Merge ~ahasenack/ubuntu/+source/strongswan:mantic-strongswan-merge into ubuntu/+source/strongswan:debian/sid
- Git
- lp:~ahasenack/ubuntu/+source/strongswan
- mantic-strongswan-merge
- Merge into debian/sid
Status: | Merged | ||||
---|---|---|---|---|---|
Approved by: | git-ubuntu bot | ||||
Approved revision: | not available | ||||
Merge reported by: | git-ubuntu bot | ||||
Merged at revision: | 3030e09ab5743ab2a7a7cea41266a8512a8a783d | ||||
Proposed branch: | ~ahasenack/ubuntu/+source/strongswan:mantic-strongswan-merge | ||||
Merge into: | ubuntu/+source/strongswan:debian/sid | ||||
Diff against target: |
2661 lines (+2356/-4) 10 files modified
debian/changelog (+1859/-0) debian/control (+8/-3) debian/libcharon-extra-plugins.install (+6/-0) debian/libcharon-extra-plugins.maintscript (+8/-0) debian/libstrongswan-extra-plugins.install (+3/-0) debian/rules (+3/-0) debian/tests/control (+6/-0) debian/tests/host-to-host (+401/-0) debian/tests/utils (+61/-0) debian/usr.sbin.swanctl (+1/-1) |
||||
Related bugs: |
|
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
git-ubuntu bot | Approve | ||
Lucas Kanashiro (community) | Approve | ||
Canonical Server Reporter | Pending | ||
Review via email: mp+445300@code.launchpad.net |
Commit message
Description of the change
Simple merge from debian. I squashed two d/t/util commits in the logical tag, dropped a delta that is applied upstream, and that's about it.
PPA: https:/
DEP8: green
The DEP8 delta is a bit hard to send to debian, as it needs VMs to run, and lxd from the snap, and some other changes where ubuntu assumptions were made. This delta is quite trivial to maintain, however.
Lucas Kanashiro (lucaskanashiro) wrote : | # |
Lucas Kanashiro (lucaskanashiro) wrote : | # |
Thanks for the MP Andreas! LGTM, +1. I added a not so important inline comment regarding the changelog, feel free to address it or not.
What I noticed after running lintian against this package is that there are many files not covered by the debian/copyright, maybe this worth a bug report so the Debian maintainer can address it in the next upload. This is the lintian warning: file-without-
git-ubuntu bot (git-ubuntu-bot) wrote : | # |
Approvers: ahasenack, lucaskanashiro
Uploaders: ahasenack, lucaskanashiro
MP auto-approved
- 3030e09... by Andreas Hasenack
-
changelog
Andreas Hasenack (ahasenack) wrote : | # |
Thanks, I updated the changelog reference, and filed https:/
Andreas Hasenack (ahasenack) wrote : | # |
Uploaded:
Uploading strongswan_
Uploading strongswan_
Uploading strongswan_
Uploading strongswan_
Preview Diff
1 | diff --git a/debian/changelog b/debian/changelog |
2 | index b8cbd23..fa3f8fa 100644 |
3 | --- a/debian/changelog |
4 | +++ b/debian/changelog |
5 | @@ -1,3 +1,39 @@ |
6 | +strongswan (5.9.11-1ubuntu1) mantic; urgency=medium |
7 | + |
8 | + * Merge with Debian unstable (LP: #2018113). Remaining changes: |
9 | + - d/control: strongswan-starter hard-depends on strongswan-charon, |
10 | + therefore bump the dependency from Recommends to Depends. At the same |
11 | + time avoid a circular dependency by dropping |
12 | + strongswan-charon->strongswan-starter from Depends to Recommends as the |
13 | + binaries can work without the services but not vice versa. |
14 | + - re-add post-quantum encryption algorithm (NTRU) (LP #1863749) |
15 | + + d/control: mention plugins in package description |
16 | + + d/rules: enable ntru at build time |
17 | + + d/libstrongswan-extra-plugins.install: ship config and shared objects |
18 | + - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887) |
19 | + + d/control: update libcharon-extra-plugins description. |
20 | + + d/libcharon-extra-plugins.install: install .so and conf files. |
21 | + + d/rules: add plugins to the configuration arguments. |
22 | + - Remove conf files of plugins removed from libcharon-extra-plugins |
23 | + + The conf file of the following plugins were removed: eap-aka-3gpp2, |
24 | + eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym, |
25 | + eap-simaka-reauth, eap-simaka-sql, xauth-noauth. |
26 | + + Created d/libcharon-extra-plugins.maintscript to handle the removals |
27 | + properly. |
28 | + - d/t/{control,host-to-host,utils}: new host-to-host test |
29 | + (LP #1999525) |
30 | + - d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl |
31 | + (LP #1999935) |
32 | + * Dropped: |
33 | + - SECURITY UPDATE: Incorrectly Accepted Untrusted Public Key With |
34 | + Incorrect Refcount |
35 | + + debian/patches/CVE-2023-26463.patch: fix authentication bypass and |
36 | + expired pointer dereference in src/libtls/tls_server.c. |
37 | + + CVE-2023-26463 |
38 | + [Fixed upstream in 5.9.10] |
39 | + |
40 | + -- Andreas Hasenack <andreas@canonical.com> Fri, 23 Jun 2023 14:05:18 -0300 |
41 | + |
42 | strongswan (5.9.11-1) unstable; urgency=medium |
43 | |
44 | * New upstream version 5.9.10 |
45 | @@ -17,6 +53,66 @@ strongswan (5.9.8-4) unstable; urgency=medium |
46 | |
47 | -- Yves-Alexis Perez <corsac@debian.org> Sun, 26 Feb 2023 09:40:09 +0100 |
48 | |
49 | +strongswan (5.9.8-3ubuntu4) lunar; urgency=medium |
50 | + |
51 | + * d/t/utils: also give `cloud-init status --wait` the same amount of |
52 | + ${limit} seconds to complete, and bump limit to 5min. The logs show |
53 | + the container started up fine, with an IP. |
54 | + |
55 | + -- Andreas Hasenack <andreas@canonical.com> Mon, 06 Mar 2023 11:00:58 -0300 |
56 | + |
57 | +strongswan (5.9.8-3ubuntu3) lunar; urgency=medium |
58 | + |
59 | + * SECURITY UPDATE: Incorrectly Accepted Untrusted Public Key With |
60 | + Incorrect Refcount |
61 | + - debian/patches/CVE-2023-26463.patch: fix authentication bypass and |
62 | + expired pointer dereference in src/libtls/tls_server.c. |
63 | + - CVE-2023-26463 |
64 | + |
65 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 02 Mar 2023 12:58:47 -0500 |
66 | + |
67 | +strongswan (5.9.8-3ubuntu2) lunar; urgency=medium |
68 | + |
69 | + * d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl |
70 | + (LP: #1999935) |
71 | + |
72 | + -- Andreas Hasenack <andreas@canonical.com> Fri, 16 Dec 2022 16:07:51 -0300 |
73 | + |
74 | +strongswan (5.9.8-3ubuntu1) lunar; urgency=medium |
75 | + |
76 | + * Merge with Debian unstable (LP: #1993449). Remaining changes: |
77 | + - d/control: strongswan-starter hard-depends on strongswan-charon, |
78 | + therefore bump the dependency from Recommends to Depends. At the same |
79 | + time avoid a circular dependency by dropping |
80 | + strongswan-charon->strongswan-starter from Depends to Recommends as the |
81 | + binaries can work without the services but not vice versa. |
82 | + - re-add post-quantum encryption algorithm (NTRU) (LP #1863749) |
83 | + + d/control: mention plugins in package description |
84 | + + d/rules: enable ntru at build time |
85 | + + d/libstrongswan-extra-plugins.install: ship config and shared objects |
86 | + - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887) |
87 | + + d/control: update libcharon-extra-plugins description. |
88 | + + d/libcharon-extra-plugins.install: install .so and conf files. |
89 | + + d/rules: add plugins to the configuration arguments. |
90 | + - Remove conf files of plugins removed from libcharon-extra-plugins |
91 | + + The conf file of the following plugins were removed: eap-aka-3gpp2, |
92 | + eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym, |
93 | + eap-simaka-reauth, eap-simaka-sql, xauth-noauth. |
94 | + + Created d/libcharon-extra-plugins.maintscript to handle the removals |
95 | + properly. |
96 | + * Dropped: |
97 | + - SECURITY UPDATE: Using Untrusted URIs for Revocation Checking |
98 | + + debian/patches/CVE-2022-40617.patch: do online revocation checks only |
99 | + after basic trust chain validation in |
100 | + src/libstrongswan/credentials/credential_manager.c. |
101 | + + CVE-2022-40617 |
102 | + [Included upstream in 5.9.8] |
103 | + * Added: |
104 | + - d/t/{control,host-to-host,utils}: new host-to-host test |
105 | + (LP: #1999525) |
106 | + |
107 | + -- Andreas Hasenack <andreas@canonical.com> Tue, 13 Dec 2022 11:04:24 -0300 |
108 | + |
109 | strongswan (5.9.8-3) unstable; urgency=medium |
110 | |
111 | * d/tests: also drop _copyright test since the util is gone as well |
112 | @@ -45,6 +141,46 @@ strongswan (5.9.8-1) unstable; urgency=medium |
113 | |
114 | -- Yves-Alexis Perez <corsac@debian.org> Wed, 05 Oct 2022 15:25:18 +0200 |
115 | |
116 | +strongswan (5.9.6-1ubuntu2) kinetic; urgency=medium |
117 | + |
118 | + * SECURITY UPDATE: Using Untrusted URIs for Revocation Checking |
119 | + - debian/patches/CVE-2022-40617.patch: do online revocation checks only |
120 | + after basic trust chain validation in |
121 | + src/libstrongswan/credentials/credential_manager.c. |
122 | + - CVE-2022-40617 |
123 | + |
124 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 05 Oct 2022 08:11:03 -0400 |
125 | + |
126 | +strongswan (5.9.6-1ubuntu1) kinetic; urgency=medium |
127 | + |
128 | + * Merge with Debian unstable (LP: #1971328). Remaining changes: |
129 | + - d/control: strongswan-starter hard-depends on strongswan-charon, |
130 | + therefore bump the dependency from Recommends to Depends. At the same |
131 | + time avoid a circular dependency by dropping |
132 | + strongswan-charon->strongswan-starter from Depends to Recommends as the |
133 | + binaries can work without the services but not vice versa. |
134 | + - re-add post-quantum encryption algorithm (NTRU) (LP #1863749) |
135 | + + d/control: mention plugins in package description |
136 | + + d/rules: enable ntru at build time |
137 | + + d/libstrongswan-extra-plugins.install: ship config and shared objects |
138 | + - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887) |
139 | + + d/control: update libcharon-extra-plugins description. |
140 | + + d/libcharon-extra-plugins.install: install .so and conf files. |
141 | + + d/rules: add plugins to the configuration arguments. |
142 | + - Remove conf files of plugins removed from libcharon-extra-plugins |
143 | + + The conf file of the following plugins were removed: eap-aka-3gpp2, |
144 | + eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym, |
145 | + eap-simaka-reauth, eap-simaka-sql, xauth-noauth. |
146 | + + Created d/libcharon-extra-plugins.maintscript to handle the removals |
147 | + properly. |
148 | + * Dropped: |
149 | + - d/p/lp1964977-fix-ipsec-pki-segfault.patch: Fix "ipsec pki" |
150 | + segmentation fault; don't access OpenSSL objects inside atexit() |
151 | + handlers. (LP #1964977) |
152 | + [included by upstream in version 5.9.6] |
153 | + |
154 | + -- Lucas Kanashiro <kanashiro@ubuntu.com> Fri, 10 Jun 2022 15:03:17 -0300 |
155 | + |
156 | strongswan (5.9.6-1) unstable; urgency=medium |
157 | |
158 | * New upstream version 5.9.6 |
159 | @@ -53,6 +189,42 @@ strongswan (5.9.6-1) unstable; urgency=medium |
160 | |
161 | -- Yves-Alexis Perez <corsac@debian.org> Sat, 07 May 2022 20:19:18 +0200 |
162 | |
163 | +strongswan (5.9.5-2ubuntu2) jammy; urgency=medium |
164 | + |
165 | + * d/p/lp1964977-fix-ipsec-pki-segfault.patch: Fix "ipsec pki" |
166 | + segmentation fault; don't access OpenSSL objects inside atexit() |
167 | + handlers. (LP: #1964977) |
168 | + |
169 | + -- Sergio Durigan Junior <sergio.durigan@canonical.com> Fri, 18 Mar 2022 14:24:34 -0400 |
170 | + |
171 | +strongswan (5.9.5-2ubuntu1) jammy; urgency=medium |
172 | + |
173 | + * Merge with Debian unstable. Remaining changes: |
174 | + - d/control: strongswan-starter hard-depends on strongswan-charon, |
175 | + therefore bump the dependency from Recommends to Depends. At the same |
176 | + time avoid a circular dependency by dropping |
177 | + strongswan-charon->strongswan-starter from Depends to Recommends as the |
178 | + binaries can work without the services but not vice versa. |
179 | + - re-add post-quantum encryption algorithm (NTRU) (LP #1863749) |
180 | + + d/control: mention plugins in package description |
181 | + + d/rules: enable ntru at build time |
182 | + + d/libstrongswan-extra-plugins.install: ship config and shared objects |
183 | + - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887) |
184 | + + d/control: update libcharon-extra-plugins description. |
185 | + + d/libcharon-extra-plugins.install: install .so and conf files. |
186 | + + d/rules: add plugins to the configuration arguments. |
187 | + - Remove conf files of plugins removed from libcharon-extra-plugins |
188 | + + The conf file of the following plugins were removed: eap-aka-3gpp2, |
189 | + eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym, |
190 | + eap-simaka-reauth, eap-simaka-sql, xauth-noauth. |
191 | + + Created d/libcharon-extra-plugins.maintscript to handle the removals |
192 | + properly. |
193 | + * Dropped patches included in new version: |
194 | + - debian/patches/CVE-2021-45079.patch |
195 | + - debian/patches/load-legacy-provider-in-openssl3.patch |
196 | + |
197 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 03 Feb 2022 10:49:49 -0500 |
198 | + |
199 | strongswan (5.9.5-2) unstable; urgency=medium |
200 | |
201 | * actually fix lintian overrides |
202 | @@ -68,6 +240,60 @@ strongswan (5.9.5-1) unstable; urgency=medium |
203 | |
204 | -- Yves-Alexis Perez <corsac@debian.org> Wed, 26 Jan 2022 14:38:54 +0100 |
205 | |
206 | +strongswan (5.9.4-1ubuntu4) jammy; urgency=medium |
207 | + |
208 | + * SECURITY UPDATE: Incorrect Handling of Early EAP-Success Messages |
209 | + - debian/patches/CVE-2021-45079.patch: enforce failure if MSK |
210 | + generation fails in src/libcharon/plugins/eap_gtc/eap_gtc.c, |
211 | + src/libcharon/plugins/eap_md5/eap_md5.c, |
212 | + src/libcharon/plugins/eap_radius/eap_radius.c, |
213 | + src/libcharon/sa/eap/eap_method.h, |
214 | + src/libcharon/sa/ikev2/authenticators/eap_authenticator.c. |
215 | + - CVE-2021-45079 |
216 | + |
217 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 01 Feb 2022 07:23:37 -0500 |
218 | + |
219 | +strongswan (5.9.4-1ubuntu3) jammy; urgency=medium |
220 | + |
221 | + * No-change rebuild against libssl3 |
222 | + |
223 | + -- Steve Langasek <steve.langasek@ubuntu.com> Thu, 09 Dec 2021 00:19:38 +0000 |
224 | + |
225 | +strongswan (5.9.4-1ubuntu2) jammy; urgency=medium |
226 | + |
227 | + * Add d/p/load-legacy-provider-in-openssl3.patch. |
228 | + Upstream cherry-pick to fix FTBFS against OpenSSL 3.0. (LP: #1946213) |
229 | + |
230 | + -- Paride Legovini <paride@ubuntu.com> Wed, 17 Nov 2021 17:04:27 +0100 |
231 | + |
232 | +strongswan (5.9.4-1ubuntu1) jammy; urgency=medium |
233 | + |
234 | + * Merge with Debian unstable. Remaining changes: |
235 | + - d/control: strongswan-starter hard-depends on strongswan-charon, |
236 | + therefore bump the dependency from Recommends to Depends. At the same |
237 | + time avoid a circular dependency by dropping |
238 | + strongswan-charon->strongswan-starter from Depends to Recommends as the |
239 | + binaries can work without the services but not vice versa. |
240 | + - re-add post-quantum encryption algorithm (NTRU) (LP #1863749) |
241 | + + d/control: mention plugins in package description |
242 | + + d/rules: enable ntru at build time |
243 | + + d/libstrongswan-extra-plugins.install: ship config and shared objects |
244 | + - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887) |
245 | + + d/control: update libcharon-extra-plugins description. |
246 | + + d/libcharon-extra-plugins.install: install .so and conf files. |
247 | + + d/rules: add plugins to the configuration arguments. |
248 | + - Remove conf files of plugins removed from libcharon-extra-plugins |
249 | + + The conf file of the following plugins were removed: eap-aka-3gpp2, |
250 | + eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym, |
251 | + eap-simaka-reauth, eap-simaka-sql, xauth-noauth. |
252 | + + Created d/libcharon-extra-plugins.maintscript to handle the removals |
253 | + properly. |
254 | + * Dropped changes: |
255 | + - Compile the tpm plugin against the tpm2 software stack (tss2). |
256 | + Merged in Debian (5.9.4-1). |
257 | + |
258 | + -- Paride Legovini <paride@ubuntu.com> Fri, 12 Nov 2021 12:34:30 +0100 |
259 | + |
260 | strongswan (5.9.4-1) unstable; urgency=medium |
261 | |
262 | [ Paride Legovini ] |
263 | @@ -84,6 +310,62 @@ strongswan (5.9.4-1) unstable; urgency=medium |
264 | |
265 | -- Yves-Alexis Perez <corsac@debian.org> Tue, 19 Oct 2021 22:34:40 +0200 |
266 | |
267 | +strongswan (5.9.1-1ubuntu3.1) impish-security; urgency=medium |
268 | + |
269 | + * SECURITY UPDATE: Integer Overflow in gmp Plugin |
270 | + - debian/patches/CVE-2021-41990.patch: reject RSASSA-PSS params with |
271 | + negative salt length in |
272 | + src/libstrongswan/credentials/keys/signature_params.c, |
273 | + src/libstrongswan/plugins/gmp/gmp_rsa_public_key.c. |
274 | + - CVE-2021-41990 |
275 | + * SECURITY UPDATE: Integer Overflow When Replacing Certificates in Cache |
276 | + - debian/patches/CVE-2021-41991.patch: prevent crash due to integer |
277 | + overflow/sign change in |
278 | + src/libstrongswan/credentials/sets/cert_cache.c. |
279 | + - CVE-2021-41991 |
280 | + |
281 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 18 Oct 2021 13:10:30 -0400 |
282 | + |
283 | +strongswan (5.9.1-1ubuntu3) impish; urgency=medium |
284 | + |
285 | + * Compile the tpm plugin against the tpm2 software stack (tss2) |
286 | + (Debian packaging cherry-pick, LP: #1940079) |
