Merge ~ahasenack/ubuntu/+source/strongswan:noble-strongswan-merge-1 into ubuntu/+source/strongswan:debian/sid

Proposed by Andreas Hasenack
Status: Merged
Approved by: git-ubuntu bot
Approved revision: not available
Merge reported by: git-ubuntu bot
Merged at revision: 07b4dc4e4447a9eb76b535120c9befbc4363f83b
Proposed branch: ~ahasenack/ubuntu/+source/strongswan:noble-strongswan-merge-1
Merge into: ubuntu/+source/strongswan:debian/sid
Diff against target: 2714 lines (+2402/-4)
10 files modified
debian/changelog (+1905/-0)
debian/control (+8/-3)
debian/libcharon-extra-plugins.install (+6/-0)
debian/libcharon-extra-plugins.maintscript (+8/-0)
debian/libstrongswan-extra-plugins.install (+3/-0)
debian/rules (+3/-0)
debian/tests/control (+6/-0)
debian/tests/host-to-host (+401/-0)
debian/tests/utils (+61/-0)
debian/usr.sbin.swanctl (+1/-1)
Reviewer Review Type Date Requested Status
git-ubuntu bot Approve
Bryce Harrington (community) Approve
Canonical Server Reporter Pending
Review via email: mp+457882@code.launchpad.net

Description of the change

Merge from debian, just dropping a security patch which is already applied in the upstream version.

PPA with just amd64 and arm64: https://launchpad.net/~ahasenack/+archive/ubuntu/noble-strongswan-merge/+packages

DEP8: green for arm64, still running for amd64:
Results: (from http://autopkgtest.ubuntu.com/results/autopkgtest-noble-ahasenack-noble-strongswan-merge/?format=plain)
  strongswan @ arm64:
    03.01.24 09:42:53 Log 🗒️ ✅ Triggers: strongswan/5.9.12-1ubuntu1~ppa1
Running:
    time pkg release arch ppa trigger
    470 strongswan noble amd64 ahasenack/noble-strongswan-merge strongswan/5.9.12-1ubuntu1~ppa1
Waiting: (none)

A lot of our delta was already submitted to debian but it doesn't look like they will take it. All the outstanding merge requests are from canonical:

https://salsa.debian.org/debian/strongswan/-/merge_requests?scope=all&state=opened

The host-to-host DEP8 test I did not submit to debian because it uses lxd, which in our case is installed by a snap. Making that work in debian without the setup our snap does is a bit of an effort.

To post a comment you must log in.
Revision history for this message
Bryce Harrington (bryce) wrote :

The ppa test for amd64 is still running, but the arm64 one looks like it completed successfully. Packaging all looks good, and all delta appears to be carried appropriately.

I wonder if some of the delta might be possible to forward to Debian? The dep8 host-to-host test in particular looks like some good work went into it, and I wonder if it might be of value to them and if extra eyes on it may end up helping us? If it's not upstreamable, you might want to consider using the "--CL--" style annotation to document rationale. (C.f. https://code.launchpad.net/~bryce/ubuntu/+source/chrony/+git/chrony/+merge/455531) Might be worth considering for the next merge.

Everything else LGTM, +1.

review: Approve
Revision history for this message
git-ubuntu bot (git-ubuntu-bot) wrote :

Approvers: ahasenack, bryce
Uploaders: ahasenack, bryce
MP auto-approved

review: Approve
Revision history for this message
Andreas Hasenack (ahasenack) wrote :

I did mention the host-to-host DEP8 test situation regarding forwarding to debian:

> The host-to-host DEP8 test I did not submit to debian because it uses lxd, which in our case is installed
> by a snap. Making that work in debian without the setup our snap does is a bit of an effort.

Let me add an annotation as you suggested.

6153229... by Andreas Hasenack

merge-changelogs

8f240d2... by Andreas Hasenack

reconstruct-changelog

07b4dc4... by Andreas Hasenack

update-maintainer

Revision history for this message
Andreas Hasenack (ahasenack) wrote :

I changed the commit message of the host-to-host dep8 test to this:
commit ab609fa2b09450f8009dd60141e7027044d3a227
Author: Andreas Hasenack <email address hidden>
Date: Fri Nov 25 14:55:39 2022 -0300

    Host-to-host DEP8 test.

    This test relies heavily on the setup we get with the lxd snap. Making
    it work on debian is not straightforward, thus it was not forwarded yet.

    --CL--

        - d/t/{control,host-to-host,utils}: new host-to-host test
          (LP: #1999525)

Revision history for this message
Andreas Hasenack (ahasenack) wrote :

Uploaded with rich history:

Uploading strongswan_5.9.12-1ubuntu1.dsc
Uploading strongswan_5.9.12.orig.tar.bz2
Uploading strongswan_5.9.12-1ubuntu1.debian.tar.xz
Uploading strongswan_5.9.12-1ubuntu1_source.buildinfo
Uploading strongswan_5.9.12-1ubuntu1_source.changes

