ipc_lock,
2129 capability net_admin,
2130@@ -41,7 +42,7 @@
2131 network,
2132 network raw,
2133
2134- /bin/dash rmPUx,
2135+ /{,usr/}bin/dash rmPUx,
2136
2137 # libchron-extra-plugins: kernel-libipsec
2138 /dev/net/tun rw,

Subscribers

People subscribed via source and target branches