287 | + - d/rules: add the --enable-tss-tss2 configure flag |
288 | + - d/control: add Build-Depends: libtss2-dev |
289 | + |
290 | + -- Paride Legovini <paride@ubuntu.com> Thu, 16 Sep 2021 11:40:38 +0200 |
291 | + |
292 | +strongswan (5.9.1-1ubuntu2) impish; urgency=medium |
293 | + |
294 | + * No-change rebuild due to OpenLDAP soname bump. |
295 | + |
296 | + -- Sergio Durigan Junior <sergio.durigan@canonical.com> Mon, 21 Jun 2021 18:09:22 -0400 |
297 | + |
298 | +strongswan (5.9.1-1ubuntu1) hirsute; urgency=medium |
299 | + |
300 | + * Merge with Debian unstable. Remaining changes: |
301 | + - d/control: strongswan-starter hard-depends on strongswan-charon, |
302 | + therefore bump the dependency from Recommends to Depends. At the same |
303 | + time avoid a circular dependency by dropping |
304 | + strongswan-charon->strongswan-starter from Depends to Recommends as the |
305 | + binaries can work without the services but not vice versa. |
306 | + - re-add post-quantum encryption algorithm (NTRU) (LP: 1863749) |
307 | + + d/control: mention plugins in package description |
308 | + + d/rules: enable ntru at build time |
309 | + + d/libstrongswan-extra-plugins.install: ship config and shared objects |
310 | + - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887) |
311 | + + d/control: update libcharon-extra-plugins description. |
312 | + + d/libcharon-extra-plugins.install: install .so and conf files. |
313 | + + d/rules: add plugins to the configuration arguments. |
314 | + - Remove conf files of plugins removed from libcharon-extra-plugins |
315 | + + The conf file of the following plugins were removed: eap-aka-3gpp2, |
316 | + eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym, |
317 | + eap-simaka-reauth, eap-simaka-sql, xauth-noauth. |
318 | + + Created d/libcharon-extra-plugins.maintscript to handle the removals |
319 | + properly. |
320 | + |
321 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 19 Jan 2021 12:39:11 +0100 |
322 | + |
323 | strongswan (5.9.1-1) unstable; urgency=medium |
324 | |
325 | * New upstream version 5.9.1 |
326 | @@ -98,6 +380,45 @@ strongswan (5.9.0-1) unstable; urgency=medium |
327 | |
328 | -- Yves-Alexis Perez <corsac@debian.org> Thu, 17 Sep 2020 10:21:30 +0200 |
329 | |
330 | +strongswan (5.8.4-1ubuntu2) groovy; urgency=medium |
331 | + |
332 | + * Re-enable eap-{dynamic,peap} libcharon plugins (LP: #1878887) |
333 | + - d/control: update libcharon-extra-plugins description. |
334 | + - d/libcharon-extra-plugins.install: install .so and conf files. |
335 | + - d/rules: add plugins to the configuration arguments. |
336 | + * Remove conf files of plugins removed from libcharon-extra-plugins |
337 | + - The conf file of the following plugins were removed: eap-aka-3gpp2, |
338 | + eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym, |
339 | + eap-simaka-reauth, eap-simaka-sql, xauth-noauth. |
340 | + - Created d/libcharon-extra-plugins.maintscript to handle the removals |
341 | + properly. |
342 | + |
343 | + -- Lucas Kanashiro <kanashiro@ubuntu.com> Thu, 21 May 2020 14:53:05 -0300 |
344 | + |
345 | +strongswan (5.8.4-1ubuntu1) groovy; urgency=medium |
346 | + |
347 | + * Merge with Debian unstable. Remaining changes: |
348 | + - d/control: strongswan-starter hard-depends on strongswan-charon, |
349 | + therefore bump the dependency from Recommends to Depends. At the same |
350 | + time avoid a circular dependency by dropping |
351 | + strongswan-charon->strongswan-starter from Depends to Recommends as the |
352 | + binaries can work without the services but not vice versa. |
353 | + - re-add post-quantum encryption algorithm (NTRU) (LP: 1863749) |
354 | + + d/control: mention plugins in package description |
355 | + + d/rules: enable ntru at build time |
356 | + + d/libstrongswan-extra-plugins.install: ship config and shared objects |
357 | + * Dropped: |
358 | + - d/control: build-depend on libiptc-dev to avoid FTBFS (LP: #1861975) |
359 | + This is needed due to changes in regard to Debian bug 947176 and 939243 |
360 | + and can later be dropped again. |
361 | + [applied by Debian in version 5.8.2-2] |
362 | + - d/control: Transition from former Ubuntu only libcharon-standard-plugins |
363 | + to common libcharon-extauth-plugins (drop after 20.04) |
364 | + - d/control: Transition from strongswan-tnc-* being in extra packages |
365 | + to libcharon-extra-plugins (drop after 20.04) |
366 | + |
367 | + -- Lucas Kanashiro <lucas.kanashiro@canonical.com> Thu, 30 Apr 2020 18:06:55 -0300 |
368 | + |
369 | strongswan (5.8.4-1) unstable; urgency=medium |
370 | |
371 | * New upstream version 5.8.4 (Closes: #956446) |
372 | @@ -113,6 +434,43 @@ strongswan (5.8.2-2) unstable; urgency=medium |
373 | |
374 | -- Yves-Alexis Perez <corsac@debian.org> Thu, 13 Feb 2020 22:46:40 +0100 |
375 | |
376 | +strongswan (5.8.2-1ubuntu3) focal; urgency=medium |
377 | + |
378 | + * Reverting part of 5.8.2-1ubuntu2 changes to remove BLISS again as |
379 | + there is a potential local side-channel attack on strongSwan's BLISS |
380 | + implementation (https://eprint.iacr.org/2017/505). (LP: #1866765) |
381 | + |
382 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 10 Mar 2020 07:56:56 +0100 |
383 | + |
384 | +strongswan (5.8.2-1ubuntu2) focal; urgency=medium |
385 | + |
386 | + * re-add post-quantum computer signature scheme (BLISS) and encryption |
387 | + algorithm (NTRU) as well as the dependent nttfft library (LP: #1863749) |
388 | + - d/control: mention plugins in package description |
389 | + - d/rules: enable ntru and bliss at build time |
390 | + - d/libstrongswan-extra-plugins.install: ship config and shared objects |
391 | + |
392 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 04 Mar 2020 07:54:26 +0100 |
393 | + |
394 | +strongswan (5.8.2-1ubuntu1) focal; urgency=medium |
395 | + |
396 | + * Merge with Debian unstable (LP: #1861971). Remaining changes: |
397 | + - d/control: Transition from strongswan-tnc-* being in extra packages |
398 | + to libcharon-extra-plugins (drop after 20.04) |
399 | + - d/control: Transition from former Ubuntu only libcharon-standard-plugins |
400 | + to common libcharon-extauth-plugins (drop after 20.04) |
401 | + - d/control: strongswan-starter hard-depends on strongswan-charon, |
402 | + therefore bump the dependency from Recommends to Depends. At the same |
403 | + time avoid a circular dependency by dropping |
404 | + strongswan-charon->strongswan-starter from Depends to Recommends as the |
405 | + binaries can work without the services but not vice versa. |
406 | + * Added Changes |
407 | + - d/control: build-depend on libiptc-dev to avoid FTBFS (LP: #1861975) |
408 | + This is needed due to changes in regard to Debian bug 947176 and 939243 |
409 | + and can later be dropped again. |
410 | + |
411 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 05 Feb 2020 08:28:30 +0100 |
412 | + |
413 | strongswan (5.8.2-1) unstable; urgency=medium |
414 | |
415 | [ Jean-Michel Vourgère ] |
416 | @@ -129,6 +487,83 @@ strongswan (5.8.2-1) unstable; urgency=medium |
417 | |
418 | -- Yves-Alexis Perez <corsac@debian.org> Wed, 01 Jan 2020 14:35:46 +0100 |
419 | |
420 | +strongswan (5.8.1-1ubuntu1) focal; urgency=medium |
421 | + |
422 | + * Merge with Debian unstable (LP: #1852579). Remaining changes: |
423 | + - d/control: Transition from strongswan-tnc-* being in extra packages |
424 | + to libcharon-extra-plugins |
425 | + * Added Changes: |
426 | + - d/control: Transition from former Ubuntu only libcharon-standard-plugins |
427 | + to common libcharon-extauth-plugins (drop after 20.04) |
428 | + - d/control: strongswan-starter hard-depends on strongswan-charon, |
429 | + therefore bump the dependency from Recommends to Depends. At the same |
430 | + time avoid a circular dependency by dropping |
431 | + strongswan-charon->strongswan-starter from Depends to Recommends as the |
432 | + binaries can work without the services but not vice versa. |
433 | + * Dropped Changes (now in Debian): |
434 | + - Clean up d/strongswan-starter.postinst: section about runlevel changes |
435 | + - Clean up d/strongswan-starter.postinst: Removed entire section on |
436 | + opportunistic encryption disabling - this was never in strongSwan and |
437 | + won't be see upstream issue #2160. |
438 | + - d/rules: Removed patching ipsec.conf on build (not using the |
439 | + debconf-managed config.) |
440 | + - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was |
441 | + used for debconf-managed include of private key). |
442 | + - Add plugin kernel-libipsec to allow the use of strongswan in containers |
443 | + via this userspace implementation (please do note that this is still |
444 | + considered experimental by upstream). |
445 | + + d/libcharon-extra-plugins.install: Add kernel-libipsec components |
446 | + + d/control: List kernel-libipsec plugin at extra plugins description |
447 | + + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As |
448 | + upstream recommends to not load kernel-libipsec by default. |
449 | + - d/control: Mention mgf1 plugin which is in libstrongswan now |
450 | + - Complete the disabling of libfast; This was partially accepted in Debian, |
451 | + it is no more packaging medcli and medsrv, but still builds and |
452 | + mentions it. |
453 | + + d/rules: Add --disable-fast to avoid build time and dependencies |
454 | + + d/control: Remove medcli, medsrv from package description |
455 | + - Add now built (since 5.5.1) libraries libtpmtss and nttfft to |
456 | + libstrongswan-extra-plugins (no deps from default plugins). |
457 | + - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon |
458 | + plugins for the most common use cases from extra-plugins into a new |
459 | + standard-plugins package. This will allow those use cases without pulling |
460 | + in too much more plugins (a bit like the tnc package). Recommend that |
461 | + package from strongswan-libcharon. |
462 | + - d/usr.lib.ipsec.charon: allow reading of own FDs (LP 1786250) |
463 | + - d/usr.sbin.charon-systemd: allow CLUSTERIP for ha plugin (LP 1773956) |
464 | + - executables need to be able to read map and execute themselves otherwise |
465 | + execution in some environments e.g. containers is blocked (LP 1780534) |
466 | + + d/usr.lib.ipsec.stroke: add rmix permission to stroke binary |
467 | + + d/usr.lib.ipsec.lookip: add rmix permission to lookip binary |
468 | + - d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: resync apparmor |
469 | + profiles of both ways to start charon (LP 1807664) |
470 | + - d/usr.sbin.swanctl: add apparmor rule for af-alg plugin (LP 1807962) |
471 | + - We fixed up tpmtss and nttfft in the past, but tpmtss is now packaged in |
472 | + Debian so this part was be dropped. Two changes remain |
473 | + - d/control: fix the mentioning of tpmtss in d/control |
474 | + - apparmor fixes for container and root usage (LP 1826238) |
475 | + + d/usr.sbin.swanctl: allow reading own binary |
476 | + + d/usr.sbin.charon-systemd: allow accessing the binary |
477 | + + d/usr.sbin.swanctl: add attach_disconnected to work inside containers |
478 | + + d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: add CAP_SETPCAP |
479 | + to apparmor to allow dropping caps |
480 | + * Dropped Changes (too uncommon to support by default) |
481 | + - d/libstrongswan.install: Add kernel-netlink configuration files |
482 | + - d/usr.sbin.charon-systemd: allow to contact mysql for sql and |
483 | + attr-sql plugins (LP 1766240) - no more needed as itisn't enabled. |
484 | + - Mass enablement of extra plugins and features to allow a user to use |
485 | + strongswan for a variety of extra use cases without having to rebuild. |
486 | + + d/control: Add required additional build-deps |
487 | + + d/control: Mention addtionally enabled plugins |
488 | + + d/rules: Enable features at configure stage |
489 | + + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf) |
490 | + + d/libstrongswan.install: Add plugins (so, conf) |
491 | + + d/strongswan-starter.install: Install pool feature, which is useful |
492 | + since we now have attr-sql plugin enabled it. |
493 | + - Enable additional TNC plugins and add them to libcharon-extra-plugins |
494 | + |
495 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 14 Nov 2019 15:00:15 +0100 |
496 | + |
497 | strongswan (5.8.1-1) unstable; urgency=medium |
498 | |
499 | * d/rules: disable http and stream tests under CI |
500 | @@ -198,6 +633,99 @@ strongswan (5.8.0-1) unstable; urgency=medium |
501 | |
502 | -- Yves-Alexis Perez <corsac@debian.org> Mon, 26 Aug 2019 12:58:23 +0200 |
503 | |
504 | +strongswan (5.7.2-1ubuntu3) eoan; urgency=medium |
505 | + |
506 | + * No change rebuild for libmysqlclient21. |
507 | + |
508 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 15 Aug 2019 09:34:34 +0200 |
509 | + |
510 | +strongswan (5.7.2-1ubuntu2) eoan; urgency=medium |
511 | + |
512 | + * Rebuild against new libjson-c4. |
513 | + |
514 | + -- Gianfranco Costamagna <locutusofborg@debian.org> Mon, 01 Jul 2019 10:53:07 +0200 |
515 | + |
516 | +strongswan (5.7.2-1ubuntu1) eoan; urgency=medium |
517 | + |
518 | + [ Christian Ehrhardt ] |
519 | + * Merge with Debian unstable. Remaining changes: |
520 | + - Clean up d/strongswan-starter.postinst: section about runlevel changes |
521 | + - Clean up d/strongswan-starter.postinst: Removed entire section on |
522 | + opportunistic encryption disabling - this was never in strongSwan and |
523 | + won't be see upstream issue #2160. |
524 | + - d/rules: Removed patching ipsec.conf on build (not using the |
525 | + debconf-managed config.) |
526 | + - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was |
527 | + used for debconf-managed include of private key). |
528 | + - Mass enablement of extra plugins and features to allow a user to use |
529 | + strongswan for a variety of extra use cases without having to rebuild. |
530 | + + d/control: Add required additional build-deps |
531 | + + d/control: Mention addtionally enabled plugins |
532 | + + d/rules: Enable features at configure stage |
533 | + + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf) |
534 | + + d/libstrongswan.install: Add plugins (so, conf) |
535 | + + d/strongswan-starter.install: Install pool feature, which is useful |
536 | + since we now have attr-sql plugin enabled it. |
537 | + - Add plugin kernel-libipsec to allow the use of strongswan in containers |
538 | + via this userspace implementation (please do note that this is still |
539 | + considered experimental by upstream). |
540 | + + d/libcharon-extra-plugins.install: Add kernel-libipsec components |
541 | + + d/control: List kernel-libipsec plugin at extra plugins description |
542 | + + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As |
543 | + upstream recommends to not load kernel-libipsec by default. |
544 | + - d/libstrongswan.install: Add kernel-netlink configuration files |
545 | + - Complete the disabling of libfast; This was partially accepted in Debian, |
546 | + it is no more packaging medcli and medsrv, but still builds and |
547 | + mentions it. |
548 | + + d/rules: Add --disable-fast to avoid build time and dependencies |
549 | + + d/control: Remove medcli, medsrv from package description |
550 | + - d/control: Mention mgf1 plugin which is in libstrongswan now |
551 | + - Add now built (since 5.5.1) libraries libtpmtss and nttfft to |
552 | + libstrongswan-extra-plugins (no deps from default plugins). |
553 | + - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon |
554 | + plugins for the most common use cases from extra-plugins into a new |
555 | + standard-plugins package. This will allow those use cases without pulling |
556 | + in too much more plugins (a bit like the tnc package). Recommend that |
557 | + package from strongswan-libcharon. |
558 | + - d/usr.sbin.charon-systemd: allow to contact mysql for sql and |
559 | + attr-sql plugins (LP #1766240) |
560 | + - d/usr.lib.ipsec.charon: allow reading of own FDs (LP #1786250) |
561 | + - d/usr.sbin.charon-systemd: allow CLUSTERIP for ha plugin (LP: 1773956) |
562 | + - executables need to be able to read map and execute themselves otherwise |
563 | + execution in some environments e.g. containers is blocked (LP: 1780534) |
564 | + + d/usr.lib.ipsec.stroke: add rmix permission to stroke binary |
565 | + + d/usr.lib.ipsec.lookip: add rmix permission to lookip binary |
566 | + - d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: resync apparmor |
567 | + profiles of both ways to start charon (LP: 1807664) |
568 | + - d/usr.sbin.swanctl: add apparmor rule for af-alg plugin (LP: 1807962) |
569 | + * Dropped changes |
570 | + - d/p/lp1795813-mysql-Don-t-release-the-connection-if-transactions-a.patch: |
571 | + fix SIGSEGV when using mysql plugin (LP: 1795813) |
572 | + [upstream in 5.7.2] |
573 | + - d/libstrongswan.install: Reorder conf and .so alphabetically |
574 | + [was a non functional change, dropped to avoid merge noise] |
575 | + - Relocate tnc plugin |
576 | + [TNC is back at libcharon-extra-plugins as it is in Debian] |
577 | + * Added changes: |
578 | + - We fixed up tpmtss and nttfft in the past, but tpmtss is now packaged in |
579 | + Debian so this part was be dropped. Two changes remain |
580 | + - d/control: fix the mentioning of tpmtss in d/control |