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/debian/changelog b/debian/changelog
2index eca1cb0..d808d29 100644
3--- a/debian/changelog
4+++ b/debian/changelog
5@@ -1,3 +1,39 @@
6+strongswan (5.9.12-1ubuntu1) noble; urgency=medium
7+
8+ * Merge with Debian unstable (LP: #2040430). Remaining changes:
9+ - d/control: strongswan-starter hard-depends on strongswan-charon,
10+ therefore bump the dependency from Recommends to Depends. At the same
11+ time avoid a circular dependency by dropping
12+ strongswan-charon->strongswan-starter from Depends to Recommends as the
13+ binaries can work without the services but not vice versa.
14+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
15+ + d/control: mention plugins in package description
16+ + d/rules: enable ntru at build time
17+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
18+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
19+ + d/control: update libcharon-extra-plugins description.
20+ + d/libcharon-extra-plugins.install: install .so and conf files.
21+ + d/rules: add plugins to the configuration arguments.
22+ - Remove conf files of plugins removed from libcharon-extra-plugins
23+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
24+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
25+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
26+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
27+ properly.
28+ - d/t/{control,host-to-host,utils}: new host-to-host test
29+ (LP #1999525)
30+ - d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl
31+ (LP #1999935)
32+ * Dropped:
33+ - SECURITY UPDATE: Buffer Overflow When Handling DH Public Values
34+ + debian/patches/CVE-2023-41913.patch: Validate DH public key to fix
35+ potential buffer overflow in
36+ src/charon-tkm/src/tkm/tkm_diffie_hellman.c.
37+ + CVE-2023-41913
38+ [Fixed upstream in 5.9.12]
39+
40+ -- Andreas Hasenack <andreas@canonical.com> Thu, 04 Jan 2024 10:25:23 -0300
41+
42 strongswan (5.9.12-1) unstable; urgency=medium
43
44 * New upstream version 5.9.12
45@@ -14,6 +50,52 @@ strongswan (5.9.11-2) unstable; urgency=medium
46
47 -- Yves-Alexis Perez <corsac@debian.org> Mon, 13 Nov 2023 20:22:47 +0100
48
49+strongswan (5.9.11-1ubuntu2) noble; urgency=medium
50+
51+ * SECURITY UPDATE: Buffer Overflow When Handling DH Public Values
52+ - debian/patches/CVE-2023-41913.patch: Validate DH public key to fix
53+ potential buffer overflow in
54+ src/charon-tkm/src/tkm/tkm_diffie_hellman.c.
55+ - CVE-2023-41913
56+
57+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 07 Nov 2023 11:43:00 +0200
58+
59+strongswan (5.9.11-1ubuntu1) mantic; urgency=medium
60+
61+ * Merge with Debian unstable (LP: #2018113). Remaining changes:
62+ - d/control: strongswan-starter hard-depends on strongswan-charon,
63+ therefore bump the dependency from Recommends to Depends. At the same
64+ time avoid a circular dependency by dropping
65+ strongswan-charon->strongswan-starter from Depends to Recommends as the
66+ binaries can work without the services but not vice versa.
67+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
68+ + d/control: mention plugins in package description
69+ + d/rules: enable ntru at build time
70+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
71+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
72+ + d/control: update libcharon-extra-plugins description.
73+ + d/libcharon-extra-plugins.install: install .so and conf files.
74+ + d/rules: add plugins to the configuration arguments.
75+ - Remove conf files of plugins removed from libcharon-extra-plugins
76+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
77+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
78+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
79+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
80+ properly.
81+ - d/t/{control,host-to-host,utils}: new host-to-host test
82+ (LP #1999525)
83+ - d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl
84+ (LP #1999935)
85+ * Dropped:
86+ - SECURITY UPDATE: Incorrectly Accepted Untrusted Public Key With
87+ Incorrect Refcount
88+ + debian/patches/CVE-2023-26463.patch: fix authentication bypass and
89+ expired pointer dereference in src/libtls/tls_server.c.
90+ + CVE-2023-26463
91+ [Fixed upstream in 5.9.10]
92+
93+ -- Andreas Hasenack <andreas@canonical.com> Fri, 23 Jun 2023 14:05:18 -0300
94+
95 strongswan (5.9.11-1) unstable; urgency=medium
96
97 * New upstream version 5.9.10
98@@ -33,6 +115,66 @@ strongswan (5.9.8-4) unstable; urgency=medium
99
100 -- Yves-Alexis Perez <corsac@debian.org> Sun, 26 Feb 2023 09:40:09 +0100
101
102+strongswan (5.9.8-3ubuntu4) lunar; urgency=medium
103+
104+ * d/t/utils: also give `cloud-init status --wait` the same amount of
105+ ${limit} seconds to complete, and bump limit to 5min. The logs show
106+ the container started up fine, with an IP.
107+
108+ -- Andreas Hasenack <andreas@canonical.com> Mon, 06 Mar 2023 11:00:58 -0300
109+
110+strongswan (5.9.8-3ubuntu3) lunar; urgency=medium
111+
112+ * SECURITY UPDATE: Incorrectly Accepted Untrusted Public Key With
113+ Incorrect Refcount
114+ - debian/patches/CVE-2023-26463.patch: fix authentication bypass and
115+ expired pointer dereference in src/libtls/tls_server.c.
116+ - CVE-2023-26463
117+
118+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 02 Mar 2023 12:58:47 -0500
119+
120+strongswan (5.9.8-3ubuntu2) lunar; urgency=medium
121+
122+ * d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl
123+ (LP: #1999935)
124+
125+ -- Andreas Hasenack <andreas@canonical.com> Fri, 16 Dec 2022 16:07:51 -0300
126+
127+strongswan (5.9.8-3ubuntu1) lunar; urgency=medium
128+
129+ * Merge with Debian unstable (LP: #1993449). Remaining changes:
130+ - d/control: strongswan-starter hard-depends on strongswan-charon,
131+ therefore bump the dependency from Recommends to Depends. At the same
132+ time avoid a circular dependency by dropping
133+ strongswan-charon->strongswan-starter from Depends to Recommends as the
134+ binaries can work without the services but not vice versa.
135+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
136+ + d/control: mention plugins in package description
137+ + d/rules: enable ntru at build time
138+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
139+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
140+ + d/control: update libcharon-extra-plugins description.
141+ + d/libcharon-extra-plugins.install: install .so and conf files.
142+ + d/rules: add plugins to the configuration arguments.
143+ - Remove conf files of plugins removed from libcharon-extra-plugins
144+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
145+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
146+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
147+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
148+ properly.
149+ * Dropped:
150+ - SECURITY UPDATE: Using Untrusted URIs for Revocation Checking
151+ + debian/patches/CVE-2022-40617.patch: do online revocation checks only
152+ after basic trust chain validation in
153+ src/libstrongswan/credentials/credential_manager.c.
154+ + CVE-2022-40617
155+ [Included upstream in 5.9.8]
156+ * Added:
157+ - d/t/{control,host-to-host,utils}: new host-to-host test
158+ (LP: #1999525)
159+
160+ -- Andreas Hasenack <andreas@canonical.com> Tue, 13 Dec 2022 11:04:24 -0300
161+
162 strongswan (5.9.8-3) unstable; urgency=medium
163
164 * d/tests: also drop _copyright test since the util is gone as well
165@@ -61,6 +203,46 @@ strongswan (5.9.8-1) unstable; urgency=medium
166
167 -- Yves-Alexis Perez <corsac@debian.org> Wed, 05 Oct 2022 15:25:18 +0200
168
169+strongswan (5.9.6-1ubuntu2) kinetic; urgency=medium
170+
171+ * SECURITY UPDATE: Using Untrusted URIs for Revocation Checking
172+ - debian/patches/CVE-2022-40617.patch: do online revocation checks only
173+ after basic trust chain validation in
174+ src/libstrongswan/credentials/credential_manager.c.
175+ - CVE-2022-40617
176+
177+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 05 Oct 2022 08:11:03 -0400
178+
179+strongswan (5.9.6-1ubuntu1) kinetic; urgency=medium
180+
181+ * Merge with Debian unstable (LP: #1971328). Remaining changes:
182+ - d/control: strongswan-starter hard-depends on strongswan-charon,
183+ therefore bump the dependency from Recommends to Depends. At the same
184+ time avoid a circular dependency by dropping
185+ strongswan-charon->strongswan-starter from Depends to Recommends as the
186+ binaries can work without the services but not vice versa.
187+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
188+ + d/control: mention plugins in package description
189+ + d/rules: enable ntru at build time
190+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
191+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
192+ + d/control: update libcharon-extra-plugins description.
193+ + d/libcharon-extra-plugins.install: install .so and conf files.
194+ + d/rules: add plugins to the configuration arguments.
195+ - Remove conf files of plugins removed from libcharon-extra-plugins
196+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
197+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
198+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
199+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
200+ properly.
201+ * Dropped:
202+ - d/p/lp1964977-fix-ipsec-pki-segfault.patch: Fix "ipsec pki"
203+ segmentation fault; don't access OpenSSL objects inside atexit()
204+ handlers. (LP #1964977)
205+ [included by upstream in version 5.9.6]
206+
207+ -- Lucas Kanashiro <kanashiro@ubuntu.com> Fri, 10 Jun 2022 15:03:17 -0300
208+
209 strongswan (5.9.6-1) unstable; urgency=medium
210
211 * New upstream version 5.9.6
212@@ -69,6 +251,42 @@ strongswan (5.9.6-1) unstable; urgency=medium
213
214 -- Yves-Alexis Perez <corsac@debian.org> Sat, 07 May 2022 20:19:18 +0200
215
216+strongswan (5.9.5-2ubuntu2) jammy; urgency=medium
217+
218+ * d/p/lp1964977-fix-ipsec-pki-segfault.patch: Fix "ipsec pki"
219+ segmentation fault; don't access OpenSSL objects inside atexit()