581 | + - add nttfft (can be merged with the mass enablement change later) |
582 | + - Transitional packages to go back from strongswan-tnc-* being in extra |
583 | + packages to be part of libcharon-extra-plugins. |
584 | + [can be dropped after 20.04] |
585 | + |
586 | + [ Simon Deziel ] |
587 | + * Added changes: |
588 | + - apparmor fixes for container and root usage (LP: #1826238) |
589 | + + d/usr.sbin.swanctl: allow reading own binary |
590 | + + d/usr.sbin.charon-systemd: allow accessing the binary |
591 | + + d/usr.sbin.swanctl: add attach_disconnected to work inside containers |
592 | + + d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: add CAP_SETPCAP |
593 | + to apparmor to allow dropping caps |
594 | + |
595 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Fri, 26 Apr 2019 11:31:17 +0200 |
596 | + |
597 | strongswan (5.7.2-1) unstable; urgency=medium |
598 | |
599 | * d/control: remove Rene from Uploaders, thanks! |
600 | @@ -216,6 +744,86 @@ strongswan (5.7.2-1) unstable; urgency=medium |
601 | |
602 | -- Yves-Alexis Perez <corsac@debian.org> Wed, 02 Jan 2019 13:02:11 +0100 |
603 | |
604 | +strongswan (5.7.1-1ubuntu2) disco; urgency=medium |
605 | + |
606 | + * d/usr.sbin.charon-systemd: fix rule for CLUSTERIP to match effective |
607 | + path (LP: #1773956) |
608 | + * d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: resync apparmor |
609 | + profiles of both ways to start charon (LP: #1807664) |
610 | + * d/usr.sbin.swanctl: add apparmor rule for af-alg plugin (LP: #1807962) |
611 | + |
612 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 10 Dec 2018 08:30:01 +0100 |
613 | + |
614 | +strongswan (5.7.1-1ubuntu1) disco; urgency=medium |
615 | + |
616 | + * Merge with Debian unstable (LP: #1806401). Remaining changes: |
617 | + - Clean up d/strongswan-starter.postinst: section about runlevel changes |
618 | + - Clean up d/strongswan-starter.postinst: Removed entire section on |
619 | + opportunistic encryption disabling - this was never in strongSwan and |
620 | + won't be see upstream issue #2160. |
621 | + - d/rules: Removed patching ipsec.conf on build (not using the |
622 | + debconf-managed config.) |
623 | + - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was |
624 | + used for debconf-managed include of private key). |
625 | + - Mass enablement of extra plugins and features to allow a user to use |
626 | + strongswan for a variety of extra use cases without having to rebuild. |
627 | + + d/control: Add required additional build-deps |
628 | + + d/control: Mention addtionally enabled plugins |
629 | + + d/rules: Enable features at configure stage |
630 | + + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf) |
631 | + + d/libstrongswan.install: Add plugins (so, conf) |
632 | + - d/strongswan-starter.install: Install pool feature, which is useful since |
633 | + we have attr-sql plugin enabled as well using it. |
634 | + - Add plugin kernel-libipsec to allow the use of strongswan in containers |
635 | + via this userspace implementation (please do note that this is still |
636 | + considered experimental by upstream). |
637 | + + d/libcharon-extra-plugins.install: Add kernel-libipsec components |
638 | + + d/control: List kernel-libipsec plugin at extra plugins description |
639 | + + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As |
640 | + upstream recommends to not load kernel-libipsec by default. |
641 | + - Relocate tnc plugin |
642 | + + debian/libcharon-extra-plugins.install: Drop tnc from extra plugins |
643 | + + Add new subpackage for TNC in d/strongswan-tnc-* and d/control |
644 | + - d/libstrongswan.install: Reorder conf and .so alphabetically |
645 | + - d/libstrongswan.install: Add kernel-netlink configuration files |
646 | + - Complete the disabling of libfast; This was partially accepted in Debian, |
647 | + it is no more packaging medcli and medsrv, but still builds and |
648 | + mentions it. |
649 | + + d/rules: Add --disable-fast to avoid build time and dependencies |
650 | + + d/control: Remove medcli, medsrv from package description |
651 | + - d/control: Mention mgf1 plugin which is in libstrongswan now |
652 | + - Add now built (since 5.5.1) libraries libtpmtss and nttfft to |
653 | + libstrongswan-extra-plugins (no deps from default plugins). |
654 | + - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon |
655 | + plugins for the most common use cases from extra-plugins into a new |
656 | + standard-plugins package. This will allow those use cases without pulling |
657 | + in too much more plugins (a bit like the tnc package). Recommend that |
658 | + package from strongswan-libcharon. |
659 | + - d/usr.sbin.charon-systemd: allow to contact mysql for sql and |
660 | + attr-sql plugins (LP #1766240) |
661 | + - d/usr.lib.ipsec.charon: allow reading of own FDs (LP #1786250) |
662 | + * Added Changes: |
663 | + - d/p/lp1795813-mysql-Don-t-release-the-connection-if-transactions-a.patch: |
664 | + fix SIGSEGV when using mysql plugin (LP: #1795813) |
665 | + - d/usr.sbin.charon-systemd: allow CLUSTERIP for ha plugin (LP: #1773956) |
666 | + - executables need to be able to read map and execute themselves otherwise |
667 | + execution in some environments e.g. containers is blocked (LP: #1780534) |
668 | + + d/usr.lib.ipsec.stroke: add rmix permission to stroke binary |
669 | + + d/usr.lib.ipsec.lookip: add rmix permission to lookip binary |
670 | + - adapt "mass enablement of extra plugins" to match 5.7.x changes |
671 | + + d/rules: use new options for swima instead of swid |
672 | + + d/strongswan-tnc-server.install: add new sec updater tool |
673 | + + d/strongswan-tnc-client.install: add new sw-collector tool |
674 | + * Dropped (in Debian now): |
675 | + - SECURITY UPDATE: Insufficient input validation in gmp plugin |
676 | + (CVE-2018-17540) |
677 | + - SECURITY UPDATE: Insufficient input validation in gmp plugin |
678 | + (CVE-2018-16151 CVE-2018-16152) |
679 | + - d/usr.lib.ipsec.charon, d/usr/sbin/charon-systemd: Add support for |
680 | + usr-merge, thanks to Christian Ehrhardt. LP #1784023 |
681 | + |
682 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 03 Dec 2018 15:18:31 +0100 |
683 | + |
684 | strongswan (5.7.1-1) unstable; urgency=medium |
685 | |
686 | [ Ondřej Nový ] |
687 | @@ -246,6 +854,96 @@ strongswan (5.7.0-1) unstable; urgency=medium |
688 | |
689 | -- Yves-Alexis Perez <corsac@debian.org> Mon, 24 Sep 2018 16:36:28 +0200 |
690 | |
691 | +strongswan (5.6.3-1ubuntu5) disco; urgency=medium |
692 | + |
693 | + * No-change rebuild against libunbound8 |
694 | + |
695 | + -- Steve Langasek <steve.langasek@ubuntu.com> Sun, 11 Nov 2018 09:01:53 +0000 |
696 | + |
697 | +strongswan (5.6.3-1ubuntu4) cosmic; urgency=medium |
698 | + |
699 | + * d/usr.lib.ipsec.charon: allow reading of own FDs (LP: #1786250) |
700 | + Thanks to Matt Callaghan. |
701 | + |
702 | + -- Andreas Hasenack <andreas@canonical.com> Thu, 04 Oct 2018 10:34:01 -0300 |
703 | + |
704 | +strongswan (5.6.3-1ubuntu3) cosmic; urgency=medium |
705 | + |
706 | + * SECURITY UPDATE: Insufficient input validation in gmp plugin |
707 | + - debian/patches/strongswan-4.4.0-5.7.0_gmp-pkcs1-overflow.patch: fix |
708 | + buffer overflow with very small RSA keys in |
709 | + src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c. |
710 | + - CVE-2018-17540 |
711 | + |
712 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 01 Oct 2018 13:23:59 -0400 |
713 | + |
714 | +strongswan (5.6.3-1ubuntu2) cosmic; urgency=medium |
715 | + |
716 | + * SECURITY UPDATE: Insufficient input validation in gmp plugin |
717 | + - debian/patches/strongswan-5.6.1-5.6.3_gmp-pkcs1-verify.patch: don't |
718 | + parse PKCS1 v1.5 RSA signatures to verify them in |
719 | + src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c, |
720 | + src/libstrongswan/plugins/gmp/gmp_rsa_public_key.c. |
721 | + - CVE-2018-16151 |
722 | + - CVE-2018-16152 |
723 | + |
724 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 25 Sep 2018 10:16:15 -0400 |
725 | + |
726 | +strongswan (5.6.3-1ubuntu1) cosmic; urgency=medium |
727 | + |
728 | + * Merge with Debian unstable. Remaining changes: |
729 | + - Clean up d/strongswan-starter.postinst: section about runlevel changes |
730 | + - Clean up d/strongswan-starter.postinst: Removed entire section on |
731 | + opportunistic encryption disabling - this was never in strongSwan and |
732 | + won't be see upstream issue #2160. |
733 | + - d/rules: Removed patching ipsec.conf on build (not using the |
734 | + debconf-managed config.) |
735 | + - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was |
736 | + used for debconf-managed include of private key). |
737 | + - Mass enablement of extra plugins and features to allow a user to use |
738 | + strongswan for a variety of extra use cases without having to rebuild. |
739 | + + d/control: Add required additional build-deps |
740 | + + d/control: Mention addtionally enabled plugins |
741 | + + d/rules: Enable features at configure stage |
742 | + + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf) |
743 | + + d/libstrongswan.install: Add plugins (so, conf) |
744 | + - d/strongswan-starter.install: Install pool feature, which is useful since |
745 | + we have attr-sql plugin enabled as well using it. |
746 | + - Add plugin kernel-libipsec to allow the use of strongswan in containers |
747 | + via this userspace implementation (please do note that this is still |
748 | + considered experimental by upstream). |
749 | + + d/libcharon-extra-plugins.install: Add kernel-libipsec components |
750 | + + d/control: List kernel-libipsec plugin at extra plugins description |
751 | + + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As |
752 | + upstream recommends to not load kernel-libipsec by default. |
753 | + - Relocate tnc plugin |
754 | + + debian/libcharon-extra-plugins.install: Drop tnc from extra plugins |
755 | + + Add new subpackage for TNC in d/strongswan-tnc-* and d/control |
756 | + - d/libstrongswan.install: Reorder conf and .so alphabetically |
757 | + - d/libstrongswan.install: Add kernel-netlink configuration files |
758 | + - Complete the disabling of libfast; This was partially accepted in Debian, |
759 | + it is no more packaging medcli and medsrv, but still builds and |
760 | + mentions it. |
761 | + + d/rules: Add --disable-fast to avoid build time and dependencies |
762 | + + d/control: Remove medcli, medsrv from package description |
763 | + - d/control: Mention mgf1 plugin which is in libstrongswan now |
764 | + - Add now built (since 5.5.1) libraries libtpmtss and nttfft to |
765 | + libstrongswan-extra-plugins (no deps from default plugins). |
766 | + - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon |
767 | + plugins for the most common use cases from extra-plugins into a new |
768 | + standard-plugins package. This will allow those use cases without pulling |
769 | + in too much more plugins (a bit like the tnc package). Recommend that |
770 | + package from strongswan-libcharon. |
771 | + - d/usr.sbin.charon-systemd: allow to contact mysql for sql and |
772 | + attr-sql plugins (LP #1766240) |
773 | + - d/usr.lib.ipsec.charon, d/usr/sbin/charon-systemd: Add support for |
774 | + usr-merge, thanks to Christian Ehrhardt. LP #1784023 |
775 | + * Dropped: |
776 | + - d/usr.sbin.charon-systemd: allow systemd notifications (LP: #1765652) |
777 | + [Fixed in 5.6.3-1] |
778 | + |
779 | + -- Andreas Hasenack <andreas@canonical.com> Thu, 23 Aug 2018 13:05:11 -0300 |
780 | + |
781 | strongswan (5.6.3-1) unstable; urgency=medium |
782 | |
783 | * New upstream version 5.6.2 |
784 | @@ -261,6 +959,78 @@ strongswan (5.6.3-1) unstable; urgency=medium |
785 | |
786 | -- Yves-Alexis Perez <corsac@debian.org> Mon, 04 Jun 2018 10:23:22 +0200 |
787 | |
788 | +strongswan (5.6.2-2ubuntu2) cosmic; urgency=medium |
789 | + |
790 | + * Add support for usr-merge, thanks to Christian Ehrhardt. LP: #1784023 |
791 | + |
792 | + -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 21 Aug 2018 00:42:38 +0100 |
793 | + |
794 | +strongswan (5.6.2-2ubuntu1) cosmic; urgency=medium |
795 | + |
796 | + * Merge with Debian unstable, closes LP: #1773814 and LP: #1772705. |
797 | + Remaining changes: |
798 | + + Clean up d/strongswan-starter.postinst: section about runlevel changes |
799 | + + Clean up d/strongswan-starter.postinst: Removed entire section on |
800 | + opportunistic encryption disabling - this was never in strongSwan and |
801 | + won't be see upstream issue #2160. |
802 | + + d/rules: Removed patching ipsec.conf on build (not using the |
803 | + debconf-managed config.) |
804 | + + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was |
805 | + used for debconf-managed include of private key). |
806 | + + Mass enablement of extra plugins and features to allow a user to use |
807 | + strongswan for a variety of extra use cases without having to rebuild. |
808 | + - d/control: Add required additional build-deps |
809 | + - d/control: Mention addtionally enabled plugins |
810 | + - d/rules: Enable features at configure stage |
811 | + - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf) |
812 | + - d/libstrongswan.install: Add plugins (so, conf) |
813 | + + d/strongswan-starter.install: Install pool feature, which is useful since |
814 | + we have attr-sql plugin enabled as well using it. |
815 | + + Add plugin kernel-libipsec to allow the use of strongswan in containers |
816 | + via this userspace implementation (please do note that this is still |
817 | + considered experimental by upstream). |
818 | + - d/libcharon-extra-plugins.install: Add kernel-libipsec components |
819 | + - d/control: List kernel-libipsec plugin at extra plugins description |
820 | + - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As |
821 | + upstream recommends to not load kernel-libipsec by default. |
822 | + + Relocate tnc plugin |
823 | + - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins |
824 | + - Add new subpackage for TNC in d/strongswan-tnc-* and d/control |
825 | + + d/libstrongswan.install: Reorder conf and .so alphabetically |
826 | + + d/libstrongswan.install: Add kernel-netlink configuration files |
827 | + + Complete the disabling of libfast; This was partially accepted in Debian, |
828 | + it is no more packaging medcli and medsrv, but still builds and |
829 | + mentions it. |
830 | + - d/rules: Add --disable-fast to avoid build time and dependencies |
831 | + - d/control: Remove medcli, medsrv from package description |
832 | + + d/control: Mention mgf1 plugin which is in libstrongswan now |
833 | + + Add now built (since 5.5.1) libraries libtpmtss and nttfft to |
834 | + libstrongswan-extra-plugins (no deps from default plugins). |
835 | + + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon |
836 | + plugins for the most common use cases from extra-plugins into a new |
837 | + standard-plugins package. This will allow those use cases without pulling |
838 | + in too much more plugins (a bit like the tnc package). Recommend that |
839 | + package from strongswan-libcharon. |
840 | + * Dropped Changes (no more needed after 18.04) |
841 | + + Add rm_conffile for /etc/init.d/ipsec (transition from precies had |
842 | + missed that, droppable after 18.04) |
843 | + + d/control: bump breaks/replaces from libstrongswan-extra-plugins to |
844 | + libstrongswan as we dropped relocating ccm and test-vectors. |
845 | + (droppable >18.04). |
846 | + + d/control: add breaks/replace from libstrongswan to |
847 | + libstrongswan-extra-plugins for the move of mgf1 to libstrongswan. |
848 | + (droppable >18.04). |
849 | + + d/control: bump breaks/replaces for the move of the updown plugin |
850 | + (Missed Changelog entry on last merge) |
851 | + + d/control: fix dependencies of strongswan-libcharon due to the move |
852 | + the updown plugin (droppable >18.04). |
853 | + * Added Changes: |
854 | + + d/usr.sbin.charon-systemd: allow to contact mysql for sql and |
855 | + attr-sql plugins (LP: #1766240) |
856 | + + d/usr.sbin.charon-systemd: allow systemd notifications (LP: #1765652) |
857 | + |
858 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 29 May 2018 08:21:42 +0200 |
859 | + |
860 | strongswan (5.6.2-2) unstable; urgency=medium |
861 | |
862 | * charon-nm: Fix building list of DNS/MDNS servers with libnm |
863 | @@ -271,6 +1041,74 @@ strongswan (5.6.2-2) unstable; urgency=medium |
864 | |
865 | -- Yves-Alexis Perez <corsac@debian.org> Fri, 13 Apr 2018 13:46:04 +0200 |
866 | |
867 | +strongswan (5.6.2-1ubuntu2) bionic; urgency=medium |
868 | + |
869 | + * d/control: fix dependencies of strongswan-libcharon due to the move |
870 | + the updown plugin. |
871 | + |
872 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 20 Mar 2018 07:37:29 +0100 |
873 | + |
874 | +strongswan (5.6.2-1ubuntu1) bionic; urgency=medium |
875 | + |
876 | + * Merge with Debian unstable (LP: #1753018). Remaining changes: |
877 | + + Clean up d/strongswan-starter.postinst: section about runlevel changes |
878 | + + Clean up d/strongswan-starter.postinst: Removed entire section on |
879 | + opportunistic encryption disabling - this was never in strongSwan and |
880 | + won't be see upstream issue #2160. |
881 | + + Ubuntu is not using the debconf triggered private key generation |
882 | + - d/rules: Removed patching ipsec.conf on build (not using the |
883 | + debconf-managed config.) |
884 | + - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was |
885 | + used for debconf-managed include of private key). |
886 | + + Mass enablement of extra plugins and features to allow a user to use |
887 | + strongswan for a variety of extra use cases without having to rebuild. |
888 | + - d/control: Add required additional build-deps |
889 | + - d/control: Mention addtionally enabled plugins |
890 | + - d/rules: Enable features at configure stage |
891 | + - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf) |
892 | + - d/libstrongswan.install: Add plugins (so, conf) |
893 | + + d/strongswan-starter.install: Install pool feature, which is useful since |
894 | + we have attr-sql plugin enabled as well using it. |
895 | + + Add plugin kernel-libipsec to allow the use of strongswan in containers |
896 | + via this userspace implementation (please do note that this is still |
897 | + considered experimental by upstream). |
898 | + - d/libcharon-extra-plugins.install: Add kernel-libipsec components |
899 | + - d/control: List kernel-libipsec plugin at extra plugins description |
900 | + - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As |
901 | + upstream recommends to not load kernel-libipsec by default. |
902 | + + Relocate tnc plugin |
903 | + - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins |
904 | + - Add new subpackage for TNC in d/strongswan-tnc-* and d/control |
905 | + + d/libstrongswan.install: Reorder conf and .so alphabetically |
906 | + + d/libstrongswan.install: Add kernel-netlink configuration files |
907 | + + Complete the disabling of libfast; This was partially accepted in Debian, |
908 | + it is no more packaging medcli and medsrv, but still builds and |
909 | + mentions it. |
910 | + - d/rules: Add --disable-fast to avoid build time and dependencies |
911 | + - d/control: Remove medcli, medsrv from package description |
912 | + + d/control: Mention mgf1 plugin which is in libstrongswan now |
913 | + + Add now built (since 5.5.1) libraries libtpmtss and nttfft to |
914 | + libstrongswan-extra-plugins (no deps from default plugins). |
915 | + + Add rm_conffile for /etc/init.d/ipsec (transition from precies had |
916 | + missed that, droppable after 18.04) |
917 | + + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon |
918 | + plugins for the most common use cases from extra-plugins into a new |
919 | + standard-plugins package. This will allow those use cases without pulling |
920 | + in too much more plugins (a bit like the tnc package). Recommend that |
921 | + package from strongswan-libcharon. |
922 | + + d/control: bump breaks/replaces from libstrongswan-extra-plugins to |
923 | + libstrongswan as we dropped relocating ccm and test-vectors. |
924 | + (droppable >18.04). |
925 | + + d/control: add breaks/replace from libstrongswan to |
926 | + libstrongswan-extra-plugins for the move of mgf1 to libstrongswan. |
927 | + (droppable >18.04). |
928 | + * Added Changes: |
929 | + + d/control: bump breaks/replaces from strongswan-libcharon to strongswan- |
930 | + starter as we followed Debian to move the updown plugin but need to |
931 | + match Ubuntu versions (Droppable >18.04). |
932 | + |
933 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Fri, 16 Mar 2018 11:08:47 +0100 |
934 | + |
935 | strongswan (5.6.2-1) unstable; urgency=medium |
936 | |
937 | * d/NEWS: add information about disabled algorithms (closes: #883072) |
938 | @@ -293,6 +1131,129 @@ strongswan (5.6.1-3) unstable; urgency=medium |
939 | |
940 | -- Yves-Alexis Perez <corsac@debian.org> Sun, 17 Dec 2017 16:40:39 +0100 |
941 | |
942 | +strongswan (5.6.1-2ubuntu4) bionic; urgency=medium |
943 | + |
944 | + * SECURITY UPDATE: DoS via crafted RSASSA-PSS signature |
945 | + - debian/patches/CVE-2018-6459.patch: Properly handle MGF1 algorithm |
946 | + identifier without parameters in |
947 | + src/libstrongswan/credentials/keys/signature_params.c. |
948 | + - CVE-2018-6459 |
949 | + |
950 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 07 Mar 2018 14:52:02 +0100 |
951 | + |
952 | +strongswan (5.6.1-2ubuntu3) bionic; urgency=medium |
953 | + |
954 | + * No-change rebuild against libcurl4 |
955 | + |
956 | + -- Steve Langasek <steve.langasek@ubuntu.com> Wed, 28 Feb 2018 08:52:09 +0000 |
957 | + |
958 | +strongswan (5.6.1-2ubuntu2) bionic; urgency=high |
959 | + |
960 | + * No change rebuild against openssl1.1. |
961 | + |
962 | + -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 12 Feb 2018 16:00:24 +0000 |
963 | + |
964 | +strongswan (5.6.1-2ubuntu1) bionic; urgency=medium |
965 | + |
966 | + * Merge with Debian unstable (LP: #1717343). |
967 | + Also fixes and issue with multiple psk's (LP: #1734207). Remaining changes: |
968 | + + Clean up d/strongswan-starter.postinst: section about runlevel changes |
969 | + + Clean up d/strongswan-starter.postinst: Removed entire section on |
970 | + opportunistic encryption disabling - this was never in strongSwan and |
971 | + won't be see upstream issue #2160. |
972 | + + Ubuntu is not using the debconf triggered private key generation |
973 | + - d/rules: Removed patching ipsec.conf on build (not using the |
974 | + debconf-managed config.) |
975 | + - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was |
976 | + used for debconf-managed include of private key). |
977 | + + Mass enablement of extra plugins and features to allow a user to use |
978 | + strongswan for a variety of extra use cases without having to rebuild. |
979 | + - d/control: Add required additional build-deps |
980 | + - d/control: Mention addtionally enabled plugins |
981 | + - d/rules: Enable features at configure stage |
982 | + - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf) |
983 | + - d/libstrongswan.install: Add plugins (so, conf) |
984 | + + d/strongswan-starter.install: Install pool feature, which is useful since |
985 | + we have attr-sql plugin enabled as well using it. |
986 | + + Add plugin kernel-libipsec to allow the use of strongswan in containers |
987 | + via this userspace implementation (please do note that this is still |
988 | + considered experimental by upstream). |
989 | + - d/libcharon-extra-plugins.install: Add kernel-libipsec components |
990 | + - d/control: List kernel-libipsec plugin at extra plugins description |
991 | + - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As |
992 | + upstream recommends to not load kernel-libipsec by default. |
993 | + + Relocate tnc plugin |
994 | + - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins |
995 | + - Add new subpackage for TNC in d/strongswan-tnc-* and d/control |
996 | + + d/libstrongswan.install: Reorder conf and .so alphabetically |
997 | + + d/libstrongswan.install: Add kernel-netlink configuration files |
998 | + + Complete the disabling of libfast; This was partially accepted in Debian, |
999 | + it is no more packaging medcli and medsrv, but still builds and |
1000 | + mentions it. |
1001 | + - d/rules: Add --disable-fast to avoid build time and dependencies |
1002 | + - d/control: Remove medcli, medsrv from package description |
1003 | + + d/control: Mention mgf1 plugin which is in libstrongswan now |
1004 | + + Add now built (since 5.5.1) libraries libtpmtss and nttfft to |
1005 | + libstrongswan-extra-plugins (no deps from default plugins). |
1006 | + + Add rm_conffile for /etc/init.d/ipsec (transition from precies had |
1007 | + missed that, droppable after 18.04) |
1008 | + + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon |
1009 | + plugins for the most common use cases from extra-plugins into a new |
1010 | + standard-plugins package. This will allow those use cases without pulling |
1011 | + in too much more plugins (a bit like the tnc package). Recommend that |
1012 | + package from strongswan-libcharon. |
1013 | + * Added changes: |
1014 | + + d/strongswan-tnc-client.install (relocate tnc) swidtag creation changed |
1015 | + in 5.6 |
1016 | + + d/strongswan-tnc-server.install (relocate tnc) pacman no more needed |
1017 | + + d/control: bump breaks/replaces from libstrongswan-extra-plugins to |
1018 | + libstrongswan as we dropped relocating ccm and test-vectors. |
1019 | + (droppable >18.04). |
1020 | + - d/control: add breaks/replace from libstrongswan to |
1021 | + libstrongswan-extra-plugins for the move of mgf1 to libstrongswan. |
1022 | + (droppable >18.04). |
1023 | + * Dropped changes: |
1024 | + + Update init/service handling (debian default matches Ubuntu past now) |
1025 | + Dropping this fixes (LP: #1734886) |
1026 | + - d/rules: Change init/systemd program name to strongswan |
1027 | + - d/strongswan-starter.strongswan.service: Add new systemd file instead of |
1028 | + patching upstream |
1029 | + - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of |
1030 | + linking to upstream |
1031 | + + d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call |
1032 | + (this is a never failing no-op for us, no need for Delta). |
1033 | + + d/strongswan-starter.prerm: Stop strongswan service on package removal |
1034 | + (ipsec now maps to strongswan service, so this works as-is). |
1035 | + + Clean up d/strongswan-starter.postinst: rename service ipsec to |
1036 | + strongswan (ipsec now maps to strongswan service, so this works as-is) |
1037 | + + Clean up d/strongswan-starter.postinst: daemon enable/disable (the |
1038 | + whole section is disabled, so no need for delta) |
1039 | + + (is upstream) CVE-2017-11185 patches |
1040 | + + (is upstream) FTBFS upstream fix for changed include files |
1041 | + + (is upstream) debian/patches/increase-bliss-test-timeout.patch: Under |
1042 | + QEMU/KVM autopkgtest the bliss test takes longer than the default |
1043 | + + (in Debian) add now built (since 5.5.1) mgf1 plugin to |
1044 | + libstrongswan-extra-plugins. |
1045 | + + (in Debian) d/strongswan-starter.install: install stroke apparmor profile |
1046 | + + (this was enabled as part of the former delta, squash changes to no-up) |
1047 | + d/rules: Disable duplicheck. |
1048 | + + (not needed) Relocate plugins test-vectors from extra-plugins to |
1049 | + libstrongswan |
1050 | + - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles |
1051 | + - d/libstrongswan.install: Add plugins/confiles |
1052 | + - d/control: move package descriptions and add required breaks/replaces |
1053 | + + (not needed) Relocate plugins ccm from extra-plugins to libstrongswan |
1054 | + - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles |
1055 | + - d/libstrongswan.install: Add plugins/confiles |
1056 | + - d/control: move package descriptions and add required breaks/replaces |
1057 | + + (while using it requires special kernel, it does not hurt to be |
1058 | + available in the package) Remove ha plugin |
1059 | + - d/libcharon-extra-plugins.install: Stop installing ha (so, conf) |
1060 | + - d/rules: Do not enable ha plugin |
1061 | + - d/control: Drop listing the ha plugin in the package description |
1062 | + |
1063 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 29 Nov 2017 15:55:18 +0100 |
1064 | + |
1065 | strongswan (5.6.1-2) unstable; urgency=medium |
1066 | |
1067 | * move counters plugin from -starter to -libcharon. closes: #882431 |
1068 | @@ -379,6 +1340,213 @@ strongswan (5.5.2-1) experimental; urgency=medium |
1069 | |
1070 | -- Yves-Alexis Perez <corsac@debian.org> Fri, 19 May 2017 11:32:00 +0200 |
1071 | |
1072 | +strongswan (5.5.1-4ubuntu3) bionic; urgency=medium |
1073 | + |
1074 | + * Fix Artful FTBFS due to newer glibc (LP: #1724859) |
1075 | + - d/p/utils-Include-stdint.h.patch: upstream fix for changed include |
1076 | + files. |
1077 | + |
1078 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 19 Oct 2017 15:18:52 +0200 |
1079 | + |
1080 | +strongswan (5.5.1-4ubuntu2) artful; urgency=medium |
1081 | + |
1082 | + * SECURITY UPDATE: Fix RSA signature verification |
1083 | + - debian/patches/CVE-2017-11185.patch: does some |
1084 | + verifications in order to avoid null-point dereference |
1085 | + in src/libstrongswan/gmp/gmp_rsa_public_key.c |
1086 | + - CVE-2017-11185 |
1087 | + |
1088 | + -- Leonidas S. Barbosa <leo.barbosa@canonical.com> Tue, 15 Aug 2017 14:49:49 -0300 |
1089 | + |
1090 | +strongswan (5.5.1-4ubuntu1) artful; urgency=medium |
1091 | + |
1092 | + * Merge from Debian to pick up latest security changes (CVE-2017-9022, |
1093 | + CVE-2017-9023). |
1094 | + * Remaining Changes: |
1095 | + + Update init/service handling |
1096 | + - d/rules: Change init/systemd program name to strongswan |
1097 | + - d/strongswan-starter.strongswan.service: Add new systemd file instead of |
1098 | + patching upstream |
1099 | + - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of |
1100 | + linking to upstream |
1101 | + - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call. |
1102 | + - d/strongswan-starter.prerm: Stop strongswan service on package |
1103 | + removal (as opposed to using the old init.d script). |
1104 | + + Clean up d/strongswan-starter.postinst: |
1105 | + - Removed section about runlevel changes |
1106 | + - Adapted service restart section for Upstart (kept to be Trusty |
1107 | + backportable). |
1108 | + - Remove old symlinks to init.d files is necessary. |
1109 | + - Removed further out-dated code |
1110 | + - Removed entire section on opportunistic encryption - this was never in |
1111 | + strongSwan. |
1112 | + + d/rules: Removed pieces on 'patching ipsec.conf' on build. |
1113 | + + Mass enablement of extra plugins and features to allow a user to use |
1114 | + strongswan for a variety of use cases without having to rebuild. |
1115 | + - d/control: Add required additional build-deps |
1116 | + - d/rules: Enable features at configure stage |
1117 | + - d/control: Mention addtionally enabled plugins |
1118 | + - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf) |
1119 | + - d/libstrongswan.install: Add plugins (so, conf) |
1120 | + + d/rules: Disable duplicheck as per |
1121 | + https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10 |
1122 | + + Remove ha plugin (requires special kernel) |
1123 | + - d/libcharon-extra-plugins.install: Stop installing ha (so, conf) |
1124 | + - d/rules: Do not enable ha plugin |
1125 | + - d/control: Drop listing the ha plugin in the package description |
1126 | + + Add plugin kernel-libipsec to allow the use of strongswan in containers |
1127 | + via this userspace implementation (please do note that this is still |
1128 | + considered experimental by upstream). |
1129 | + - d/libcharon-extra-plugins.install: Add kernel-libipsec components |
1130 | + - d/control: List kernel-libipsec plugin at extra plugins description |
1131 | + - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As |
1132 | + upstream recommends to not load kernel-libipsec by default. |
1133 | + + Relocate tnc plugin |
1134 | + - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins |
1135 | + - Add new subpackage for TNC in d/strongswan-tnc-* and d/control |
1136 | + + d/strongswan-starter.install: Install pool feature, that useful due to |
1137 | + having attr-sql plugin that is enabled now. |
1138 | + + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan |
1139 | + - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles |
1140 | + - d/libstrongswan.install: Add plugins/confiles |
1141 | + - d/control: move package descriptions and add required breaks/replaces |
1142 | + + d/libstrongswan.install: Reorder conf and .so alphabetically |
1143 | + + d/libstrongswan.install: Add kernel-netlink configuration files |
1144 | + + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference. |
1145 | + + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM |
1146 | + autopkgtest the bliss test takes longer than the default (Upstream in |
1147 | + 5.5.2 via issue 2204) |
1148 | + + Complete the disabling of libfast; This was partially accepted in Debian, |
1149 | + it is no more packaging medcli and medsrv, but still builds and |
1150 | + mentions it. |
1151 | + - d/rules: Add --disable-fast to avoid build time and dependencies |
1152 | + - d/control: Remove medcli, medsrv from package description |
1153 | + + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins. |
1154 | + "only" to extra-plugins Mgf1 is not listed as default plugin at |
1155 | + https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist. |
1156 | + + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to |
1157 | + libstrongswan-extra-plugins. |
1158 | + + Add missing mention of md4 plugin in d/control |
1159 | + + Add rm_conffile for /etc/init.d/ipsec (transition from precies had |
1160 | + missed that) |
1161 | + + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon |
1162 | + plugins for the most common use cases from extra-plugins into a new |
1163 | + standard-plugins package. This will allow those use cases without pulling |
1164 | + in too much more plugins (a bit like the tnc package). Recommend that |
1165 | + package from strongswan-libcharon. |
1166 | + |
1167 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 31 May 2017 15:57:54 +0200 |
1168 | + |
1169 | +strongswan (5.5.1-3ubuntu1) artful; urgency=medium |
1170 | + |
1171 | + * Merge from Debian to pick up latest changes. Among others this includes: |
1172 | + - a lot of the Delta we upstreamed to Debian (more discussions are ongoing |