220+ handlers. (LP: #1964977)
221+
222+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Fri, 18 Mar 2022 14:24:34 -0400
223+
224+strongswan (5.9.5-2ubuntu1) jammy; urgency=medium
225+
226+ * Merge with Debian unstable. Remaining changes:
227+ - d/control: strongswan-starter hard-depends on strongswan-charon,
228+ therefore bump the dependency from Recommends to Depends. At the same
229+ time avoid a circular dependency by dropping
230+ strongswan-charon->strongswan-starter from Depends to Recommends as the
231+ binaries can work without the services but not vice versa.
232+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
233+ + d/control: mention plugins in package description
234+ + d/rules: enable ntru at build time
235+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
236+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887)
237+ + d/control: update libcharon-extra-plugins description.
238+ + d/libcharon-extra-plugins.install: install .so and conf files.
239+ + d/rules: add plugins to the configuration arguments.
240+ - Remove conf files of plugins removed from libcharon-extra-plugins
241+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
242+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
243+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
244+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
245+ properly.
246+ * Dropped patches included in new version:
247+ - debian/patches/CVE-2021-45079.patch
248+ - debian/patches/load-legacy-provider-in-openssl3.patch
249+
250+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 03 Feb 2022 10:49:49 -0500
251+
252 strongswan (5.9.5-2) unstable; urgency=medium
253
254 * actually fix lintian overrides
255@@ -84,6 +302,60 @@ strongswan (5.9.5-1) unstable; urgency=medium
256
257 -- Yves-Alexis Perez <corsac@debian.org> Wed, 26 Jan 2022 14:38:54 +0100
258
259+strongswan (5.9.4-1ubuntu4) jammy; urgency=medium
260+
261+ * SECURITY UPDATE: Incorrect Handling of Early EAP-Success Messages
262+ - debian/patches/CVE-2021-45079.patch: enforce failure if MSK
263+ generation fails in src/libcharon/plugins/eap_gtc/eap_gtc.c,
264+ src/libcharon/plugins/eap_md5/eap_md5.c,
265+ src/libcharon/plugins/eap_radius/eap_radius.c,
266+ src/libcharon/sa/eap/eap_method.h,
267+ src/libcharon/sa/ikev2/authenticators/eap_authenticator.c.
268+ - CVE-2021-45079
269+
270+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 01 Feb 2022 07:23:37 -0500
271+
272+strongswan (5.9.4-1ubuntu3) jammy; urgency=medium
273+
274+ * No-change rebuild against libssl3
275+
276+ -- Steve Langasek <steve.langasek@ubuntu.com> Thu, 09 Dec 2021 00:19:38 +0000
277+
278+strongswan (5.9.4-1ubuntu2) jammy; urgency=medium
279+
280+ * Add d/p/load-legacy-provider-in-openssl3.patch.
281+ Upstream cherry-pick to fix FTBFS against OpenSSL 3.0. (LP: #1946213)
282+
283+ -- Paride Legovini <paride@ubuntu.com> Wed, 17 Nov 2021 17:04:27 +0100
284+
285+strongswan (5.9.4-1ubuntu1) jammy; urgency=medium
286+
287+ * Merge with Debian unstable. Remaining changes:
288+ - d/control: strongswan-starter hard-depends on strongswan-charon,
289+ therefore bump the dependency from Recommends to Depends. At the same
290+ time avoid a circular dependency by dropping
291+ strongswan-charon->strongswan-starter from Depends to Recommends as the
292+ binaries can work without the services but not vice versa.
293+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
294+ + d/control: mention plugins in package description
295+ + d/rules: enable ntru at build time
296+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
297+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887)
298+ + d/control: update libcharon-extra-plugins description.
299+ + d/libcharon-extra-plugins.install: install .so and conf files.
300+ + d/rules: add plugins to the configuration arguments.
301+ - Remove conf files of plugins removed from libcharon-extra-plugins
302+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
303+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
304+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
305+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
306+ properly.
307+ * Dropped changes:
308+ - Compile the tpm plugin against the tpm2 software stack (tss2).
309+ Merged in Debian (5.9.4-1).
310+
311+ -- Paride Legovini <paride@ubuntu.com> Fri, 12 Nov 2021 12:34:30 +0100
312+
313 strongswan (5.9.4-1) unstable; urgency=medium
314
315 [ Paride Legovini ]
316@@ -100,6 +372,62 @@ strongswan (5.9.4-1) unstable; urgency=medium
317
318 -- Yves-Alexis Perez <corsac@debian.org> Tue, 19 Oct 2021 22:34:40 +0200
319
320+strongswan (5.9.1-1ubuntu3.1) impish-security; urgency=medium
321+
322+ * SECURITY UPDATE: Integer Overflow in gmp Plugin
323+ - debian/patches/CVE-2021-41990.patch: reject RSASSA-PSS params with
324+ negative salt length in
325+ src/libstrongswan/credentials/keys/signature_params.c,
326+ src/libstrongswan/plugins/gmp/gmp_rsa_public_key.c.
327+ - CVE-2021-41990
328+ * SECURITY UPDATE: Integer Overflow When Replacing Certificates in Cache
329+ - debian/patches/CVE-2021-41991.patch: prevent crash due to integer
330+ overflow/sign change in
331+ src/libstrongswan/credentials/sets/cert_cache.c.
332+ - CVE-2021-41991
333+
334+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 18 Oct 2021 13:10:30 -0400
335+
336+strongswan (5.9.1-1ubuntu3) impish; urgency=medium
337+
338+ * Compile the tpm plugin against the tpm2 software stack (tss2)
339+ (Debian packaging cherry-pick, LP: #1940079)
340+ - d/rules: add the --enable-tss-tss2 configure flag
341+ - d/control: add Build-Depends: libtss2-dev
342+
343+ -- Paride Legovini <paride@ubuntu.com> Thu, 16 Sep 2021 11:40:38 +0200
344+
345+strongswan (5.9.1-1ubuntu2) impish; urgency=medium
346+
347+ * No-change rebuild due to OpenLDAP soname bump.
348+
349+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Mon, 21 Jun 2021 18:09:22 -0400
350+
351+strongswan (5.9.1-1ubuntu1) hirsute; urgency=medium
352+
353+ * Merge with Debian unstable. Remaining changes:
354+ - d/control: strongswan-starter hard-depends on strongswan-charon,
355+ therefore bump the dependency from Recommends to Depends. At the same
356+ time avoid a circular dependency by dropping
357+ strongswan-charon->strongswan-starter from Depends to Recommends as the
358+ binaries can work without the services but not vice versa.
359+ - re-add post-quantum encryption algorithm (NTRU) (LP: 1863749)
360+ + d/control: mention plugins in package description
361+ + d/rules: enable ntru at build time
362+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
363+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887)
364+ + d/control: update libcharon-extra-plugins description.
365+ + d/libcharon-extra-plugins.install: install .so and conf files.
366+ + d/rules: add plugins to the configuration arguments.
367+ - Remove conf files of plugins removed from libcharon-extra-plugins
368+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
369+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
370+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
371+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
372+ properly.
373+
374+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 19 Jan 2021 12:39:11 +0100
375+
376 strongswan (5.9.1-1) unstable; urgency=medium
377
378 * New upstream version 5.9.1
379@@ -114,6 +442,45 @@ strongswan (5.9.0-1) unstable; urgency=medium
380
381 -- Yves-Alexis Perez <corsac@debian.org> Thu, 17 Sep 2020 10:21:30 +0200
382
383+strongswan (5.8.4-1ubuntu2) groovy; urgency=medium
384+
385+ * Re-enable eap-{dynamic,peap} libcharon plugins (LP: #1878887)
386+ - d/control: update libcharon-extra-plugins description.
387+ - d/libcharon-extra-plugins.install: install .so and conf files.
388+ - d/rules: add plugins to the configuration arguments.
389+ * Remove conf files of plugins removed from libcharon-extra-plugins
390+ - The conf file of the following plugins were removed: eap-aka-3gpp2,
391+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
392+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
393+ - Created d/libcharon-extra-plugins.maintscript to handle the removals
394+ properly.
395+
396+ -- Lucas Kanashiro <kanashiro@ubuntu.com> Thu, 21 May 2020 14:53:05 -0300
397+
398+strongswan (5.8.4-1ubuntu1) groovy; urgency=medium
399+
400+ * Merge with Debian unstable. Remaining changes:
401+ - d/control: strongswan-starter hard-depends on strongswan-charon,
402+ therefore bump the dependency from Recommends to Depends. At the same
403+ time avoid a circular dependency by dropping
404+ strongswan-charon->strongswan-starter from Depends to Recommends as the
405+ binaries can work without the services but not vice versa.
406+ - re-add post-quantum encryption algorithm (NTRU) (LP: 1863749)
407+ + d/control: mention plugins in package description
408+ + d/rules: enable ntru at build time
409+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
410+ * Dropped:
411+ - d/control: build-depend on libiptc-dev to avoid FTBFS (LP: #1861975)
412+ This is needed due to changes in regard to Debian bug 947176 and 939243
413+ and can later be dropped again.
414+ [applied by Debian in version 5.8.2-2]
415+ - d/control: Transition from former Ubuntu only libcharon-standard-plugins
416+ to common libcharon-extauth-plugins (drop after 20.04)
417+ - d/control: Transition from strongswan-tnc-* being in extra packages
418+ to libcharon-extra-plugins (drop after 20.04)
419+
420+ -- Lucas Kanashiro <lucas.kanashiro@canonical.com> Thu, 30 Apr 2020 18:06:55 -0300
421+
422 strongswan (5.8.4-1) unstable; urgency=medium
423
424 * New upstream version 5.8.4 (Closes: #956446)
425@@ -129,6 +496,43 @@ strongswan (5.8.2-2) unstable; urgency=medium
426
427 -- Yves-Alexis Perez <corsac@debian.org> Thu, 13 Feb 2020 22:46:40 +0100
428
429+strongswan (5.8.2-1ubuntu3) focal; urgency=medium
430+
431+ * Reverting part of 5.8.2-1ubuntu2 changes to remove BLISS again as
432+ there is a potential local side-channel attack on strongSwan's BLISS