1173 | + but likely have to wait until Debian stretch was released) |
1174 | + - enabling mediation support (LP: #1657413) |
1175 | + * Remaining Changes: |
1176 | + + Update init/service handling |
1177 | + - d/rules: Change init/systemd program name to strongswan |
1178 | + - d/strongswan-starter.strongswan.service: Add new systemd file instead of |
1179 | + patching upstream |
1180 | + - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of |
1181 | + linking to upstream |
1182 | + - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call. |
1183 | + - d/strongswan-starter.prerm: Stop strongswan service on package |
1184 | + removal (as opposed to using the old init.d script). |
1185 | + + Clean up d/strongswan-starter.postinst: |
1186 | + - Removed section about runlevel changes |
1187 | + - Adapted service restart section for Upstart (kept to be Trusty |
1188 | + backportable). |
1189 | + - Remove old symlinks to init.d files is necessary. |
1190 | + - Removed further out-dated code |
1191 | + - Removed entire section on opportunistic encryption - this was never in |
1192 | + strongSwan. |
1193 | + + d/rules: Removed pieces on 'patching ipsec.conf' on build. |
1194 | + + Mass enablement of extra plugins and features to allow a user to use |
1195 | + strongswan for a variety of use cases without having to rebuild. |
1196 | + - d/control: Add required additional build-deps |
1197 | + - d/rules: Enable features at configure stage |
1198 | + - d/control: Mention addtionally enabled plugins |
1199 | + - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf) |
1200 | + - d/libstrongswan.install: Add plugins (so, conf) |
1201 | + + d/rules: Disable duplicheck as per |
1202 | + https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10 |
1203 | + + Remove ha plugin (requires special kernel) |
1204 | + - d/libcharon-extra-plugins.install: Stop installing ha (so, conf) |
1205 | + - d/rules: Do not enable ha plugin |
1206 | + - d/control: Drop listing the ha plugin in the package description |
1207 | + + Add plugin kernel-libipsec to allow the use of strongswan in containers |
1208 | + via this userspace implementation (please do note that this is still |
1209 | + considered experimental by upstream). |
1210 | + - d/libcharon-extra-plugins.install: Add kernel-libipsec components |
1211 | + - d/control: List kernel-libipsec plugin at extra plugins description |
1212 | + - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As |
1213 | + upstream recommends to not load kernel-libipsec by default. |
1214 | + + Relocate tnc plugin |
1215 | + - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins |
1216 | + - Add new subpackage for TNC in d/strongswan-tnc-* and d/control |
1217 | + + d/strongswan-starter.install: Install pool feature, that useful due to |
1218 | + having attr-sql plugin that is enabled now. |
1219 | + + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan |
1220 | + - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles |
1221 | + - d/libstrongswan.install: Add plugins/confiles |
1222 | + - d/control: move package descriptions and add required breaks/replaces |
1223 | + + d/libstrongswan.install: Reorder conf and .so alphabetically |
1224 | + + d/libstrongswan.install: Add kernel-netlink configuration files |
1225 | + + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference. |
1226 | + + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM |
1227 | + autopkgtest the bliss test takes longer than the default (Upstream in |
1228 | + 5.5.2 via issue 2204) |
1229 | + + Complete the disabling of libfast; This was partially accepted in Debian, |
1230 | + it is no more packaging medcli and medsrv, but still builds and |
1231 | + mentions it. |
1232 | + - d/rules: Add --disable-fast to avoid build time and dependencies |
1233 | + - d/control: Remove medcli, medsrv from package description |
1234 | + + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins. |
1235 | + "only" to extra-plugins Mgf1 is not listed as default plugin at |
1236 | + https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist. |
1237 | + + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to |
1238 | + libstrongswan-extra-plugins. |
1239 | + + Add missing mention of md4 plugin in d/control |
1240 | + + Add rm_conffile for /etc/init.d/ipsec (transition from precies had |
1241 | + missed that) |
1242 | + + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon |
1243 | + plugins for the most common use cases from extra-plugins into a new |
1244 | + standard-plugins package. This will allow those use cases without pulling |
1245 | + in too much more plugins (a bit like the tnc package). Recommend that |
1246 | + package from strongswan-libcharon. |
1247 | + * Dropped Changes: |
1248 | + + Add and install apparmor profiles (in Debian) |
1249 | + - d/rules: Install AppArmor profiles |
1250 | + - d/control: Add dh-apparmor build-dep |
1251 | + - d/usr.lib.ipsec.{charon, lookip, stroke}: Add latest AppArmor profiles |
1252 | + for charon, lookip and stroke |
1253 | + - d/libcharon-extra-plugins.install: Install profile for lookip |
1254 | + - d/strongswan-charon.install: Install profile for charon |
1255 | + - d/strongswan-starter.install: Install profile for stroke |
1256 | + - Fix strongswan ipsec status issue with apparmor |
1257 | + - Fix Dep8 tests for the now extra strongswan-pki package for pki |
1258 | + - Fix Dep8 tests for the now extra strongswan-scepclient package |
1259 | + + d/rules: Sorted and only one enable option per configure line (in |
1260 | + Debian) |
1261 | + + Add updated logcheck rules (in Debian) |
1262 | + - debian/libstrongswan.strongswan.logcheck.*: Remove outdated files |
1263 | + - debian/strongswan.logcheck: Add updated logcheck rules |
1264 | + + Add updated DEP8 tests (in Debian) |
1265 | + - d/tests/*: Add DEP8 tests |
1266 | + - d/control: Enable autotestpkg |
1267 | + + d/rules: do not strip for library integrity checking (After Discussion |
1268 | + with Debian this isn't acceptable there, but at the same time it turned |
1269 | + out the real use-case of this never uses this lib but instead third |
1270 | + party checks of checksums for e.g. FIPS cert; so drop the Delta) |
1271 | + - Use override_dh_strip to to avoid overwriting user build flags. |
1272 | + - Add missing mention of libchecksum integrity test in d/control |
1273 | + + d/rules: Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths |
1274 | + in tests to avoid issues in low entropy environments. (Debian has |
1275 | + disabled !x86 tests for the same reason, one solution is enough) |
1276 | + |
1277 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 04 May 2017 14:06:23 +0200 |
1278 | + |
1279 | strongswan (5.5.1-3) unstable; urgency=medium |
1280 | |
1281 | [ Christian Ehrhardt ] |
1282 | @@ -412,6 +1580,136 @@ strongswan (5.5.1-2) unstable; urgency=medium |
1283 | |
1284 | -- Yves-Alexis Perez <corsac@debian.org> Wed, 07 Dec 2016 08:34:52 +0100 |
1285 | |
1286 | +strongswan (5.5.1-1ubuntu2) zesty; urgency=medium |
1287 | + |
1288 | + * Update Maintainers which was missed while merging 5.5.1-1. |
1289 | + |
1290 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 19 Dec 2016 16:02:40 +0100 |
1291 | + |
1292 | +strongswan (5.5.1-1ubuntu1) zesty; urgency=medium |
1293 | + |
1294 | + * Merge from Debian (complex delta, discussions and broken out changes can be |
1295 | + found in the merge proposal linked from the merge bug LP: #1631198) |
1296 | + * Remaining Changes: |
1297 | + + d/rules: Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity |
1298 | + checking. |
1299 | + + d/rules: Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths |
1300 | + in tests to avoid issues in low entropy environments. |
1301 | + + Update init/service handling |
1302 | + - d/rules: Change init/systemd program name to strongswan |
1303 | + - d/strongswan-starter.strongswan.service: Add new systemd file instead of |
1304 | + patching upstream |
1305 | + - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of |
1306 | + linking to upstream |
1307 | + - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call. |
1308 | + - d/strongswan-starter.prerm: Stop strongswan service on package |
1309 | + removal (as opposed to using the old init.d script). |
1310 | + + Clean up d/strongswan-starter.postinst: |
1311 | + - Removed section about runlevel changes |
1312 | + - Adapted service restart section for Upstart (kept to be Trusty |
1313 | + backportable). |
1314 | + - Remove old symlinks to init.d files is necessary. |
1315 | + - Removed further out-dated code |
1316 | + - Removed entire section on opportunistic encryption - this was never in |
1317 | + strongSwan. |
1318 | + + Add and install apparmor profiles |
1319 | + - d/rules: Install AppArmor profiles |
1320 | + - d/control: Add dh-apparmor build-dep |
1321 | + - d/usr.lib.ipsec.{charon, lookip, stroke}: Add latest AppArmor profiles |
1322 | + for charon, lookip and stroke |
1323 | + - d/libcharon-extra-plugins.install: Install profile for lookip |
1324 | + - d/strongswan-charon.install: Install profile for charon |
1325 | + - d/strongswan-starter.install: Install profile for stroke |
1326 | + + d/rules: Removed pieces on 'patching ipsec.conf' on build. |
1327 | + + d/rules: Sorted and only one enable option per configure line |
1328 | + + Mass enablement of extra plugins and features to allow a user to use |
1329 | + strongswan for a variety of use cases without having to rebuild. |
1330 | + - d/control: Add required additional build-deps |
1331 | + - d/rules: Enable features at configure stage |
1332 | + - d/control: Mention addtionally enabled plugins |
1333 | + - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf) |
1334 | + - d/libstrongswan.install: Add plugins (so, conf) |
1335 | + + d/rules: Disable duplicheck as per |
1336 | + https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10 |
1337 | + + Remove ha plugin (requires special kernel) |
1338 | + - d/libcharon-extra-plugins.install: Stop installing ha (so, conf) |
1339 | + - d/rules: Do not enable ha plugin |
1340 | + - d/control: Drop listing the ha plugin in the package description |
1341 | + + Add plugin kernel-libipsec to allow the use of strongswan in containers |
1342 | + via this userspace implementation (please do note that this is still |
1343 | + considered experimental by upstream). |
1344 | + - d/libcharon-extra-plugins.install: Add kernel-libipsec components |
1345 | + - d/control: List kernel-libipsec plugin at extra plugins description |
1346 | + - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As |
1347 | + upstream recommends to not load kernel-libipsec by default. |
1348 | + + Relocate tnc plugin |
1349 | + - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins |
1350 | + - Add new subpackage for TNC in d/strongswan-tnc-* and d/control |
1351 | + + d/strongswan-starter.install: Install pool feature, that useful due to |
1352 | + having attr-sql plugin that is enabled now. |
1353 | + + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan |
1354 | + - d/libstrongswan-extra-plugins.install: Remove plugins |
1355 | + - d/libstrongswan.install: Add plugins |
1356 | + + d/libstrongswan.install: Reorder conf and .so alphabetically |
1357 | + + d/libstrongswan.install: Add kernel-netlink configuration files |
1358 | + + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference. |
1359 | + + Add updated logcheck rules |
1360 | + - debian/libstrongswan.strongswan.logcheck.*: Remove outdated files |
1361 | + - debian/strongswan.logcheck: Add updated logcheck rules |
1362 | + + Add updated DEP8 tests |
1363 | + - d/tests/*: Add DEP8 tests |
1364 | + - d/control: Enable autotestpkg |
1365 | + + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM |
1366 | + autopkgtest the bliss test takes longer than the default |
1367 | + + Complete the disabling of libfast |
1368 | + - Note: This was partially accepted in Debian, it is no more |
1369 | + packaging medcli and medsrv, but still builds and mentions it |
1370 | + - d/rules: Add --disable-fast to avoid build time and dependencies |
1371 | + - d/control: Remove medcli, medsrv from package description |
1372 | + * Dropped Changes: |
1373 | + + Adding build-dep to iptables-dev (no change, was only in Changelog) |
1374 | + + Dropping of build deps libfcgi-dev, clearsilver-dev (in Debian) |
1375 | + + Adding strongswan-plugin-* virtual packages for dist-upgrade (no |
1376 | + upgrade path left needing them) |
1377 | + + Most of "disabling libfast" (Debian dropped it from package content) |
1378 | + + Transition for ipsec service (no upgrade path left) |
1379 | + + Reverted part of the cleanup to d/strongswan-starter.postinst as using |
1380 | + service should rather use invoke-rc.d (so it is a partial revert of our |
1381 | + delta) |
1382 | + + Transition handling (breaks/replaces) from per-plugin packages to the |
1383 | + three grouped plugin packages (no upgrade path left) |
1384 | + + debian/strongswan-starter.dirs: Don't touch /etc/init.d. (while "correct" |
1385 | + it is effectively a no-op still, so not worth the delta) |
1386 | + + Lower dpkg-dev to 1.16.1 from 1.16.2 to enable backporting to Precise |
1387 | + (no more needed) |
1388 | + + d/rules: Remove configure option --enable-unit-test (unit tests run by |
1389 | + default) |
1390 | + * Added Changes: |
1391 | + + Fix strongswan ipsec status issue with apparmor (LP: #1587886) |
1392 | + + d/control, d/libstrongswan.install, d/libstrongswan-extra-plugins: Fixup |
1393 | + the relocation of the ccm plugin which missed to move the conffiles. |
1394 | + + Complete move of test-vectors (was missing in d/control) |
1395 | + + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins. |
1396 | + "only" to extra-plugins Mgf1 is not listed as default plugin at |
1397 | + https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist. |
1398 | + + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to |
1399 | + libstrongswan-extra-plugins. |
1400 | + + Add missing mention of md4 plugin in d/control |
1401 | + + Add missing mention of libchecksum integrity test in d/control |
1402 | + + Add rm_conffile for /etc/init.d/ipsec (transition from precies had |
1403 | + missed that) |
1404 | + + Use override_dh_strip to to fix library integrity checking instead of |
1405 | + DEB_BUILD_OPTION to avoid overwriting user build flags. |
1406 | + + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon |
1407 | + plugins for the most common use cases from extra-plugins into a new |
1408 | + standard-plugins package. This will allow those use cases without pulling |
1409 | + in too much more plugins (a bit like the tnc package). Recommend that |
1410 | + package from strongswan-libcharon (LP: #1640826). |
1411 | + + Fix Dep8 tests for the now extra strongswan-pki package for pki |
1412 | + + Fix Dep8 tests for the now extra strongswan-scepclient package |
1413 | + |
1414 | + -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 07 Nov 2016 16:16:41 +0100 |
1415 | + |
1416 | strongswan (5.5.1-1) unstable; urgency=medium |
1417 | |
1418 | * New upstream bugfix release. |
1419 | @@ -528,6 +1826,177 @@ strongswan (5.3.5-2) unstable; urgency=medium |
1420 | |
1421 | -- Yves-Alexis Perez <corsac@debian.org> Mon, 14 Mar 2016 23:53:34 +0100 |
1422 | |
1423 | +strongswan (5.3.5-1ubuntu4) yakkety; urgency=medium |
1424 | + |
1425 | + * Build-depend on libjson-c-dev instead of libjson0-dev. |
1426 | + * Rebuild against libjson-c3. |
1427 | + |
1428 | + -- Graham Inggs <ginggs@ubuntu.com> Fri, 29 Apr 2016 19:04:22 +0200 |
1429 | + |
1430 | +strongswan (5.3.5-1ubuntu3) xenial; urgency=medium |
1431 | + |
1432 | + * Rebuild against libmysqlclient20. |
1433 | + |
1434 | + -- Robie Basak <robie.basak@ubuntu.com> Tue, 05 Apr 2016 13:02:48 +0000 |
1435 | + |
1436 | +strongswan (5.3.5-1ubuntu2) xenial; urgency=medium |
1437 | + |
1438 | + * debian/tests/plugins: rdrand may or may not be loaded, depending on the |
1439 | + cpu features. |
1440 | + |
1441 | + -- Iain Lane <iain@orangesquash.org.uk> Mon, 22 Feb 2016 17:13:01 +0000 |
1442 | + |
1443 | +strongswan (5.3.5-1ubuntu1) xenial; urgency=medium |
1444 | + |
1445 | + * debian/{rules,control,libstrongswan-extra-plugins.install} |
1446 | + Enable bliss plugin |
1447 | + * debian/{rules,control,libstrongswan-extra-plugins.install} |
1448 | + Enable chapoly plugin |
1449 | + * debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch |
1450 | + Upstream suggests to not load this plugin by default as it has |
1451 | + some limitations. |
1452 | + https://wiki.strongswan.org/projects/strongswan/wiki/Kernel-libipsec |
1453 | + * debian/patches/increase-bliss-test-timeout.patch |
1454 | + Under QEMU/KVM for autopkgtest bliss test takes a bit longer then default |
1455 | + * Update Apparmor profiles |
1456 | + - usr.lib.ipsec.charon |
1457 | + - add capability audit_write for xauth-pam (LP: #1470277) |
1458 | + - add capability dac_override (needed by agent plugin) |
1459 | + - allow priv dropping (LP: #1333655) |
1460 | + - allow caching CRLs (LP: #1505222) |
1461 | + - allow rw access to /dev/net/tun for kernel-libipsec (LP: #1309594) |
1462 | + - usr.lib.ipsec.stroke |
1463 | + - allow priv dropping (LP: #1333655) |
1464 | + - add local include |
1465 | + - usr.lib.ipsec.lookip |
1466 | + - add local include |