433+ implementation (https://eprint.iacr.org/2017/505). (LP: #1866765)
434+
435+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 10 Mar 2020 07:56:56 +0100
436+
437+strongswan (5.8.2-1ubuntu2) focal; urgency=medium
438+
439+ * re-add post-quantum computer signature scheme (BLISS) and encryption
440+ algorithm (NTRU) as well as the dependent nttfft library (LP: #1863749)
441+ - d/control: mention plugins in package description
442+ - d/rules: enable ntru and bliss at build time
443+ - d/libstrongswan-extra-plugins.install: ship config and shared objects
444+
445+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 04 Mar 2020 07:54:26 +0100
446+
447+strongswan (5.8.2-1ubuntu1) focal; urgency=medium
448+
449+ * Merge with Debian unstable (LP: #1861971). Remaining changes:
450+ - d/control: Transition from strongswan-tnc-* being in extra packages
451+ to libcharon-extra-plugins (drop after 20.04)
452+ - d/control: Transition from former Ubuntu only libcharon-standard-plugins
453+ to common libcharon-extauth-plugins (drop after 20.04)
454+ - d/control: strongswan-starter hard-depends on strongswan-charon,
455+ therefore bump the dependency from Recommends to Depends. At the same
456+ time avoid a circular dependency by dropping
457+ strongswan-charon->strongswan-starter from Depends to Recommends as the
458+ binaries can work without the services but not vice versa.
459+ * Added Changes
460+ - d/control: build-depend on libiptc-dev to avoid FTBFS (LP: #1861975)
461+ This is needed due to changes in regard to Debian bug 947176 and 939243
462+ and can later be dropped again.
463+
464+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 05 Feb 2020 08:28:30 +0100
465+
466 strongswan (5.8.2-1) unstable; urgency=medium
467
468 [ Jean-Michel Vourgère ]
469@@ -145,6 +549,83 @@ strongswan (5.8.2-1) unstable; urgency=medium
470
471 -- Yves-Alexis Perez <corsac@debian.org> Wed, 01 Jan 2020 14:35:46 +0100
472
473+strongswan (5.8.1-1ubuntu1) focal; urgency=medium
474+
475+ * Merge with Debian unstable (LP: #1852579). Remaining changes:
476+ - d/control: Transition from strongswan-tnc-* being in extra packages
477+ to libcharon-extra-plugins
478+ * Added Changes:
479+ - d/control: Transition from former Ubuntu only libcharon-standard-plugins
480+ to common libcharon-extauth-plugins (drop after 20.04)
481+ - d/control: strongswan-starter hard-depends on strongswan-charon,
482+ therefore bump the dependency from Recommends to Depends. At the same
483+ time avoid a circular dependency by dropping
484+ strongswan-charon->strongswan-starter from Depends to Recommends as the
485+ binaries can work without the services but not vice versa.
486+ * Dropped Changes (now in Debian):
487+ - Clean up d/strongswan-starter.postinst: section about runlevel changes
488+ - Clean up d/strongswan-starter.postinst: Removed entire section on
489+ opportunistic encryption disabling - this was never in strongSwan and
490+ won't be see upstream issue #2160.
491+ - d/rules: Removed patching ipsec.conf on build (not using the
492+ debconf-managed config.)
493+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
494+ used for debconf-managed include of private key).
495+ - Add plugin kernel-libipsec to allow the use of strongswan in containers
496+ via this userspace implementation (please do note that this is still
497+ considered experimental by upstream).
498+ + d/libcharon-extra-plugins.install: Add kernel-libipsec components
499+ + d/control: List kernel-libipsec plugin at extra plugins description
500+ + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
501+ upstream recommends to not load kernel-libipsec by default.
502+ - d/control: Mention mgf1 plugin which is in libstrongswan now
503+ - Complete the disabling of libfast; This was partially accepted in Debian,
504+ it is no more packaging medcli and medsrv, but still builds and
505+ mentions it.
506+ + d/rules: Add --disable-fast to avoid build time and dependencies
507+ + d/control: Remove medcli, medsrv from package description
508+ - Add now built (since 5.5.1) libraries libtpmtss and nttfft to
509+ libstrongswan-extra-plugins (no deps from default plugins).
510+ - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
511+ plugins for the most common use cases from extra-plugins into a new
512+ standard-plugins package. This will allow those use cases without pulling
513+ in too much more plugins (a bit like the tnc package). Recommend that
514+ package from strongswan-libcharon.
515+ - d/usr.lib.ipsec.charon: allow reading of own FDs (LP 1786250)
516+ - d/usr.sbin.charon-systemd: allow CLUSTERIP for ha plugin (LP 1773956)
517+ - executables need to be able to read map and execute themselves otherwise
518+ execution in some environments e.g. containers is blocked (LP 1780534)
519+ + d/usr.lib.ipsec.stroke: add rmix permission to stroke binary
520+ + d/usr.lib.ipsec.lookip: add rmix permission to lookip binary
521+ - d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: resync apparmor
522+ profiles of both ways to start charon (LP 1807664)
523+ - d/usr.sbin.swanctl: add apparmor rule for af-alg plugin (LP 1807962)
524+ - We fixed up tpmtss and nttfft in the past, but tpmtss is now packaged in
525+ Debian so this part was be dropped. Two changes remain
526+ - d/control: fix the mentioning of tpmtss in d/control
527+ - apparmor fixes for container and root usage (LP 1826238)
528+ + d/usr.sbin.swanctl: allow reading own binary
529+ + d/usr.sbin.charon-systemd: allow accessing the binary
530+ + d/usr.sbin.swanctl: add attach_disconnected to work inside containers
531+ + d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: add CAP_SETPCAP
532+ to apparmor to allow dropping caps
533+ * Dropped Changes (too uncommon to support by default)
534+ - d/libstrongswan.install: Add kernel-netlink configuration files
535+ - d/usr.sbin.charon-systemd: allow to contact mysql for sql and
536+ attr-sql plugins (LP 1766240) - no more needed as itisn't enabled.
537+ - Mass enablement of extra plugins and features to allow a user to use
538+ strongswan for a variety of extra use cases without having to rebuild.
539+ + d/control: Add required additional build-deps
540+ + d/control: Mention addtionally enabled plugins
541+ + d/rules: Enable features at configure stage
542+ + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
543+ + d/libstrongswan.install: Add plugins (so, conf)
544+ + d/strongswan-starter.install: Install pool feature, which is useful
545+ since we now have attr-sql plugin enabled it.
546+ - Enable additional TNC plugins and add them to libcharon-extra-plugins
547+
548+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 14 Nov 2019 15:00:15 +0100
549+
550 strongswan (5.8.1-1) unstable; urgency=medium
551
552 * d/rules: disable http and stream tests under CI
553@@ -214,6 +695,99 @@ strongswan (5.8.0-1) unstable; urgency=medium
554
555 -- Yves-Alexis Perez <corsac@debian.org> Mon, 26 Aug 2019 12:58:23 +0200
556
557+strongswan (5.7.2-1ubuntu3) eoan; urgency=medium
558+
559+ * No change rebuild for libmysqlclient21.
560+
561+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 15 Aug 2019 09:34:34 +0200
562+
563+strongswan (5.7.2-1ubuntu2) eoan; urgency=medium
564+
565+ * Rebuild against new libjson-c4.
566+
567+ -- Gianfranco Costamagna <locutusofborg@debian.org> Mon, 01 Jul 2019 10:53:07 +0200
568+
569+strongswan (5.7.2-1ubuntu1) eoan; urgency=medium
570+
571+ [ Christian Ehrhardt ]
572+ * Merge with Debian unstable. Remaining changes:
573+ - Clean up d/strongswan-starter.postinst: section about runlevel changes
574+ - Clean up d/strongswan-starter.postinst: Removed entire section on
575+ opportunistic encryption disabling - this was never in strongSwan and
576+ won't be see upstream issue #2160.
577+ - d/rules: Removed patching ipsec.conf on build (not using the
578+ debconf-managed config.)
579+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
580+ used for debconf-managed include of private key).
581+ - Mass enablement of extra plugins and features to allow a user to use
582+ strongswan for a variety of extra use cases without having to rebuild.
583+ + d/control: Add required additional build-deps
584+ + d/control: Mention addtionally enabled plugins
585+ + d/rules: Enable features at configure stage
586+ + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
587+ + d/libstrongswan.install: Add plugins (so, conf)
588+ + d/strongswan-starter.install: Install pool feature, which is useful
589+ since we now have attr-sql plugin enabled it.
590+ - Add plugin kernel-libipsec to allow the use of strongswan in containers
591+ via this userspace implementation (please do note that this is still
592+ considered experimental by upstream).
593+ + d/libcharon-extra-plugins.install: Add kernel-libipsec components
594+ + d/control: List kernel-libipsec plugin at extra plugins description
595+ + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
596+ upstream recommends to not load kernel-libipsec by default.
597+ - d/libstrongswan.install: Add kernel-netlink configuration files
598+ - Complete the disabling of libfast; This was partially accepted in Debian,
599+ it is no more packaging medcli and medsrv, but still builds and
600+ mentions it.
601+ + d/rules: Add --disable-fast to avoid build time and dependencies
602+ + d/control: Remove medcli, medsrv from package description
603+ - d/control: Mention mgf1 plugin which is in libstrongswan now
604+ - Add now built (since 5.5.1) libraries libtpmtss and nttfft to
605+ libstrongswan-extra-plugins (no deps from default plugins).
606+ - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
607+ plugins for the most common use cases from extra-plugins into a new
608+ standard-plugins package. This will allow those use cases without pulling
609+ in too much more plugins (a bit like the tnc package). Recommend that
610+ package from strongswan-libcharon.
611+ - d/usr.sbin.charon-systemd: allow to contact mysql for sql and
612+ attr-sql plugins (LP #1766240)