1467 | + * Merge from Debian, which includes fixes for all previous CVEs |
1468 | + Fixes (LP: #1330504, #1451091, #1448870, #1470277) |
1469 | + Remaining changes: |
1470 | + * debian/control |
1471 | + - Lower dpkg-dev to 1.16.1 from 1.16.2 to enable backporting to Precise |
1472 | + - Update Maintainer for Ubuntu |
1473 | + - Add build-deps |
1474 | + - dh-apparmor |
1475 | + - iptables-dev |
1476 | + - libjson0-dev |
1477 | + - libldns-dev |
1478 | + - libmysqlclient-dev |
1479 | + - libpcsclite-dev |
1480 | + - libsoup2.4-dev |
1481 | + - libtspi-dev |
1482 | + - libunbound-dev |
1483 | + - Drop build-deps |
1484 | + - libfcgi-dev |
1485 | + - clearsilver-dev |
1486 | + - Create virtual packages for all strongswan-plugin-* for dist-upgrade |
1487 | + - Set XS-Testsuite: autopkgtest |
1488 | + * debian/rules: |
1489 | + - Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity checking. |
1490 | + - Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths in |
1491 | + tests. |
1492 | + - Change init/systemd program name to strongswan |
1493 | + - Install AppArmor profiles |
1494 | + - Removed pieces on 'patching ipsec.conf' on build. |
1495 | + - Enablement of features per Ubuntu current config suggested from |
1496 | + upstream recommendation |
1497 | + - Unpack and sort enabled features to one-per-line |
1498 | + - Disable duplicheck as per |
1499 | + https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10 |
1500 | + - Disable libfast (--disable-fast): |
1501 | + Requires dropping medsrv, medcli plugins which depend on libfast |
1502 | + - Add configure options |
1503 | + --with-tss=trousers |
1504 | + - Remove configure options: |
1505 | + --enable-ha (requires special kernel) |
1506 | + --enable-unit-test (unit tests run by default) |
1507 | + - Drop logcheck install |
1508 | + * debian/tests/* |
1509 | + - Add DEP8 test for strongswan service and plugins |
1510 | + * debian/strongswan-starter.strongswan.service |
1511 | + - Add new systemd file instead of patching upstream |
1512 | + * debian/strongswan-starter.links |
1513 | + - removed, use Ubuntu systemd file instead of linking to upstream |
1514 | + * debian/usr.lib.ipsec.{charon, lookip, stroke} |
1515 | + - added AppArmor profiles for charon, lookip and stroke |
1516 | + * debian/libcharon-extra-plugins.install |
1517 | + - Add plugins |
1518 | + - kernel-libipsec.{so, lib, conf, apparmor} |
1519 | + - Remove plugins |
1520 | + - libstrongswan-ha.so |
1521 | + - Relocate plugins |
1522 | + - libstrongswan-tnc-tnccs.so (strongswan-tnc-base.install) |
1523 | + * debian/libstrongswan-extra-plugins.install |
1524 | + - Add plugins (so, lib, conf) |
1525 | + - acert |
1526 | + - attr-sql |
1527 | + - coupling |
1528 | + - dnscert |
1529 | + - fips-prf |
1530 | + - gmp |
1531 | + - ipseckey |
1532 | + - load-tester |
1533 | + - mysql |
1534 | + - ntru |
1535 | + - radattr |
1536 | + - soup |
1537 | + - sqlite |
1538 | + - sql |
1539 | + - systime-fix |
1540 | + - unbound |
1541 | + - whitelist |
1542 | + - Relocate plugins (so, lib, conf) |
1543 | + - ccm (libstrongswan.install) |
1544 | + - test-vectors (libstrongswan.install) |
1545 | + * debian/libstrongswan.install |
1546 | + - Sort sections |
1547 | + - Add plugins (so, lib, conf) |
1548 | + - libchecksum |
1549 | + - ccm |
1550 | + - eap-identity |
1551 | + - md4 |
1552 | + - test-vectors |
1553 | + * debian/strongswan-charon.install |
1554 | + - Add AppArmor profile for charon |
1555 | + * debian/strongswan-starter.install |
1556 | + - Add tools, manpages, conf |
1557 | + - openac |
1558 | + - pool |
1559 | + - _updown_espmark |
1560 | + - Add AppArmor profile for stroke |
1561 | + * debian/strongswan-tnc-base.install |
1562 | + - Add new subpackage for TNC |
1563 | + - remove non-existent (dropped in 5.2.1) libpts library files |
1564 | + * debian/strongswan-tnc-client.install |
1565 | + - Add new subpackage for TNC |
1566 | + * debian/strongswan-tnc-ifmap.install |
1567 | + - Add new subpackage for TNC |
1568 | + * debian/strongswan-tnc-pdp.install |
1569 | + - Add new subpackage for TNC |
1570 | + * debian/strongswan-tnc-server.install |
1571 | + - Add new subpackage for TNC |
1572 | + * debian/strongswan-starter.postinit: |
1573 | + - Removed section about runlevel changes, it's almost 2014. |
1574 | + - Adapted service restart section for Upstart. |
1575 | + - Remove old symlinks to init.d files is necessary. |
1576 | + * debian/strongswan-starter.dirs: Don't touch /etc/init.d. |
1577 | + * debian/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call. |
1578 | + * debian/strongswan-starter.prerm: Stop strongswan service on package |
1579 | + removal (as opposed to using the old init.d script). |
1580 | + * debian/libstrongswan.strongswan.logcheck combined into debian/strongswan.logcheck |
1581 | + - logcheck patterns updated to be helpful |
1582 | + * debian/strongswan-starter.postinst: Removed further out-dated code and |
1583 | + entire section on opportunistic encryption - this was never in strongSwan. |
1584 | + * debian/ipsec.secrets.proto: Removed ipsec.secrets.inc reference. |
1585 | + Drop changes: |
1586 | + * debian/control |
1587 | + - Per-plugin package breakup: Reducing packaging delta from Debian |
1588 | + - Don't build dhcp, farp subpackages: Reduce packging delta from Debian |
1589 | + * debian/watch: Already exists in Debian merge |
1590 | + * debian/upstream/signing-key.asc: Upstream has newer version. |
1591 | + |
1592 | + -- Ryan Harper <ryan.harper@canonical.com> Fri, 12 Feb 2016 11:24:53 -0600 |
1593 | + |
1594 | strongswan (5.3.5-1) unstable; urgency=medium |
1595 | |
1596 | * New upstream bugfix release. |
1597 | @@ -800,6 +2269,210 @@ strongswan (5.1.2-1) unstable; urgency=medium |
1598 | |
1599 | -- Yves-Alexis Perez <corsac@debian.org> Wed, 12 Mar 2014 11:22:38 +0100 |
1600 | |
1601 | +strongswan (5.1.2-0ubuntu8) xenial; urgency=medium |
1602 | + |
1603 | + * Import FTBFS for s390x from Debian 5.1.2-3 upload. (LP: #1521240) |
1604 | + |
1605 | + -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 30 Nov 2015 15:46:06 +0000 |
1606 | + |
1607 | +strongswan (5.1.2-0ubuntu7) xenial; urgency=medium |
1608 | + |
1609 | + * SECURITY UPDATE: authentication bypass in eap-mschapv2 plugin |
1610 | + - debian/patches/CVE-2015-8023.patch: only succeed authentication if |
1611 | + MSK was established in |
1612 | + src/libcharon/plugins/eap_mschapv2/eap_mschapv2.c. |
1613 | + - CVE-2015-8023 |
1614 | + * debian/patches/disable_ntru_test.patch: disable test causing FTBFS |
1615 | + until regression is properly investigated. |
1616 | + |
1617 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 19 Nov 2015 14:00:17 -0500 |
1618 | + |
1619 | +strongswan (5.1.2-0ubuntu6) wily; urgency=medium |
1620 | + |
1621 | + * SECURITY UPDATE: user credential disclosure to rogue servers |
1622 | + - debian/patches/CVE-2015-4171.patch: enforce remote authentication |
1623 | + config before proceeding with own authentication in |
1624 | + src/libcharon/sa/ikev2/tasks/ike_auth.c. |
1625 | + - CVE-2015-4171 |
1626 | + * debian/rules: don't FTBFS from unused service file |
1627 | + |
1628 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 08 Jun 2015 12:50:38 -0400 |
1629 | + |
1630 | +strongswan (5.1.2-0ubuntu5) vivid; urgency=medium |
1631 | + |
1632 | + * Add a systemd unit corresponding to strongswan-starter.strongswan.upstart. |
1633 | + |
1634 | + -- Martin Pitt <martin.pitt@ubuntu.com> Fri, 16 Jan 2015 08:27:54 +0100 |
1635 | + |
1636 | +strongswan (5.1.2-0ubuntu4) vivid; urgency=medium |
1637 | + |
1638 | + * SECURITY UPDATE: denial of service via DH group 1025 |
1639 | + - debian/patches/CVE-2014-9221.patch: define MODP_CUSTOM outside of |
1640 | + IKE DH range in src/libstrongswan/crypto/diffie_hellman.c, |
1641 | + src/libstrongswan/crypto/diffie_hellman.h. |
1642 | + - CVE-2014-9221 |
1643 | + |
1644 | + -- Tyler Hicks <tyhicks@canonical.com> Mon, 05 Jan 2015 08:25:29 -0500 |
1645 | + |
1646 | +strongswan (5.1.2-0ubuntu3) utopic; urgency=low |
1647 | + |
1648 | + * Added "libgcrypt20-dev | libgcrypt11-dev" to build dependencies to fix |
1649 | + build. |
1650 | + |
1651 | + -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 15 Oct 2014 16:49:18 +0000 |
1652 | + |
1653 | +strongswan (5.1.2-0ubuntu2) trusty; urgency=medium |
1654 | + |
1655 | + * SECURITY UPDATE: remote authentication bypass |
1656 | + - debian/patches/CVE-2014-2338.patch: reject CREATE_CHILD_SA exchange |
1657 | + on unestablished IKE_SAs in src/libcharon/sa/ikev2/task_manager_v2.c. |
1658 | + - CVE-2014-2338 |
1659 | + |
1660 | + -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 14 Apr 2014 11:24:34 -0400 |
1661 | + |
1662 | +strongswan (5.1.2-0ubuntu1) trusty; urgency=low |
1663 | + |
1664 | + * New upstream release. |
1665 | + |
1666 | + -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 01 Mar 2014 08:53:17 +0000 |
1667 | + |
1668 | +strongswan (5.1.2~rc2-0ubuntu2) trusty; urgency=low |
1669 | + |
1670 | + * debian/ipsec.secrets.proto: Removed ipsec.secrets.inc reference. |
1671 | + * debian/usr.lib.ipsec.charon: Allow read access to /run/charon. |
1672 | + |
1673 | + -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 19 Feb 2014 13:07:16 +0000 |
1674 | + |
1675 | +strongswan (5.1.2~rc2-0ubuntu1) trusty; urgency=low |
1676 | + |
1677 | + * New upstream release candidate. |
1678 | + |
1679 | + -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 19 Feb 2014 12:59:21 +0000 |
1680 | + |
1681 | +strongswan (5.1.2~rc1-0ubuntu4) trusty; urgency=medium |
1682 | + |
1683 | + * debian/strongswan-tnc-*.install: Fixed files so libraries go into correct |
1684 | + packages. |
1685 | + * debian/usr.lib.ipsec.stroke: Allow access to strongswan.d directories. |
1686 | + |
1687 | + -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 17 Feb 2014 18:12:38 +0000 |
1688 | + |
1689 | +strongswan (5.1.2~rc1-0ubuntu3) trusty; urgency=low |
1690 | + |
1691 | + * debian/rules: Exclude rdrand.conf in dh_install's --fail-missing. |
1692 | + |
1693 | + -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:46:46 +0000 |
1694 | + |
1695 | +strongswan (5.1.2~rc1-0ubuntu2) trusty; urgency=low |
1696 | + |
1697 | + * debian/libstrongswan.install: Moved rdrand plugin configuration to rules |
1698 | + as it's only useful on amd64. |
1699 | + * debian/watch: Added opts=pgpsigurlmangle option. |
1700 | + * debian/upstream/signing-key.asc: Added key: 0xB34DBA77. |
1701 | + |
1702 | + -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:32:10 +0000 |
1703 | + |
1704 | +strongswan (5.1.2~rc1-0ubuntu1) trusty; urgency=medium |
1705 | + |
1706 | + * New upstream release candidate. |
1707 | + * debian/*.install - include new configuration files for plugins in |
1708 | + appropiate packages. |
1709 | + |
1710 | + -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:03:14 +0000 |
1711 | + |
1712 | +strongswan (5.1.2~dr3+git20130120-0ubuntu3) trusty; urgency=low |
1713 | + |
1714 | + * debian/control: |
1715 | + - Added Breaks/Replaces for all library files which have been moved |
1716 | + about (LP: #1278176). |
1717 | + - Removed build-dependency on check and added one on dh-apparmor. |
1718 | + * debian/strongswan-starter.postinst: Removed further out-dated code and |
1719 | + entire section on opportunistic encryption - this was never in strongSwan. |
1720 | + * debian/rules: Removed pieces on 'patching ipsec.conf' on build. |
1721 | + |
1722 | + -- Jonathan Davies <jonathan.davies@canonical.com> Sun, 09 Feb 2014 23:53:23 +0000 |
1723 | + |
1724 | +strongswan (5.1.2~dr3+git20130120-0ubuntu2) trusty; urgency=low |
1725 | + |
1726 | + * debian/control: Fixed references to plugin-fips-prf. |
1727 | + |
1728 | + -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 22 Jan 2014 11:22:14 +0000 |
1729 | + |
1730 | +strongswan (5.1.2~dr3+git20130120-0ubuntu1) trusty; urgency=low |
1731 | + |
1732 | + * Upstream Git snapshot for build fixes with regards to entropy. |
1733 | + * debian/rules: |
1734 | + - Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity checking. |
1735 | + - Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths in |
1736 | + tests. |
1737 | + |
1738 | + -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 20 Jan 2014 19:00:59 +0000 |
1739 | + |
1740 | +strongswan (5.1.2~dr3-0ubuntu1) trusty; urgency=low |
1741 | + |
1742 | + * New upstream developer release. |
1743 | + * Made changes to packaging per upstream suggestions. |
1744 | + - Dropped medcli and medsrv packages - not recommended by upstream at this |
1745 | + time. |
1746 | + - Dropped ha plugin - needs special kernel. |
1747 | + - Improved all package descriptions in general. |
1748 | + - Drop build-dep on clearsilver-dev and libfcgi-dev - no longer needed. |
1749 | + - Removed debian/*logcheck* files - not relevant to strongSwan. |
1750 | + - Split dhcp and farp packages into sub-packages. |
1751 | + - Build kernel-libipsec, ntru, systime-fix, and xauth-noauth plugins. |
1752 | + - Changes to TNC-related packages. |
1753 | + * Created AppArmor profiles for lookip and stroke. |
1754 | + |
1755 | + -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 15 Jan 2014 22:52:53 +0000 |
1756 | + |
1757 | +strongswan (5.1.2~dr2+git20130106-0ubuntu2) trusty; urgency=low |
1758 | + |
1759 | + * libstrongswan.install: Removed lingering unit-tester.so reference. |
1760 | + |
1761 | + -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 06 Jan 2014 20:29:59 +0000 |
1762 | + |
1763 | +strongswan (5.1.2~dr2+git20130106-0ubuntu1) trusty; urgency=low |
1764 | + |
1765 | + * Git snapshot of commit 94e10f15e51ead788d9947e966878ebfdc95b7ce. |
1766 | + Incorporates upstream fixes for: |
1767 | + - Integrity testing. |
1768 | + - Unit test failures on little endian systems. |
1769 | + * Dropped debian/patches/02_test_asn1_fix_32bit_time_test.patch - fixed |
1770 | + upstream. |
1771 | + * debian/rules: |
1772 | + - Stop using CK_TIMEOUT_MULTIPLIER. |
1773 | + - Stop enabling the test suite only on non-powerpc arches (it runs |
1774 | + anyway). |
1775 | + |
1776 | + -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 06 Jan 2014 20:17:20 +0000 |
1777 | + |
1778 | +strongswan (5.1.2~dr2-0ubuntu3) trusty; urgency=low |
1779 | + |
1780 | + * debian/control: Reinstate missing comma in dependencies. |
1781 | + |
1782 | + -- Jonathan Davies <jonathan.davies@canonical.com> Fri, 03 Jan 2014 05:39:13 +0000 |
1783 | + |
1784 | +strongswan (5.1.2~dr2-0ubuntu2) trusty; urgency=low |
1785 | + |
1786 | + * Added debian/patches/02_test_asn1_fix_32bit_time_test.patch - fixes issue |
1787 | + where test for >2038 tests on 32-bit platforms is broken. |
1788 | + - Reported upstream: https://wiki.strongswan.org/issues/477 |
1789 | + * debian/control: Added strongswan-plugin-ntru to strongswan-ike Suggests. |
1790 | + |
1791 | + -- Jonathan Davies <jonathan.davies@canonical.com> Fri, 03 Jan 2014 05:02:32 +0000 |
1792 | + |
1793 | +strongswan (5.1.2~dr2-0ubuntu1) trusty; urgency=low |
1794 | + |
1795 | + * New upstream developer release. |
1796 | + * debian/rules: Configure with: --enable-af-alg, --enable-ntru, --enable-soup, |
1797 | + and --enable-unity. |
1798 | + * debian/control: |
1799 | + - New plugin packages created for the above |
1800 | + - Split fips-prf into its own package. |
1801 | + - Added build-dependency on libsoup2.4-dev. |
1802 | + |
1803 | + -- Jonathan Davies <jonathan.davies@canonical.com> Thu, 02 Jan 2014 17:37:33 +0000 |
1804 | + |
1805 | strongswan (5.1.1-3) unstable; urgency=low |
1806 | |
1807 | * Upload to unstable. |
1808 | @@ -891,6 +2564,192 @@ strongswan (5.1.1-1) unstable; urgency=low |
1809 | |
1810 | -- Yves-Alexis Perez <corsac@debian.org> Fri, 24 Jan 2014 21:22:32 +0100 |
1811 | |
1812 | +strongswan (5.1.1-0ubuntu17) trusty; urgency=low |
1813 | + |
1814 | + * debian/control: |
1815 | + - Make strongswan-ike depend on iproute2. |
1816 | + - Added xauth plugin dependency on strongswan-plugin-eap-gtc. |
1817 | + - Created strongswan-libfast package. |
1818 | + |
1819 | + -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 01 Jan 2014 17:04:45 +0000 |
1820 | + |
1821 | +strongswan (5.1.1-0ubuntu16) trusty; urgency=low |
1822 | + |
1823 | + * debian/control: |
1824 | + - Further splitting of plugins into subpackages (such as all EAP plugins |
1825 | + to their own packages). |
1826 | + - Added libpcsclite-dev to build-dependencies. |
1827 | + * debian/rules: |
1828 | + - Sort configure options in alphabetical order. |
1829 | + - Added configure option of --enable-eap-aka-3gpp2, --enable-eap-dynamic, |
1830 | + --enable-eap-sim-file, --enable-eap-sim-pcsc, |
1831 | + --enable-eap-simaka-pseudonym, --enable-eap-simaka-reauth and |
1832 | + --enable-eap-simaka-sql. |
1833 | + - Don't exclude medsrv from install. |
1834 | + * Moved eap-identity.so to libstrongswan package as it's used by all the |
1835 | + other EAP plugins. |
1836 | + |
1837 | + -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 21:25:50 +0000 |
1838 | + |
1839 | +strongswan (5.1.1-0ubuntu15) trusty; urgency=low |
1840 | + |
1841 | + * debian/control: |
1842 | + - Split plugins from libstrongswan package into modular subpackages. |
1843 | + - Added libmysqlclient-dev to build-dependencies. |
1844 | + - strongswan-ike: Set to depend on either strongswan-plugins-openssl or |
1845 | + strongswan-plugins-gcrypt. |