613+ - d/usr.lib.ipsec.charon: allow reading of own FDs (LP #1786250)
614+ - d/usr.sbin.charon-systemd: allow CLUSTERIP for ha plugin (LP: 1773956)
615+ - executables need to be able to read map and execute themselves otherwise
616+ execution in some environments e.g. containers is blocked (LP: 1780534)
617+ + d/usr.lib.ipsec.stroke: add rmix permission to stroke binary
618+ + d/usr.lib.ipsec.lookip: add rmix permission to lookip binary
619+ - d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: resync apparmor
620+ profiles of both ways to start charon (LP: 1807664)
621+ - d/usr.sbin.swanctl: add apparmor rule for af-alg plugin (LP: 1807962)
622+ * Dropped changes
623+ - d/p/lp1795813-mysql-Don-t-release-the-connection-if-transactions-a.patch:
624+ fix SIGSEGV when using mysql plugin (LP: 1795813)
625+ [upstream in 5.7.2]
626+ - d/libstrongswan.install: Reorder conf and .so alphabetically
627+ [was a non functional change, dropped to avoid merge noise]
628+ - Relocate tnc plugin
629+ [TNC is back at libcharon-extra-plugins as it is in Debian]
630+ * Added changes:
631+ - We fixed up tpmtss and nttfft in the past, but tpmtss is now packaged in
632+ Debian so this part was be dropped. Two changes remain
633+ - d/control: fix the mentioning of tpmtss in d/control
634+ - add nttfft (can be merged with the mass enablement change later)
635+ - Transitional packages to go back from strongswan-tnc-* being in extra
636+ packages to be part of libcharon-extra-plugins.
637+ [can be dropped after 20.04]
638+
639+ [ Simon Deziel ]
640+ * Added changes:
641+ - apparmor fixes for container and root usage (LP: #1826238)
642+ + d/usr.sbin.swanctl: allow reading own binary
643+ + d/usr.sbin.charon-systemd: allow accessing the binary
644+ + d/usr.sbin.swanctl: add attach_disconnected to work inside containers
645+ + d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: add CAP_SETPCAP
646+ to apparmor to allow dropping caps
647+
648+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Fri, 26 Apr 2019 11:31:17 +0200
649+
650 strongswan (5.7.2-1) unstable; urgency=medium
651
652 * d/control: remove Rene from Uploaders, thanks!
653@@ -232,6 +806,86 @@ strongswan (5.7.2-1) unstable; urgency=medium
654
655 -- Yves-Alexis Perez <corsac@debian.org> Wed, 02 Jan 2019 13:02:11 +0100
656
657+strongswan (5.7.1-1ubuntu2) disco; urgency=medium
658+
659+ * d/usr.sbin.charon-systemd: fix rule for CLUSTERIP to match effective
660+ path (LP: #1773956)
661+ * d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: resync apparmor
662+ profiles of both ways to start charon (LP: #1807664)
663+ * d/usr.sbin.swanctl: add apparmor rule for af-alg plugin (LP: #1807962)
664+
665+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 10 Dec 2018 08:30:01 +0100
666+
667+strongswan (5.7.1-1ubuntu1) disco; urgency=medium
668+
669+ * Merge with Debian unstable (LP: #1806401). Remaining changes:
670+ - Clean up d/strongswan-starter.postinst: section about runlevel changes
671+ - Clean up d/strongswan-starter.postinst: Removed entire section on
672+ opportunistic encryption disabling - this was never in strongSwan and
673+ won't be see upstream issue #2160.
674+ - d/rules: Removed patching ipsec.conf on build (not using the
675+ debconf-managed config.)
676+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
677+ used for debconf-managed include of private key).
678+ - Mass enablement of extra plugins and features to allow a user to use
679+ strongswan for a variety of extra use cases without having to rebuild.
680+ + d/control: Add required additional build-deps
681+ + d/control: Mention addtionally enabled plugins
682+ + d/rules: Enable features at configure stage
683+ + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
684+ + d/libstrongswan.install: Add plugins (so, conf)
685+ - d/strongswan-starter.install: Install pool feature, which is useful since
686+ we have attr-sql plugin enabled as well using it.
687+ - Add plugin kernel-libipsec to allow the use of strongswan in containers
688+ via this userspace implementation (please do note that this is still
689+ considered experimental by upstream).
690+ + d/libcharon-extra-plugins.install: Add kernel-libipsec components
691+ + d/control: List kernel-libipsec plugin at extra plugins description
692+ + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
693+ upstream recommends to not load kernel-libipsec by default.
694+ - Relocate tnc plugin
695+ + debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
696+ + Add new subpackage for TNC in d/strongswan-tnc-* and d/control
697+ - d/libstrongswan.install: Reorder conf and .so alphabetically
698+ - d/libstrongswan.install: Add kernel-netlink configuration files
699+ - Complete the disabling of libfast; This was partially accepted in Debian,
700+ it is no more packaging medcli and medsrv, but still builds and
701+ mentions it.
702+ + d/rules: Add --disable-fast to avoid build time and dependencies
703+ + d/control: Remove medcli, medsrv from package description
704+ - d/control: Mention mgf1 plugin which is in libstrongswan now
705+ - Add now built (since 5.5.1) libraries libtpmtss and nttfft to
706+ libstrongswan-extra-plugins (no deps from default plugins).
707+ - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
708+ plugins for the most common use cases from extra-plugins into a new
709+ standard-plugins package. This will allow those use cases without pulling
710+ in too much more plugins (a bit like the tnc package). Recommend that
711+ package from strongswan-libcharon.
712+ - d/usr.sbin.charon-systemd: allow to contact mysql for sql and
713+ attr-sql plugins (LP #1766240)
714+ - d/usr.lib.ipsec.charon: allow reading of own FDs (LP #1786250)
715+ * Added Changes:
716+ - d/p/lp1795813-mysql-Don-t-release-the-connection-if-transactions-a.patch:
717+ fix SIGSEGV when using mysql plugin (LP: #1795813)
718+ - d/usr.sbin.charon-systemd: allow CLUSTERIP for ha plugin (LP: #1773956)
719+ - executables need to be able to read map and execute themselves otherwise
720+ execution in some environments e.g. containers is blocked (LP: #1780534)
721+ + d/usr.lib.ipsec.stroke: add rmix permission to stroke binary
722+ + d/usr.lib.ipsec.lookip: add rmix permission to lookip binary
723+ - adapt "mass enablement of extra plugins" to match 5.7.x changes
724+ + d/rules: use new options for swima instead of swid
725+ + d/strongswan-tnc-server.install: add new sec updater tool
726+ + d/strongswan-tnc-client.install: add new sw-collector tool
727+ * Dropped (in Debian now):
728+ - SECURITY UPDATE: Insufficient input validation in gmp plugin
729+ (CVE-2018-17540)
730+ - SECURITY UPDATE: Insufficient input validation in gmp plugin
731+ (CVE-2018-16151 CVE-2018-16152)
732+ - d/usr.lib.ipsec.charon, d/usr/sbin/charon-systemd: Add support for
733+ usr-merge, thanks to Christian Ehrhardt. LP #1784023
734+
735+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 03 Dec 2018 15:18:31 +0100
736+
737 strongswan (5.7.1-1) unstable; urgency=medium
738
739 [ Ondřej Nový ]
740@@ -262,6 +916,96 @@ strongswan (5.7.0-1) unstable; urgency=medium
741
742 -- Yves-Alexis Perez <corsac@debian.org> Mon, 24 Sep 2018 16:36:28 +0200
743
744+strongswan (5.6.3-1ubuntu5) disco; urgency=medium
745+
746+ * No-change rebuild against libunbound8
747+
748+ -- Steve Langasek <steve.langasek@ubuntu.com> Sun, 11 Nov 2018 09:01:53 +0000
749+
750+strongswan (5.6.3-1ubuntu4) cosmic; urgency=medium
751+
752+ * d/usr.lib.ipsec.charon: allow reading of own FDs (LP: #1786250)
753+ Thanks to Matt Callaghan.
754+
755+ -- Andreas Hasenack <andreas@canonical.com> Thu, 04 Oct 2018 10:34:01 -0300
756+
757+strongswan (5.6.3-1ubuntu3) cosmic; urgency=medium
758+
759+ * SECURITY UPDATE: Insufficient input validation in gmp plugin
760+ - debian/patches/strongswan-4.4.0-5.7.0_gmp-pkcs1-overflow.patch: fix
761+ buffer overflow with very small RSA keys in
762+ src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c.
763+ - CVE-2018-17540
764+
765+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 01 Oct 2018 13:23:59 -0400
766+
767+strongswan (5.6.3-1ubuntu2) cosmic; urgency=medium
768+
769+ * SECURITY UPDATE: Insufficient input validation in gmp plugin
770+ - debian/patches/strongswan-5.6.1-5.6.3_gmp-pkcs1-verify.patch: don't
771+ parse PKCS1 v1.5 RSA signatures to verify them in
772+ src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c,
773+ src/libstrongswan/plugins/gmp/gmp_rsa_public_key.c.
774+ - CVE-2018-16151
775+ - CVE-2018-16152
776+
777+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 25 Sep 2018 10:16:15 -0400
778+
779+strongswan (5.6.3-1ubuntu1) cosmic; urgency=medium
780+
781+ * Merge with Debian unstable. Remaining changes:
782+ - Clean up d/strongswan-starter.postinst: section about runlevel changes
783+ - Clean up d/strongswan-starter.postinst: Removed entire section on
784+ opportunistic encryption disabling - this was never in strongSwan and
785+ won't be see upstream issue #2160.
786+ - d/rules: Removed patching ipsec.conf on build (not using the
787+ debconf-managed config.)
788+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
789+ used for debconf-managed include of private key).
790+ - Mass enablement of extra plugins and features to allow a user to use
791+ strongswan for a variety of extra use cases without having to rebuild.
792+ + d/control: Add required additional build-deps
793+ + d/control: Mention addtionally enabled plugins
794+ + d/rules: Enable features at configure stage
795+ + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
796+ + d/libstrongswan.install: Add plugins (so, conf)
797+ - d/strongswan-starter.install: Install pool feature, which is useful since
798+ we have attr-sql plugin enabled as well using it.
799+ - Add plugin kernel-libipsec to allow the use of strongswan in containers
800+ via this userspace implementation (please do note that this is still
801+ considered experimental by upstream).
802+ + d/libcharon-extra-plugins.install: Add kernel-libipsec components