1846 | + - strongswan-ike: All other plugins added to Suggests. |
1847 | + - Created two new TNC packages: strongswan-tnc-ifmap and |
1848 | + strongswan-tnc-pdp and added to tnc-imcvs Suggests. |
1849 | + * debian/rules: Added to CONFIGUREARGS: --enable-certexpire, |
1850 | + --enable-error-notify, --enable-mysql, --enable-load-tester, |
1851 | + --enable-radattr, --enable-tnc-pdp, and --enable-whitelist. |
1852 | + * debian/strongswan-ike.install: Moved eap-identity.so to -tnc-imcvs package. |
1853 | + |
1854 | + -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 16:15:32 +0000 |
1855 | + |
1856 | +strongswan (5.1.1-0ubuntu14) trusty; urgency=low |
1857 | + |
1858 | + * debian/rules: |
1859 | + - CK_TIMEOUT_MULTIPLIER back down to 6. |
1860 | + - Disable unit tests on powerpc. |
1861 | + |
1862 | + -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:39:48 +0000 |
1863 | + |
1864 | +strongswan (5.1.1-0ubuntu13) trusty; urgency=low |
1865 | + |
1866 | + * debian/rules: CK_TIMEOUT_MULTIPLIER to 10 as just powerppc is being stubborn. |
1867 | + |
1868 | + -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:23:42 +0000 |
1869 | + |
1870 | +strongswan (5.1.1-0ubuntu12) trusty; urgency=low |
1871 | + |
1872 | + * debian/rules: Bring CK_TIMEOUT_MULTIPLIER up to 6 to fix powerppc and |
1873 | + armhf. |
1874 | + |
1875 | + -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:03:40 +0000 |
1876 | + |
1877 | +strongswan (5.1.1-0ubuntu11) trusty; urgency=low |
1878 | + |
1879 | + * 02_increase-test_rsa_generate-timeout.patch: Removed - only fixed build on |
1880 | + one extra arch. |
1881 | + * debian/rules: Set CK_TIMEOUT_MULTIPLIER to 4. |
1882 | + |
1883 | + -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 06:51:47 +0000 |
1884 | + |
1885 | +strongswan (5.1.1-0ubuntu10) trusty; urgency=low |
1886 | + |
1887 | + * debian/patches: Added patch 02_increase-test_rsa_generate-timeout.patch - |
1888 | + - Increases RSA key generate test timeout to 30 seconds so that it doesn't |
1889 | + fail on armhf, arm64, and powerppc. |
1890 | + * Contrary to what the last changelog entry says, we are still running |
1891 | + strongswan as root (with AppArmor protection). |
1892 | + |
1893 | + -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 06:06:47 +0000 |
1894 | + |
1895 | +strongswan (5.1.1-0ubuntu9) trusty; urgency=low |
1896 | + |
1897 | + * debian/rules: Added to configure options: |
1898 | + - --enable-tnc-ifmap: enable TNC IF-MAP module. |
1899 | + - --enable-duplicheck: enable duplicheck plugin. |
1900 | + - --enable-imv-swid, --enable-imc-swid: Added. |
1901 | + - Run strongswan as it's own user. |
1902 | + * debian/strongswan-starter.install: Install duplicheck. |
1903 | + * debian/strongswan-tnc-imcvs.install: Install swidtags. |
1904 | + |
1905 | + -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 19:33:27 +0000 |
1906 | + |
1907 | +strongswan (5.1.1-0ubuntu8) trusty; urgency=low |
1908 | + |
1909 | + * debian/rules: Added to configure options: |
1910 | + - --enable-unit-tests: check unit testing on build. |
1911 | + - --enable-unbound: for validating DNS lookups. |
1912 | + - --enable-dnscert: for DNSCERT peer authentication. |
1913 | + - --enable-ipseckey: for IPSEC key authentication. |
1914 | + - --enable-lookip: for LookIP functionality. |
1915 | + - --enable-coupling: certificate coupling functionality. |
1916 | + * debian/control: Added check, libldns-dev, libunbound-dev to |
1917 | + build-dependencies. |
1918 | + * debian/libstrongswan.install: Install new plugin .so's. |
1919 | + * debian/strongswan-starter.install: Added lookip. |
1920 | + |
1921 | + -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:52:07 +0000 |
1922 | + |
1923 | +strongswan (5.1.1-0ubuntu7) trusty; urgency=low |
1924 | + |
1925 | + * strongswan-starter.install: Moved pt-tls-client to tnc-imcvs (to prevent |
1926 | + the former from depending on the latter). |
1927 | + |
1928 | + -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:30:19 +0000 |
1929 | + |
1930 | +strongswan (5.1.1-0ubuntu6) trusty; urgency=low |
1931 | + |
1932 | + * debian/strongswan-starter.prerm: Stop strongswan service on package |
1933 | + removal (as opposed to using the old init.d script). |
1934 | + |
1935 | + -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:22:10 +0000 |
1936 | + |
1937 | +strongswan (5.1.1-0ubuntu5) trusty; urgency=low |
1938 | + |
1939 | + * debian/rules: |
1940 | + - CONFIGUREARGS: Merged Debian and RPM options. |
1941 | + - Brings in TNC functionality. |
1942 | + * debian/control: |
1943 | + - Added build-dependency on libtspi-dev. |
1944 | + - Created strongswan-tnc-imcvs binary package for TNC components. |
1945 | + - Added strongswan-tnc-imcvs to libstrongswan's Suggests. |
1946 | + * debian/libstrongswan.install: |
1947 | + - Included newly built MD4 and SQLite libraries. |
1948 | + - Removed 'tnc' references (moved to TNC package). |
1949 | + * debian/strongswan-tnc-imcvs.install: Created - handle new TNC libraries and |
1950 | + binaries. |
1951 | + * debian/usr.lib.ipsec.charon: Allow access to TNC modules. |
1952 | + |
1953 | + -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 14:05:43 +0000 |
1954 | + |
1955 | +strongswan (5.1.1-0ubuntu4) trusty; urgency=low |
1956 | + |
1957 | + * debian/usr.lib.ipsec.charon: Added - AppArmor profile for charon. |
1958 | + * debian/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call. |
1959 | + * debian/control: strongswan-ike - Stop depending on ipsec-tools. |
1960 | + |
1961 | + -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 05:35:17 +0000 |
1962 | + |
1963 | +strongswan (5.1.1-0ubuntu3) trusty; urgency=low |
1964 | + |
1965 | + * strongswan-starter.strongswan.upstart - Only start strongSwan when a |
1966 | + network connection is available. |
1967 | + * debian/control: Downgrade build-dep version of dpkg-dev from 1.16.2 to |
1968 | + 1.16.1 - to make precise backporting easier. |
1969 | + |
1970 | + -- Jonathan Davies <jonathan.davies@canonical.com> Thu, 12 Dec 2013 10:43:15 +0000 |
1971 | + |
1972 | +strongswan (5.1.1-0ubuntu2) trusty; urgency=low |
1973 | + |
1974 | + * strongswan-starter.strongswan.upstart - Created Upstart job for |
1975 | + strongSwan. |
1976 | + * debian/rules: Set dh_installinit to install above file. |
1977 | + * debian/strongswan-starter.postinit: |
1978 | + - Removed section about runlevel changes, it's almost 2014. |
1979 | + - Adapted service restart section for Upstart. |
1980 | + - Remove old symlinks to init.d files is necessary. |
1981 | + * debian/strongswan-starter.dirs: Don't touch /etc/init.d. |
1982 | + |
1983 | + -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 11 Dec 2013 23:10:28 +0000 |
1984 | + |
1985 | +strongswan (5.1.1-0ubuntu1) trusty; urgency=low |
1986 | + |
1987 | + * New upstream release. |
1988 | + * Removed: debian/patches/CVE-2013-6075, CVE-2013-6076.patch - upsteamed. |
1989 | + * debian/control: Updated Standards-Version to 3.9.5 and applied |
1990 | + XSBC-Original-Maintainer policy. |
1991 | + * strongswan-starter.install: |
1992 | + - pki tool is now in /usr/bin. |
1993 | + - Install pt-tls-client. |
1994 | + - Install manpages (LP: #1206263). |
1995 | + |
1996 | + -- Jonathan Davies <jpds@ubuntu.com> Sun, 01 Dec 2013 17:43:59 +0000 |
1997 | + |
1998 | strongswan (5.1.0-3) unstable; urgency=high |
1999 | |
2000 | * urgency=high for the security fixes. |
2001 | diff --git a/debian/control b/debian/control |
2002 | index 3035fc5..270e164 100644 |
2003 | --- a/debian/control |
2004 | +++ b/debian/control |
2005 | @@ -1,7 +1,8 @@ |
2006 | Source: strongswan |
2007 | Section: net |
2008 | Priority: optional |
2009 | -Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org> |
2010 | +Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
2011 | +XSBC-Original-Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org> |
2012 | Uploaders: Yves-Alexis Perez <corsac@debian.org> |
2013 | Standards-Version: 4.6.2 |
2014 | Vcs-Browser: https://salsa.debian.org/debian/strongswan |
2015 | @@ -136,6 +137,7 @@ Description: strongSwan utility and crypto library (extra plugins) |
2016 | - gcrypt (Crypto backend based on libgcrypt, provides |
2017 | RSA/DH/ciphers/hashers/rng) |
2018 | - ldap (LDAP fetching plugin based on libldap) |
2019 | + - ntru (key exchanged based on post-quantum computer NTRU) |
2020 | - padlock (VIA padlock crypto backend, provides AES128/SHA1) |
2021 | - pkcs11 (PKCS#11 smartcard backend) |
2022 | - rdrand (High quality / high performance random source using the Intel |
2023 | @@ -203,6 +205,9 @@ Description: strongSwan charon library (extra plugins) |
2024 | - unity (Cisco Unity extensions for IKEv1) |
2025 | - xauth-eap (XAuth backend that uses EAP methods to verify passwords) |
2026 | - xauth-pam (XAuth backend that uses PAM modules to verify passwords) |
2027 | + - eap-dynamic (EAP proxy plugin that dynamically selects an EAP method |
2028 | + requested/supported by the client (since 5.0.1)) |
2029 | + - eap-peap (EAP-PEAP protocol handler, wraps other EAP methods securely) |
2030 | |
2031 | Package: strongswan-starter |
2032 | Architecture: any |
2033 | @@ -210,9 +215,9 @@ Pre-Depends: ${misc:Pre-Depends} |
2034 | Depends: adduser, |
2035 | libstrongswan (= ${binary:Version}), |
2036 | sysvinit-utils (>= 3.05-3), |
2037 | + strongswan-charon, |
2038 | ${misc:Depends}, |
2039 | ${shlibs:Depends} |
2040 | -Recommends: strongswan-charon |
2041 | Conflicts: openswan |
2042 | Description: strongSwan daemon starter and configuration file parser |
2043 | The strongSwan VPN suite uses the native IPsec stack in the standard |
2044 | @@ -251,9 +256,9 @@ Architecture: any |
2045 | Pre-Depends: debconf | debconf-2.0 |
2046 | Depends: iproute2 [linux-any] | iproute [linux-any], |
2047 | libstrongswan (= ${binary:Version}), |
2048 | - strongswan-starter, |
2049 | ${misc:Depends}, |
2050 | ${shlibs:Depends} |
2051 | +Recommends: strongswan-starter, |
2052 | Provides: ike-server |
2053 | Description: strongSwan Internet Key Exchange daemon |
2054 | The strongSwan VPN suite uses the native IPsec stack in the standard |
2055 | diff --git a/debian/libcharon-extra-plugins.install b/debian/libcharon-extra-plugins.install |
2056 | index 94fbabd..91ca716 100644 |
2057 | --- a/debian/libcharon-extra-plugins.install |
2058 | +++ b/debian/libcharon-extra-plugins.install |
2059 | @@ -2,9 +2,11 @@ |
2060 | usr/lib/ipsec/plugins/libstrongswan-addrblock.so |
2061 | usr/lib/ipsec/plugins/libstrongswan-certexpire.so |
2062 | usr/lib/ipsec/plugins/libstrongswan-eap-aka.so |
2063 | +usr/lib/ipsec/plugins/libstrongswan-eap-dynamic.so |
2064 | usr/lib/ipsec/plugins/libstrongswan-eap-gtc.so |
2065 | usr/lib/ipsec/plugins/libstrongswan-eap-identity.so |
2066 | usr/lib/ipsec/plugins/libstrongswan-eap-md5.so |
2067 | +usr/lib/ipsec/plugins/libstrongswan-eap-peap.so |
2068 | usr/lib/ipsec/plugins/libstrongswan-eap-radius.so |
2069 | usr/lib/ipsec/plugins/libstrongswan-eap-tls.so |
2070 | usr/lib/ipsec/plugins/libstrongswan-eap-tnc.so |
2071 | @@ -25,9 +27,11 @@ usr/lib/ipsec/plugins/libstrongswan-xauth-pam.so |
2072 | usr/share/strongswan/templates/config/plugins/addrblock.conf |
2073 | usr/share/strongswan/templates/config/plugins/certexpire.conf |
2074 | usr/share/strongswan/templates/config/plugins/eap-aka.conf |
2075 | +usr/share/strongswan/templates/config/plugins/eap-dynamic.conf |
2076 | usr/share/strongswan/templates/config/plugins/eap-gtc.conf |
2077 | usr/share/strongswan/templates/config/plugins/eap-identity.conf |
2078 | usr/share/strongswan/templates/config/plugins/eap-md5.conf |
2079 | +usr/share/strongswan/templates/config/plugins/eap-peap.conf |
2080 | usr/share/strongswan/templates/config/plugins/eap-radius.conf |
2081 | usr/share/strongswan/templates/config/plugins/eap-tls.conf |
2082 | usr/share/strongswan/templates/config/plugins/eap-tnc.conf |
2083 | @@ -49,9 +53,11 @@ etc/strongswan.d/tnc.conf |
2084 | etc/strongswan.d/charon/addrblock.conf |
2085 | etc/strongswan.d/charon/certexpire.conf |
2086 | etc/strongswan.d/charon/eap-aka.conf |
2087 | +etc/strongswan.d/charon/eap-dynamic.conf |
2088 | etc/strongswan.d/charon/eap-gtc.conf |
2089 | etc/strongswan.d/charon/eap-identity.conf |
2090 | etc/strongswan.d/charon/eap-md5.conf |
2091 | +etc/strongswan.d/charon/eap-peap.conf |
2092 | etc/strongswan.d/charon/eap-radius.conf |
2093 | etc/strongswan.d/charon/eap-tls.conf |
2094 | etc/strongswan.d/charon/eap-tnc.conf |
2095 | diff --git a/debian/libcharon-extra-plugins.maintscript b/debian/libcharon-extra-plugins.maintscript |
2096 | new file mode 100644 |
2097 | index 0000000..f6e7a3a |
2098 | --- /dev/null |
2099 | +++ b/debian/libcharon-extra-plugins.maintscript |
2100 | @@ -0,0 +1,8 @@ |
2101 | +rm_conffile /etc/strongswan.d/charon/eap-aka-3gpp2.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins |
2102 | +rm_conffile /etc/strongswan.d/charon/eap-sim-file.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins |
2103 | +rm_conffile /etc/strongswan.d/charon/eap-sim-pcsc.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins |
2104 | +rm_conffile /etc/strongswan.d/charon/eap-sim.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins |
2105 | +rm_conffile /etc/strongswan.d/charon/eap-simaka-pseudonym.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins |
2106 | +rm_conffile /etc/strongswan.d/charon/eap-simaka-reauth.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins |
2107 | +rm_conffile /etc/strongswan.d/charon/eap-simaka-sql.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins |
2108 | +rm_conffile /etc/strongswan.d/charon/xauth-noauth.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins |
2109 | diff --git a/debian/libstrongswan-extra-plugins.install b/debian/libstrongswan-extra-plugins.install |
2110 | index 2846e21..8f71239 100644 |
2111 | --- a/debian/libstrongswan-extra-plugins.install |
2112 | +++ b/debian/libstrongswan-extra-plugins.install |
2113 | @@ -9,6 +9,7 @@ usr/lib/ipsec/plugins/libstrongswan-curl.so |
2114 | usr/lib/ipsec/plugins/libstrongswan-curve25519.so |
2115 | usr/lib/ipsec/plugins/libstrongswan-gcrypt.so |
2116 | usr/lib/ipsec/plugins/libstrongswan-ldap.so |
2117 | +usr/lib/ipsec/plugins/libstrongswan-ntru.so |
2118 | usr/lib/ipsec/plugins/libstrongswan-pkcs11.so |
2119 | usr/lib/ipsec/plugins/libstrongswan-test-vectors.so |
2120 | usr/lib/ipsec/plugins/libstrongswan-tpm.so |
2121 | @@ -21,6 +22,7 @@ usr/share/strongswan/templates/config/plugins/curl.conf |
2122 | usr/share/strongswan/templates/config/plugins/curve25519.conf |
2123 | usr/share/strongswan/templates/config/plugins/gcrypt.conf |
2124 | usr/share/strongswan/templates/config/plugins/ldap.conf |
2125 | +usr/share/strongswan/templates/config/plugins/ntru.conf |
2126 | usr/share/strongswan/templates/config/plugins/pkcs11.conf |
2127 | usr/share/strongswan/templates/config/plugins/test-vectors.conf |
2128 | usr/share/strongswan/templates/config/plugins/tpm.conf |
2129 | @@ -32,6 +34,7 @@ etc/strongswan.d/charon/curl.conf |
2130 | etc/strongswan.d/charon/curve25519.conf |
2131 | etc/strongswan.d/charon/gcrypt.conf |
2132 | etc/strongswan.d/charon/ldap.conf |
2133 | +etc/strongswan.d/charon/ntru.conf |
2134 | etc/strongswan.d/charon/pkcs11.conf |
2135 | etc/strongswan.d/charon/test-vectors.conf |
2136 | etc/strongswan.d/charon/tpm.conf |
2137 | diff --git a/debian/rules b/debian/rules |
2138 | index 2fed1f1..8ca4bd7 100755 |
2139 | --- a/debian/rules |
2140 | +++ b/debian/rules |
2141 | @@ -15,9 +15,11 @@ CONFIGUREARGS := --libdir=/usr/lib --libexecdir=/usr/lib \ |
2142 | --enable-curl \ |
2143 | --enable-eap-aka \ |
2144 | --enable-eap-gtc \ |
2145 | + --enable-eap-dynamic \ |
2146 | --enable-eap-identity \ |
2147 | --enable-eap-md5 \ |
2148 | --enable-eap-mschapv2 \ |
2149 | + --enable-eap-peap \ |
2150 | --enable-eap-radius \ |
2151 | --enable-eap-tls \ |
2152 | --enable-eap-tnc \ |
2153 | @@ -32,6 +34,7 @@ CONFIGUREARGS := --libdir=/usr/lib --libexecdir=/usr/lib \ |
2154 | --enable-led \ |
2155 | --enable-lookip \ |
2156 | --enable-mediation \ |
2157 | + --enable-ntru \ |
2158 | --enable-openssl \ |
2159 | --enable-pkcs11 \ |
2160 | --enable-test-vectors \ |
2161 | diff --git a/debian/tests/control b/debian/tests/control |
2162 | index 997a870..3675f33 100644 |
2163 | --- a/debian/tests/control |
2164 | +++ b/debian/tests/control |
2165 | @@ -5,3 +5,9 @@ Restrictions: needs-root isolation-container allow-stderr |
2166 | Tests: daemon plugins |
2167 | Depends: strongswan-starter, libstrongswan-standard-plugins, libstrongswan-extra-plugins, libcharon-extra-plugins |
2168 | Restrictions: needs-root isolation-machine allow-stderr |
2169 | + |
2170 | +Tests: host-to-host |
2171 | +Depends: strongswan-swanctl, strongswan-pki, libstrongswan-extra-plugins, |
2172 | + charon-systemd, lsb-release, snapd, dctrl-tools, libtss2-tcti-tabrmd0, |
2173 | + bind9-dnsutils |
2174 | +Restrictions: needs-root isolation-machine allow-stderr skippable |
2175 | diff --git a/debian/tests/host-to-host b/debian/tests/host-to-host |
2176 | new file mode 100755 |
2177 | index 0000000..3a76da0 |
2178 | --- /dev/null |
2179 | +++ b/debian/tests/host-to-host |
2180 | @@ -0,0 +1,401 @@ |
2181 | +#!/bin/bash |
2182 | + |
2183 | +# host to host setup from https://docs.strongswan.org/docs/5.9/config/quickstart.html |
2184 | + |
2185 | +set -e |
2186 | +set -o pipefail |