803+ + d/control: List kernel-libipsec plugin at extra plugins description
804+ + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
805+ upstream recommends to not load kernel-libipsec by default.
806+ - Relocate tnc plugin
807+ + debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
808+ + Add new subpackage for TNC in d/strongswan-tnc-* and d/control
809+ - d/libstrongswan.install: Reorder conf and .so alphabetically
810+ - d/libstrongswan.install: Add kernel-netlink configuration files
811+ - Complete the disabling of libfast; This was partially accepted in Debian,
812+ it is no more packaging medcli and medsrv, but still builds and
813+ mentions it.
814+ + d/rules: Add --disable-fast to avoid build time and dependencies
815+ + d/control: Remove medcli, medsrv from package description
816+ - d/control: Mention mgf1 plugin which is in libstrongswan now
817+ - Add now built (since 5.5.1) libraries libtpmtss and nttfft to
818+ libstrongswan-extra-plugins (no deps from default plugins).
819+ - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
820+ plugins for the most common use cases from extra-plugins into a new
821+ standard-plugins package. This will allow those use cases without pulling
822+ in too much more plugins (a bit like the tnc package). Recommend that
823+ package from strongswan-libcharon.
824+ - d/usr.sbin.charon-systemd: allow to contact mysql for sql and
825+ attr-sql plugins (LP #1766240)
826+ - d/usr.lib.ipsec.charon, d/usr/sbin/charon-systemd: Add support for
827+ usr-merge, thanks to Christian Ehrhardt. LP #1784023
828+ * Dropped:
829+ - d/usr.sbin.charon-systemd: allow systemd notifications (LP: #1765652)
830+ [Fixed in 5.6.3-1]
831+
832+ -- Andreas Hasenack <andreas@canonical.com> Thu, 23 Aug 2018 13:05:11 -0300
833+
834 strongswan (5.6.3-1) unstable; urgency=medium
835
836 * New upstream version 5.6.2
837@@ -277,6 +1021,78 @@ strongswan (5.6.3-1) unstable; urgency=medium
838
839 -- Yves-Alexis Perez <corsac@debian.org> Mon, 04 Jun 2018 10:23:22 +0200
840
841+strongswan (5.6.2-2ubuntu2) cosmic; urgency=medium
842+
843+ * Add support for usr-merge, thanks to Christian Ehrhardt. LP: #1784023
844+
845+ -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 21 Aug 2018 00:42:38 +0100
846+
847+strongswan (5.6.2-2ubuntu1) cosmic; urgency=medium
848+
849+ * Merge with Debian unstable, closes LP: #1773814 and LP: #1772705.
850+ Remaining changes:
851+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
852+ + Clean up d/strongswan-starter.postinst: Removed entire section on
853+ opportunistic encryption disabling - this was never in strongSwan and
854+ won't be see upstream issue #2160.
855+ + d/rules: Removed patching ipsec.conf on build (not using the
856+ debconf-managed config.)
857+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
858+ used for debconf-managed include of private key).
859+ + Mass enablement of extra plugins and features to allow a user to use
860+ strongswan for a variety of extra use cases without having to rebuild.
861+ - d/control: Add required additional build-deps
862+ - d/control: Mention addtionally enabled plugins
863+ - d/rules: Enable features at configure stage
864+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
865+ - d/libstrongswan.install: Add plugins (so, conf)
866+ + d/strongswan-starter.install: Install pool feature, which is useful since
867+ we have attr-sql plugin enabled as well using it.
868+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
869+ via this userspace implementation (please do note that this is still
870+ considered experimental by upstream).
871+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
872+ - d/control: List kernel-libipsec plugin at extra plugins description
873+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
874+ upstream recommends to not load kernel-libipsec by default.
875+ + Relocate tnc plugin
876+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
877+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
878+ + d/libstrongswan.install: Reorder conf and .so alphabetically
879+ + d/libstrongswan.install: Add kernel-netlink configuration files
880+ + Complete the disabling of libfast; This was partially accepted in Debian,
881+ it is no more packaging medcli and medsrv, but still builds and
882+ mentions it.
883+ - d/rules: Add --disable-fast to avoid build time and dependencies
884+ - d/control: Remove medcli, medsrv from package description
885+ + d/control: Mention mgf1 plugin which is in libstrongswan now
886+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
887+ libstrongswan-extra-plugins (no deps from default plugins).
888+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
889+ plugins for the most common use cases from extra-plugins into a new
890+ standard-plugins package. This will allow those use cases without pulling
891+ in too much more plugins (a bit like the tnc package). Recommend that
892+ package from strongswan-libcharon.
893+ * Dropped Changes (no more needed after 18.04)
894+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
895+ missed that, droppable after 18.04)
896+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
897+ libstrongswan as we dropped relocating ccm and test-vectors.
898+ (droppable >18.04).
899+ + d/control: add breaks/replace from libstrongswan to
900+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
901+ (droppable >18.04).
902+ + d/control: bump breaks/replaces for the move of the updown plugin
903+ (Missed Changelog entry on last merge)
904+ + d/control: fix dependencies of strongswan-libcharon due to the move
905+ the updown plugin (droppable >18.04).
906+ * Added Changes:
907+ + d/usr.sbin.charon-systemd: allow to contact mysql for sql and
908+ attr-sql plugins (LP: #1766240)
909+ + d/usr.sbin.charon-systemd: allow systemd notifications (LP: #1765652)
910+
911+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 29 May 2018 08:21:42 +0200
912+
913 strongswan (5.6.2-2) unstable; urgency=medium
914
915 * charon-nm: Fix building list of DNS/MDNS servers with libnm
916@@ -287,6 +1103,74 @@ strongswan (5.6.2-2) unstable; urgency=medium
917
918 -- Yves-Alexis Perez <corsac@debian.org> Fri, 13 Apr 2018 13:46:04 +0200
919
920+strongswan (5.6.2-1ubuntu2) bionic; urgency=medium
921+
922+ * d/control: fix dependencies of strongswan-libcharon due to the move
923+ the updown plugin.
924+
925+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 20 Mar 2018 07:37:29 +0100
926+
927+strongswan (5.6.2-1ubuntu1) bionic; urgency=medium
928+
929+ * Merge with Debian unstable (LP: #1753018). Remaining changes:
930+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
931+ + Clean up d/strongswan-starter.postinst: Removed entire section on
932+ opportunistic encryption disabling - this was never in strongSwan and
933+ won't be see upstream issue #2160.
934+ + Ubuntu is not using the debconf triggered private key generation
935+ - d/rules: Removed patching ipsec.conf on build (not using the
936+ debconf-managed config.)
937+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
938+ used for debconf-managed include of private key).
939+ + Mass enablement of extra plugins and features to allow a user to use
940+ strongswan for a variety of extra use cases without having to rebuild.
941+ - d/control: Add required additional build-deps
942+ - d/control: Mention addtionally enabled plugins
943+ - d/rules: Enable features at configure stage
944+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
945+ - d/libstrongswan.install: Add plugins (so, conf)
946+ + d/strongswan-starter.install: Install pool feature, which is useful since
947+ we have attr-sql plugin enabled as well using it.
948+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
949+ via this userspace implementation (please do note that this is still
950+ considered experimental by upstream).
951+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
952+ - d/control: List kernel-libipsec plugin at extra plugins description
953+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
954+ upstream recommends to not load kernel-libipsec by default.
955+ + Relocate tnc plugin
956+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
957+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
958+ + d/libstrongswan.install: Reorder conf and .so alphabetically
959+ + d/libstrongswan.install: Add kernel-netlink configuration files
960+ + Complete the disabling of libfast; This was partially accepted in Debian,
961+ it is no more packaging medcli and medsrv, but still builds and
962+ mentions it.
963+ - d/rules: Add --disable-fast to avoid build time and dependencies
964+ - d/control: Remove medcli, medsrv from package description
965+ + d/control: Mention mgf1 plugin which is in libstrongswan now
966+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
967+ libstrongswan-extra-plugins (no deps from default plugins).
968+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
969+ missed that, droppable after 18.04)
970+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
971+ plugins for the most common use cases from extra-plugins into a new
972+ standard-plugins package. This will allow those use cases without pulling
973+ in too much more plugins (a bit like the tnc package). Recommend that
974+ package from strongswan-libcharon.
975+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
976+ libstrongswan as we dropped relocating ccm and test-vectors.
977+ (droppable >18.04).
978+ + d/control: add breaks/replace from libstrongswan to
979+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
980+ (droppable >18.04).
981+ * Added Changes:
982+ + d/control: bump breaks/replaces from strongswan-libcharon to strongswan-
983+ starter as we followed Debian to move the updown plugin but need to
984+ match Ubuntu versions (Droppable >18.04).
985+
986+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Fri, 16 Mar 2018 11:08:47 +0100
987+
988 strongswan (5.6.2-1) unstable; urgency=medium
989
990 * d/NEWS: add information about disabled algorithms (closes: #883072)
991@@ -309,6 +1193,129 @@ strongswan (5.6.1-3) unstable; urgency=medium
992
993 -- Yves-Alexis Perez <corsac@debian.org> Sun, 17 Dec 2017 16:40:39 +0100
994
995+strongswan (5.6.1-2ubuntu4) bionic; urgency=medium
996+
997+ * SECURITY UPDATE: DoS via crafted RSASSA-PSS signature
998+ - debian/patches/CVE-2018-6459.patch: Properly handle MGF1 algorithm
999+ identifier without parameters in
1000+ src/libstrongswan/credentials/keys/signature_params.c.
1001+ - CVE-2018-6459
1002+
1003+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 07 Mar 2018 14:52:02 +0100
1004+
1005+strongswan (5.6.1-2ubuntu3) bionic; urgency=medium
1006+
1007+ * No-change rebuild against libcurl4
1008+
1009+ -- Steve Langasek <steve.langasek@ubuntu.com> Wed, 28 Feb 2018 08:52:09 +0000
1010+
1011+strongswan (5.6.1-2ubuntu2) bionic; urgency=high
1012+
1013+ * No change rebuild against openssl1.1.
1014+
1015+ -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 12 Feb 2018 16:00:24 +0000
1016+
1017+strongswan (5.6.1-2ubuntu1) bionic; urgency=medium
1018+
1019+ * Merge with Debian unstable (LP: #1717343).
1020+ Also fixes and issue with multiple psk's (LP: #1734207). Remaining changes:
1021+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
1022+ + Clean up d/strongswan-starter.postinst: Removed entire section on
1023+ opportunistic encryption disabling - this was never in strongSwan and
1024+ won't be see upstream issue #2160.
1025+ + Ubuntu is not using the debconf triggered private key generation
1026+ - d/rules: Removed patching ipsec.conf on build (not using the
1027+ debconf-managed config.)
1028+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
1029+ used for debconf-managed include of private key).
1030+ + Mass enablement of extra plugins and features to allow a user to use
1031+ strongswan for a variety of extra use cases without having to rebuild.
1032+ - d/control: Add required additional build-deps
1033+ - d/control: Mention addtionally enabled plugins
1034+ - d/rules: Enable features at configure stage
1035+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1036+ - d/libstrongswan.install: Add plugins (so, conf)
1037+ + d/strongswan-starter.install: Install pool feature, which is useful since
1038+ we have attr-sql plugin enabled as well using it.
1039+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1040+ via this userspace implementation (please do note that this is still
1041+ considered experimental by upstream).
1042+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1043+ - d/control: List kernel-libipsec plugin at extra plugins description
1044+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1045+ upstream recommends to not load kernel-libipsec by default.
1046+ + Relocate tnc plugin
1047+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1048+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1049+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1050+ + d/libstrongswan.install: Add kernel-netlink configuration files
1051+ + Complete the disabling of libfast; This was partially accepted in Debian,
1052+ it is no more packaging medcli and medsrv, but still builds and
1053+ mentions it.
1054+ - d/rules: Add --disable-fast to avoid build time and dependencies
1055+ - d/control: Remove medcli, medsrv from package description
1056+ + d/control: Mention mgf1 plugin which is in libstrongswan now
1057+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
1058+ libstrongswan-extra-plugins (no deps from default plugins).
1059+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1060+ missed that, droppable after 18.04)
1061+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1062+ plugins for the most common use cases from extra-plugins into a new
1063+ standard-plugins package. This will allow those use cases without pulling
1064+ in too much more plugins (a bit like the tnc package). Recommend that
1065+ package from strongswan-libcharon.
1066+ * Added changes:
1067+ + d/strongswan-tnc-client.install (relocate tnc) swidtag creation changed
1068+ in 5.6
1069+ + d/strongswan-tnc-server.install (relocate tnc) pacman no more needed
1070+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
1071+ libstrongswan as we dropped relocating ccm and test-vectors.
1072+ (droppable >18.04).
1073+ - d/control: add breaks/replace from libstrongswan to
1074+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
1075+ (droppable >18.04).
1076+ * Dropped changes:
1077+ + Update init/service handling (debian default matches Ubuntu past now)
1078+ Dropping this fixes (LP: #1734886)
1079+ - d/rules: Change init/systemd program name to strongswan
1080+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
1081+ patching upstream
1082+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
1083+ linking to upstream
1084+ + d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call
1085+ (this is a never failing no-op for us, no need for Delta).
1086+ + d/strongswan-starter.prerm: Stop strongswan service on package removal
1087+ (ipsec now maps to strongswan service, so this works as-is).
1088+ + Clean up d/strongswan-starter.postinst: rename service ipsec to
1089+ strongswan (ipsec now maps to strongswan service, so this works as-is)
1090+ + Clean up d/strongswan-starter.postinst: daemon enable/disable (the
1091+ whole section is disabled, so no need for delta)
1092+ + (is upstream) CVE-2017-11185 patches
1093+ + (is upstream) FTBFS upstream fix for changed include files
1094+ + (is upstream) debian/patches/increase-bliss-test-timeout.patch: Under
1095+ QEMU/KVM autopkgtest the bliss test takes longer than the default
1096+ + (in Debian) add now built (since 5.5.1) mgf1 plugin to
1097+ libstrongswan-extra-plugins.
1098+ + (in Debian) d/strongswan-starter.install: install stroke apparmor profile
1099+ + (this was enabled as part of the former delta, squash changes to no-up)
1100+ d/rules: Disable duplicheck.
1101+ + (not needed) Relocate plugins test-vectors from extra-plugins to
1102+ libstrongswan
1103+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
1104+ - d/libstrongswan.install: Add plugins/confiles
1105+ - d/control: move package descriptions and add required breaks/replaces
1106+ + (not needed) Relocate plugins ccm from extra-plugins to libstrongswan
1107+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
1108+ - d/libstrongswan.install: Add plugins/confiles
1109+ - d/control: move package descriptions and add required breaks/replaces
1110+ + (while using it requires special kernel, it does not hurt to be
1111+ available in the package) Remove ha plugin
1112+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
1113+ - d/rules: Do not enable ha plugin
1114+ - d/control: Drop listing the ha plugin in the package description
1115+
1116+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 29 Nov 2017 15:55:18 +0100
1117+
1118 strongswan (5.6.1-2) unstable; urgency=medium
1119
1120 * move counters plugin from -starter to -libcharon. closes: #882431
1121@@ -395,6 +1402,213 @@ strongswan (5.5.2-1) experimental; urgency=medium
1122
1123 -- Yves-Alexis Perez <corsac@debian.org> Fri, 19 May 2017 11:32:00 +0200
1124
1125+strongswan (5.5.1-4ubuntu3) bionic; urgency=medium
1126+
1127+ * Fix Artful FTBFS due to newer glibc (LP: #1724859)
1128+ - d/p/utils-Include-stdint.h.patch: upstream fix for changed include
1129+ files.
1130+
1131+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 19 Oct 2017 15:18:52 +0200
1132+
1133+strongswan (5.5.1-4ubuntu2) artful; urgency=medium
1134+
1135+ * SECURITY UPDATE: Fix RSA signature verification
1136+ - debian/patches/CVE-2017-11185.patch: does some
1137+ verifications in order to avoid null-point dereference
1138+ in src/libstrongswan/gmp/gmp_rsa_public_key.c
1139+ - CVE-2017-11185
1140+
1141+ -- Leonidas S. Barbosa <leo.barbosa@canonical.com> Tue, 15 Aug 2017 14:49:49 -0300
1142+
1143+strongswan (5.5.1-4ubuntu1) artful; urgency=medium
1144+
1145+ * Merge from Debian to pick up latest security changes (CVE-2017-9022,
1146+ CVE-2017-9023).
1147+ * Remaining Changes:
1148+ + Update init/service handling
1149+ - d/rules: Change init/systemd program name to strongswan
1150+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
1151+ patching upstream
1152+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
1153+ linking to upstream
1154+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1155+ - d/strongswan-starter.prerm: Stop strongswan service on package
1156+ removal (as opposed to using the old init.d script).
1157+ + Clean up d/strongswan-starter.postinst:
1158+ - Removed section about runlevel changes
1159+ - Adapted service restart section for Upstart (kept to be Trusty
1160+ backportable).
1161+ - Remove old symlinks to init.d files is necessary.
1162+ - Removed further out-dated code
1163+ - Removed entire section on opportunistic encryption - this was never in
1164+ strongSwan.
1165+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
1166+ + Mass enablement of extra plugins and features to allow a user to use
1167+ strongswan for a variety of use cases without having to rebuild.
1168+ - d/control: Add required additional build-deps
1169+ - d/rules: Enable features at configure stage
1170+ - d/control: Mention addtionally enabled plugins
1171+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1172+ - d/libstrongswan.install: Add plugins (so, conf)
1173+ + d/rules: Disable duplicheck as per
1174+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
1175+ + Remove ha plugin (requires special kernel)
1176+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
1177+ - d/rules: Do not enable ha plugin
1178+ - d/control: Drop listing the ha plugin in the package description
1179+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1180+ via this userspace implementation (please do note that this is still
1181+ considered experimental by upstream).
1182+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1183+ - d/control: List kernel-libipsec plugin at extra plugins description