2187 | + |
2188 | +# exit early if not on Ubuntu |
2189 | +if [ "$(lsb_release --short --id)" != "Ubuntu" ]; then |
2190 | + echo "This test only runs on Ubuntu, skipping." |
2191 | + exit 77 |
2192 | +fi |
2193 | + |
2194 | +cleanup() { |
2195 | + if [ $? -ne 0 ]; then |
2196 | + set +e |
2197 | + echo "Something failed, gathering debug info" |
2198 | + echo |
2199 | + echo "Installed strongswan packages:" |
2200 | + dpkg -l | grep -E "(strongswan|charon)" |
2201 | + echo |
2202 | + echo "loaded kernel modules:" |
2203 | + lsmod |
2204 | + echo |
2205 | + echo "journal logs from host:" |
2206 | + journalctl --no-pager -u strongswan.service || : |
2207 | + echo |
2208 | + echo "LXD details:" |
2209 | + lxc network list |
2210 | + lxc list |
2211 | + echo |
2212 | + for container in $(lxc list -f compact -c ns | grep -F RUNNING | awk '{print $1}'); do |
2213 | + echo "journal logs from container ${container}" |
2214 | + lxc exec "${container}" -- journalctl -u strongswan.service --no-pager || : |
2215 | + echo |
2216 | + echo "strongswan data from container ${container}" |
2217 | + for cmd in stats list-certs list-conns list-pols list-sas; do |
2218 | + echo "${cmd}:" |
2219 | + lxc exec "${container}" -- swanctl --${cmd} || : |
2220 | + echo |
2221 | + done |
2222 | + done |
2223 | + fi |
2224 | + set +e |
2225 | + rm -rf "${WORKDIR}" |
2226 | + for container in "${PEERS[@]}"; do |
2227 | + lxc delete --force "${container}" > /dev/null 2>&1 || : |
2228 | + done |
2229 | +} |
2230 | + |
2231 | +trap cleanup EXIT |
2232 | + |
2233 | +WORKDIR=$(mktemp -d) |
2234 | +PEERS=("moon" "sun") |
2235 | +declare -A REMOTE |
2236 | +REMOTE["moon"]="sun" |
2237 | +REMOTE["sun"]="moon" |
2238 | +PUBKEY_ALGO="ed25519" |
2239 | +TESTNAME=$(basename "${0}") |
2240 | + |
2241 | +# ca |
2242 | +CA_KEY_FILE="${WORKDIR}/strongswanKey.pem" |
2243 | +REQ_FILE="${WORKDIR}/req.pem" # can be reused for multiple reqs |
2244 | +CA_CERT_FILE="${WORKDIR}/strongswanCert.pem" |
2245 | + |
2246 | +source debian/tests/utils |
2247 | + |
2248 | +check_pol() { |
2249 | + #root@moon:~# swanctl --list-pols |
2250 | + #moon-sun/moon-sun, TUNNEL |
2251 | + # local: 10.38.71.14/32 |
2252 | + # remote: 10.38.71.194/32 |
2253 | + local me="${1}" |
2254 | + local pol="${2}" |
2255 | + local -i failures=0 |
2256 | + local tunnel |
2257 | + local ip |
2258 | + local policy_ip |
2259 | + |
2260 | + echo "Checking policy for:" |
2261 | + echo -n " we have a tunnel: " |
2262 | + if echo "${pol}" | head -n 1 | grep -qF TUNNEL; then |
2263 | + echo "OK" |
2264 | + else |
2265 | + echo "FAIL" |
2266 | + failures=$((failures+1)) |
2267 | + fi |
2268 | + |
2269 | + # moon-sun/moon-sun, TUNNEL -> tunnel = moon-sun |
2270 | + tunnel=$(echo "${pol}" | head -n 1 | cut -d , -f 1) |
2271 | + echo -n " tunnel matches local-remote: " |
2272 | + if echo "${tunnel}" | grep -qE "^${me}-${REMOTE[${me}]}/${me}-${REMOTE[${me}]}"; then |
2273 | + echo "OK" |
2274 | + else |
2275 | + echo "FAIL (tunnel=${tunnel})" |
2276 | + failures=$((failures+1)) |
2277 | + fi |
2278 | + |
2279 | + echo -n " local IP matches local peer: " |
2280 | + ip=$(lxc exec "${me}" -- dig +short "${me}.lxd")/32 |
2281 | + policy_ip=$(echo "${pol}" | sed -n -r "s,^[[:blank:]]+local:[[:blank:]]+([0-9.]+/32),\1,p") |
2282 | + if [ "${ip}" = "${policy_ip}" ]; then |
2283 | + echo "OK" |
2284 | + else |
2285 | + echo "FAIL: local ip ${ip} != policy local ip ${policy_ip}" |
2286 | + failures=$((failures+1)) |
2287 | + fi |
2288 | + |
2289 | + echo -n " remote IP matches remote peer: " |
2290 | + ip=$(lxc exec "${me}" -- dig +short "${REMOTE[${me}]}.lxd")/32 |
2291 | + policy_ip=$(echo "${pol}" | sed -n -r "s,^[[:blank:]]+remote:[[:blank:]]+([0-9.]+/32),\1,p") |
2292 | + if [ "${ip}" = "${policy_ip}" ]; then |
2293 | + echo "OK" |
2294 | + else |
2295 | + echo "FAIL: local ip ${ip} != policy local ip ${policy_ip}" |
2296 | + failures=$((failures+1)) |
2297 | + fi |
2298 | + |
2299 | + return ${failures} |
2300 | +} |
2301 | + |
2302 | +check_sa() { |
2303 | + local -i failures=0 |
2304 | + local me="${1}" |
2305 | + local sa="${2}" |
2306 | + local name="" |
2307 | + local sa_ip |
2308 | + |
2309 | + # SAs look like this: |
2310 | + # moon-sun: #1, ESTABLISHED, IKEv2, f1bdc688a5078946_i* bf6e1559c5a87ab9_r |
2311 | + # local 'C=CH, O=strongswan, CN=moon.strongswan.org' @ 10.84.128.22[4500] |
2312 | + # remote 'C=CH, O=strongswan, CN=sun.strongswan.org' @ 10.84.128.191[4500] |
2313 | + # AES_CBC-128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519 |
2314 | + # established 11s ago, rekeying in 14147s |
2315 | + # moon-sun: #2, reqid 1, INSTALLED, TUNNEL, ESP:AES_GCM_16-128 |
2316 | + # installed 11s ago, rekeying in 3285s, expires in 3949s |
2317 | + # in c3bcdf8d, 168 bytes, 2 packets, 0s ago |
2318 | + # out caf49378, 168 bytes, 2 packets, 0s ago |
2319 | + # local 10.84.128.22/32 |
2320 | + # remote 10.84.128.191/32 |
2321 | + |
2322 | + echo "Checking SA for:" |
2323 | + |
2324 | + echo -n " established SA: " |
2325 | + if echo "${sa}" | grep -qE "^[[:alnum:]]+-[[:alnum:]]+:.*ESTABLISHED"; then |
2326 | + echo "OK" |
2327 | + else |
2328 | + echo "FAIL" |
2329 | + failures=$((failures+1)) |
2330 | + fi |
2331 | + |
2332 | + # parse the connection name from the first line: $local-$remote: #1,.... |
2333 | + name=$(echo "${sa}" | head -n 1 | sed -r "s/^([[:alnum:]]+)-[[:alnum:]]+:.*/\1/") |
2334 | + echo -n " local DN matches CN=${name}.strongswan.org: " |
2335 | + if echo "${sa}" | grep -qE "^[[:blank:]]*local.*CN=${name}\.strongswan\.org"; then |
2336 | + echo "OK" |
2337 | + else |
2338 | + echo "FAIL" |
2339 | + failures=$((failures+1)) |
2340 | + fi |
2341 | + |
2342 | + # parse the connection name from the first line: $local-$remote: #1,.... |
2343 | + name=$(echo "${sa}" | head -n 1 | sed -r "s/^[[:alnum:]]+-([[:alnum:]]+):.*/\1/") |
2344 | + echo -n " remote DN matches CN=${name}.strongswan.org: " |
2345 | + if echo "${sa}" | grep -qE "^[[:blank:]]*remote.*CN=${name}\.strongswan\.org"; then |
2346 | + echo "OK" |
2347 | + else |
2348 | + echo "FAIL" |
2349 | + failures=$((failures+1)) |
2350 | + fi |
2351 | + |
2352 | + echo -n " local IP matches local peer: " |
2353 | + ip=$(lxc exec "${me}" -- dig +short "${me}.lxd")/32 |
2354 | + sa_ip=$(echo "${sa}" | sed -n -r "s,^[[:blank:]]+local[[:blank:]]+([0-9.]+/32),\1,p") |
2355 | + if [ "${ip}" = "${sa_ip}" ]; then |
2356 | + echo "OK" |
2357 | + else |
2358 | + echo "FAIL: local ip ${ip} != SA local ip ${sa_ip}" |
2359 | + failures=$((failures+1)) |
2360 | + fi |
2361 | + |
2362 | + echo -n " remote IP matches remote peer: " |
2363 | + ip=$(lxc exec "${me}" -- dig +short "${REMOTE[${me}]}.lxd")/32 |
2364 | + sa_ip=$(echo "${sa}" | sed -n -r "s,^[[:blank:]]+remote[[:blank:]]+([0-9.]+/32),\1,p") |
2365 | + if [ "${ip}" = "${sa_ip}" ]; then |
2366 | + echo "OK" |
2367 | + else |
2368 | + echo "FAIL: remote ip ${ip} != SA remote ip ${sa_ip}" |
2369 | + failures=$((failures+1)) |
2370 | + fi |
2371 | + |
2372 | + # TODO: check for cipher, if it matches the algo used in the pubkey |
2373 | + # TODO: check for traffic, should not be zero |
2374 | + |
2375 | + return ${failures} |
2376 | +} |
2377 | + |
2378 | +_setup_peer() { |
2379 | + local peer="${1}" |
2380 | + local algo="${2}" |
2381 | + local key_file="${WORKDIR}/${peer}Key.pem" |
2382 | + local cert_file="${WORKDIR}/${peer}Cert.pem" |
2383 | + |
2384 | + pki --gen --type "${algo}" --outform pem > "${key_file}" |
2385 | + |
2386 | + pki --req --type priv --in "${key_file}" \ |
2387 | + --dn "C=CH, O=strongswan, CN=${peer}.strongswan.org" \ |
2388 | + --san "${peer}.strongswan.org" --outform pem > "${REQ_FILE}" |
2389 | + |
2390 | + pki --issue --cacert "${CA_CERT_FILE}" --cakey "${CA_KEY_FILE}" \ |
2391 | + --type pkcs10 --in "${REQ_FILE}" --serial 01 --lifetime 5 \ |
2392 | + --outform pem --flag serverAuth > "${cert_file}" |
2393 | +} |
2394 | + |
2395 | +_setup_lxd() { |
2396 | + lxd init --auto |
2397 | + network=$(lxc network list --format=compact | grep -E "bridge.*YES.*CREATED" | awk '{print $1}') |
2398 | + lxc network set "${network:-lxdbr0}" ipv6.address=none |
2399 | + if [ -n "${http_proxy}" ]; then |
2400 | + lxc config set core.proxy_http "${http_proxy}" |
2401 | + fi |
2402 | + if [ -n "${https_proxy}" ]; then |
2403 | + lxc config set core.proxy_https "${https_proxy}" |
2404 | + fi |
2405 | + if [ -n "${noproxy}" ]; then |
2406 | + lxc config set core.proxy_ignore_hosts "${noproxy}" |
2407 | + fi |
2408 | +} |
2409 | + |
2410 | +_setup_host_containers() { |
2411 | + local release |
2412 | + local ip |
2413 | + local -i result=0 |
2414 | + local -a deps |
2415 | + |
2416 | + release=$(lsb_release -cs) |
2417 | + readarray -t deps < <(get_test_dependencies "${TESTNAME}" snapd dctrl-tools) |
2418 | + |
2419 | + for container in "${PEERS[@]}"; do |
2420 | + echo "Launching container ${container} with release ${release}" |
2421 | + lxc launch "ubuntu-daily:${release}" "${container}" -c security.nesting=true -q |
2422 | + echo -en "Waiting for container ${container} to be ready " |
2423 | + wait_container_ready "${container}" |
2424 | + |
2425 | + echo "Copying over /etc/apt to container ${container}" |
2426 | + lxc exec "${container}" -- rm -rf /etc/apt |
2427 | + lxc exec "${container}" -- mkdir -p /etc/apt |
2428 | + tar -cC /etc/apt . | lxc exec "${container}" -- tar -xC /etc/apt |
2429 | + |
2430 | + echo "Installing deps in container ${container} (${deps[*]})" |
2431 | + output=$(lxc exec "${container}" -- apt-get update -q) || { |
2432 | + result=$? |
2433 | + echo "apt-get update failed in container ${container}" |
2434 | + echo "${output}" |
2435 | + return ${result} |
2436 | + } |
2437 | + output=$(lxc exec "${container}" --env DEBIAN_FRONTEND=noninteractive -- apt-get dist-upgrade -q -y) || { |
2438 | + result=$? |
2439 | + echo "apt-get dist-upgrade failed in container ${container}" |
2440 | + echo "${output}" |
2441 | + return ${result} |
2442 | + } |
2443 | + output=$(lxc exec "${container}" --env DEBIAN_FRONTEND=noninteractive -- apt-get install -q -y "${deps[@]}") || { |
2444 | + result=$? |
2445 | + echo "apt-get install ${deps[*]} failed in container ${container}" |
2446 | + echo "${output}" |
2447 | + return ${result} |
2448 | + } |
2449 | + echo "Done for container ${container}" |
2450 | + done |
2451 | +} |
2452 | + |
2453 | +_setup_host_containers_certs() { |
2454 | + for container in "${PEERS[@]}"; do |
2455 | + echo "Copying ${CA_CERT_FILE} to container ${container}" |
2456 | + lxc file push "${CA_CERT_FILE}" "${container}/etc/swanctl/x509ca/" |
2457 | + |
2458 | + echo "Copying ${container} cert and key" |
2459 | + lxc file push "${WORKDIR}/${container}Key.pem" "${container}/etc/swanctl/private/" |
2460 | + lxc file push "${WORKDIR}/${container}Cert.pem" "${container}/etc/swanctl/x509/" |
2461 | + done |
2462 | +} |
2463 | + |
2464 | +_setup_host_containers_strongswan() { |
2465 | + local config |
2466 | + |
2467 | + config=$(mktemp) |
2468 | + |
2469 | + for peer in "${PEERS[@]}"; do |
2470 | + conn_name="${peer}-${REMOTE[${peer}]}" |
2471 | + cat > "${config}" <<EOF |
2472 | +connections { |
2473 | + ${conn_name} { |
2474 | + remote_addrs = ${REMOTE[${peer}]}.lxd |
2475 | + local { |
2476 | + auth=pubkey |
2477 | + certs = ${peer}Cert.pem |
2478 | + } |
2479 | + remote { |
2480 | + auth = pubkey |
2481 | + id = "C=CH, O=strongswan, CN=${REMOTE[${peer}]}.strongswan.org" |
2482 | + } |
2483 | + children { |
2484 | + ${conn_name} { |
2485 | + start_action = trap |
2486 | + } |
2487 | + } |
2488 | + } |
2489 | +} |
2490 | +EOF |
2491 | + lxc file push "${config}" "${peer}/etc/swanctl/conf.d/${conn_name}.conf" |
2492 | + echo "Loading creds in container ${peer}" |
2493 | + lxc exec "${peer}" -- swanctl --load-creds |
2494 | + echo "Loading connections in container ${peer}" |
2495 | + lxc exec "${peer}" -- swanctl --load-conns |
2496 | + done |
2497 | +} |
2498 | + |
2499 | +setup() { |
2500 | + local algo=${1:-ed25519} |
2501 | + echo "Creating a CA" |
2502 | + echo |
2503 | + echo "Generating private key for CA" |
2504 | + pki --gen --type "${algo}" --outform pem > "${CA_KEY_FILE}" |
2505 | + |
2506 | + echo "Generating self-signed certificate for CA" |
2507 | + pki \ |
2508 | + --self --ca --lifetime 10 --in "${CA_KEY_FILE}" \ |
2509 | + --dn "C=CH, O=strongSwan, CN=strongSwan Root CA" \ |
2510 | + --outform pem > "${CA_CERT_FILE}" |
2511 | + echo "Here is the CA cert:" |
2512 | + pki --print --in "${CA_CERT_FILE}" |
2513 | + |
2514 | + for peer in "${PEERS[@]}"; do |
2515 | + echo "Generating key and certificate for peer ${peer}" |
2516 | + _setup_peer "${peer}" "${algo}" |
2517 | + done |
2518 | + |
2519 | + echo "Setting up host LXD" |
2520 | + _setup_lxd |
2521 | + |
2522 | + echo "Creating host containers" |
2523 | + _setup_host_containers |
2524 | + |
2525 | + echo "Copy certificates to containers" |
2526 | + _setup_host_containers_certs |
2527 | + |
2528 | + echo "Configuring strongswan in containers" |
2529 | + _setup_host_containers_strongswan |
2530 | +} |
2531 | + |
2532 | +test_ping() { |
2533 | + for peer in "${PEERS[@]}"; do |
2534 | + echo "Generating traffic from ${peer} to ${REMOTE[${peer}]}" |
2535 | + # first ping to establish the tunnel always fails |
2536 | + lxc exec "${peer}" -- ping -c 2 -W 3 "${REMOTE[${peer}]}.lxd" > /dev/null 2>&1 || : |
2537 | + # this one must work |
2538 | + lxc exec "${peer}" -- ping -c 4 -W 3 "${REMOTE[${peer}]}.lxd" |
2539 | + echo |
2540 | + done |
2541 | +} |
2542 | + |
2543 | +test_sa() { |
2544 | + for peer in "${PEERS[@]}"; do |
2545 | + sa=$(lxc exec "${peer}" -- swanctl --list-sas) |
2546 | + echo "This is the ${peer} SA:" |
2547 | + if [ -z "${sa}" ]; then |
2548 | + echo "FAILED: SA is empty (swanctl --list-sas)" |
2549 | + return 1 |
2550 | + fi |
2551 | + echo "${sa}" |
2552 | + echo |
2553 | + check_sa "${peer}" "${sa}" |
2554 | + echo |
2555 | + done |
2556 | +} |
2557 | + |
2558 | +test_pol() { |
2559 | + for peer in "${PEERS[@]}"; do |
2560 | + pol=$(lxc exec "${peer}" -- swanctl --list-pols) |
2561 | + echo "This is the ${peer} policy:" |
2562 | + if [ -z "${pol}" ]; then |
2563 | + echo "FAILED: pol is empty (swanctl --list-pols)" |
2564 | + return 1 |
2565 | + fi |
2566 | + echo "${pol}" |
2567 | + echo |
2568 | + check_pol "${peer}" "${pol}" |
2569 | + echo |
2570 | + done |
2571 | +} |
2572 | + |
2573 | + |
2574 | +# the lxd deb package last existed in focal, so we install the snap |
2575 | +snap list lxd > /dev/null 2>&1 || snap install lxd |
2576 | + |
2577 | +setup "${PUBKEY_ALGO}" |
2578 | + |
2579 | +test_ping |
2580 | +test_sa |
2581 | +test_pol |
2582 | diff --git a/debian/tests/utils b/debian/tests/utils |
2583 | new file mode 100644 |
2584 | index 0000000..e8a8584 |
2585 | --- /dev/null |
2586 | +++ b/debian/tests/utils |
2587 | @@ -0,0 +1,61 @@ |
2588 | +wait_container_ready() { |
2589 | + local container="${1}" |
2590 | + local -i limit=300 # seconds |
2591 | + local -i i=0 |
2592 | + while /bin/true; do |
2593 | + ip=$(lxc list "${container}" -c 4 --format=compact | tail -1 | awk '{print $1}') |
2594 | + if [ -n "${ip}" ]; then |
2595 | + break |
2596 | + fi |
2597 | + i=$((i+1)) |
2598 | + if [ ${i} -ge ${limit} ]; then |
2599 | + return 1 |
2600 | + fi |
2601 | + sleep 1s |
2602 | + echo -n "." |
2603 | + done |
2604 | + while ! nc -z "${ip}" 22; do |
2605 | + echo -n "." |
2606 | + i=$((i+1)) |
2607 | + if [ ${i} -ge ${limit} ]; then |
2608 | + return 1 |
2609 | + fi |
2610 | + sleep 1s |
2611 | + done |
2612 | + # cloud-init might still be doing things... |
2613 | + # this call blocks, so wrap it in its own little timeout |
2614 | + # Give it ${limit} seconds too |
2615 | + output=$(lxc exec "${container}" -- timeout --verbose ${limit} cloud-init status --wait) || { |
2616 | + result=$? |
2617 | + echo "cloud-init status --wait failed on container ${container}" |
2618 | + echo "${output}" |
2619 | + return ${result} |
2620 | + } |
2621 | + echo |
2622 | +} |
2623 | + |
2624 | +get_test_dependencies() { |
2625 | + local test_name="${1}" |
2626 | + shift |
2627 | + local exclusions="$*" |
2628 | + # Get test dependencies which we need to install in the containers |
2629 | + # we will create: |
2630 | + # -s: show Depends field |
2631 | + # -n: omit field name in output |
2632 | + # -X: do an exact match, instead of substring |
2633 | + # -F Tests: apply regexp to Tests field |
2634 | + depends=$(grep-dctrl -s Depends -n -F Tests -X "${test_name}" debian/tests/control | tr -d ,) |
2635 | + [ -n "${depends}" ] || { |
2636 | + echo "Failed to obtain list of dependencies for this test" |
2637 | + return 1 |
2638 | + } |
2639 | + # remove exclusions, if any |
2640 | + for p in ${depends}; do |
2641 | + if echo "${exclusions}" | grep -qwF "${p}"; then |
2642 | + continue |
2643 | + else |
2644 | + echo "${p}" |
2645 | + fi |
2646 | + done |
2647 | +} |
2648 | + |
2649 | diff --git a/debian/usr.sbin.swanctl b/debian/usr.sbin.swanctl |
2650 | index 455c7cb..54c2b06 100644 |
2651 | --- a/debian/usr.sbin.swanctl |
2652 | +++ b/debian/usr.sbin.swanctl |
2653 | @@ -22,7 +22,7 @@ |
2654 | /run/charon.vici rw, |
2655 | |
2656 | # Allow reading own binary |
2657 | - /usr/sbin/swanctl r, |
2658 | + /usr/sbin/swanctl rm, |
2659 | |
2660 | # for af-alg plugin |
2661 | network alg seqpacket, |
I am going to review this one.