1184+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1185+ upstream recommends to not load kernel-libipsec by default.
1186+ + Relocate tnc plugin
1187+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1188+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1189+ + d/strongswan-starter.install: Install pool feature, that useful due to
1190+ having attr-sql plugin that is enabled now.
1191+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
1192+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
1193+ - d/libstrongswan.install: Add plugins/confiles
1194+ - d/control: move package descriptions and add required breaks/replaces
1195+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1196+ + d/libstrongswan.install: Add kernel-netlink configuration files
1197+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1198+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
1199+ autopkgtest the bliss test takes longer than the default (Upstream in
1200+ 5.5.2 via issue 2204)
1201+ + Complete the disabling of libfast; This was partially accepted in Debian,
1202+ it is no more packaging medcli and medsrv, but still builds and
1203+ mentions it.
1204+ - d/rules: Add --disable-fast to avoid build time and dependencies
1205+ - d/control: Remove medcli, medsrv from package description
1206+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
1207+ "only" to extra-plugins Mgf1 is not listed as default plugin at
1208+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
1209+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
1210+ libstrongswan-extra-plugins.
1211+ + Add missing mention of md4 plugin in d/control
1212+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1213+ missed that)
1214+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1215+ plugins for the most common use cases from extra-plugins into a new
1216+ standard-plugins package. This will allow those use cases without pulling
1217+ in too much more plugins (a bit like the tnc package). Recommend that
1218+ package from strongswan-libcharon.
1219+
1220+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 31 May 2017 15:57:54 +0200
1221+
1222+strongswan (5.5.1-3ubuntu1) artful; urgency=medium
1223+
1224+ * Merge from Debian to pick up latest changes. Among others this includes:
1225+ - a lot of the Delta we upstreamed to Debian (more discussions are ongoing
1226+ but likely have to wait until Debian stretch was released)
1227+ - enabling mediation support (LP: #1657413)
1228+ * Remaining Changes:
1229+ + Update init/service handling
1230+ - d/rules: Change init/systemd program name to strongswan
1231+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
1232+ patching upstream
1233+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
1234+ linking to upstream
1235+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1236+ - d/strongswan-starter.prerm: Stop strongswan service on package
1237+ removal (as opposed to using the old init.d script).
1238+ + Clean up d/strongswan-starter.postinst:
1239+ - Removed section about runlevel changes
1240+ - Adapted service restart section for Upstart (kept to be Trusty
1241+ backportable).
1242+ - Remove old symlinks to init.d files is necessary.
1243+ - Removed further out-dated code
1244+ - Removed entire section on opportunistic encryption - this was never in
1245+ strongSwan.
1246+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
1247+ + Mass enablement of extra plugins and features to allow a user to use
1248+ strongswan for a variety of use cases without having to rebuild.
1249+ - d/control: Add required additional build-deps
1250+ - d/rules: Enable features at configure stage
1251+ - d/control: Mention addtionally enabled plugins
1252+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1253+ - d/libstrongswan.install: Add plugins (so, conf)
1254+ + d/rules: Disable duplicheck as per
1255+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
1256+ + Remove ha plugin (requires special kernel)
1257+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
1258+ - d/rules: Do not enable ha plugin
1259+ - d/control: Drop listing the ha plugin in the package description
1260+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1261+ via this userspace implementation (please do note that this is still
1262+ considered experimental by upstream).
1263+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1264+ - d/control: List kernel-libipsec plugin at extra plugins description
1265+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1266+ upstream recommends to not load kernel-libipsec by default.
1267+ + Relocate tnc plugin
1268+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1269+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1270+ + d/strongswan-starter.install: Install pool feature, that useful due to
1271+ having attr-sql plugin that is enabled now.
1272+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
1273+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
1274+ - d/libstrongswan.install: Add plugins/confiles
1275+ - d/control: move package descriptions and add required breaks/replaces
1276+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1277+ + d/libstrongswan.install: Add kernel-netlink configuration files
1278+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1279+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
1280+ autopkgtest the bliss test takes longer than the default (Upstream in
1281+ 5.5.2 via issue 2204)
1282+ + Complete the disabling of libfast; This was partially accepted in Debian,
1283+ it is no more packaging medcli and medsrv, but still builds and
1284+ mentions it.
1285+ - d/rules: Add --disable-fast to avoid build time and dependencies
1286+ - d/control: Remove medcli, medsrv from package description
1287+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
1288+ "only" to extra-plugins Mgf1 is not listed as default plugin at
1289+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
1290+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
1291+ libstrongswan-extra-plugins.
1292+ + Add missing mention of md4 plugin in d/control
1293+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1294+ missed that)
1295+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1296+ plugins for the most common use cases from extra-plugins into a new
1297+ standard-plugins package. This will allow those use cases without pulling
1298+ in too much more plugins (a bit like the tnc package). Recommend that
1299+ package from strongswan-libcharon.
1300+ * Dropped Changes:
1301+ + Add and install apparmor profiles (in Debian)
1302+ - d/rules: Install AppArmor profiles
1303+ - d/control: Add dh-apparmor build-dep
1304+ - d/usr.lib.ipsec.{charon, lookip, stroke}: Add latest AppArmor profiles
1305+ for charon, lookip and stroke
1306+ - d/libcharon-extra-plugins.install: Install profile for lookip
1307+ - d/strongswan-charon.install: Install profile for charon
1308+ - d/strongswan-starter.install: Install profile for stroke
1309+ - Fix strongswan ipsec status issue with apparmor
1310+ - Fix Dep8 tests for the now extra strongswan-pki package for pki
1311+ - Fix Dep8 tests for the now extra strongswan-scepclient package
1312+ + d/rules: Sorted and only one enable option per configure line (in
1313+ Debian)
1314+ + Add updated logcheck rules (in Debian)
1315+ - debian/libstrongswan.strongswan.logcheck.*: Remove outdated files
1316+ - debian/strongswan.logcheck: Add updated logcheck rules
1317+ + Add updated DEP8 tests (in Debian)
1318+ - d/tests/*: Add DEP8 tests
1319+ - d/control: Enable autotestpkg
1320+ + d/rules: do not strip for library integrity checking (After Discussion
1321+ with Debian this isn't acceptable there, but at the same time it turned
1322+ out the real use-case of this never uses this lib but instead third
1323+ party checks of checksums for e.g. FIPS cert; so drop the Delta)
1324+ - Use override_dh_strip to to avoid overwriting user build flags.
1325+ - Add missing mention of libchecksum integrity test in d/control
1326+ + d/rules: Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths
1327+ in tests to avoid issues in low entropy environments. (Debian has
1328+ disabled !x86 tests for the same reason, one solution is enough)
1329+
1330+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 04 May 2017 14:06:23 +0200
1331+
1332 strongswan (5.5.1-3) unstable; urgency=medium
1333
1334 [ Christian Ehrhardt ]
1335@@ -428,6 +1642,136 @@ strongswan (5.5.1-2) unstable; urgency=medium
1336
1337 -- Yves-Alexis Perez <corsac@debian.org> Wed, 07 Dec 2016 08:34:52 +0100
1338
1339+strongswan (5.5.1-1ubuntu2) zesty; urgency=medium
1340+
1341+ * Update Maintainers which was missed while merging 5.5.1-1.
1342+
1343+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 19 Dec 2016 16:02:40 +0100
1344+
1345+strongswan (5.5.1-1ubuntu1) zesty; urgency=medium
1346+
1347+ * Merge from Debian (complex delta, discussions and broken out changes can be
1348+ found in the merge proposal linked from the merge bug LP: #1631198)
1349+ * Remaining Changes:
1350+ + d/rules: Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity
1351+ checking.
1352+ + d/rules: Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths
1353+ in tests to avoid issues in low entropy environments.
1354+ + Update init/service handling
1355+ - d/rules: Change init/systemd program name to strongswan
1356+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
1357+ patching upstream
1358+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
1359+ linking to upstream
1360+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1361+ - d/strongswan-starter.prerm: Stop strongswan service on package
1362+ removal (as opposed to using the old init.d script).
1363+ + Clean up d/strongswan-starter.postinst:
1364+ - Removed section about runlevel changes
1365+ - Adapted service restart section for Upstart (kept to be Trusty
1366+ backportable).
1367+ - Remove old symlinks to init.d files is necessary.
1368+ - Removed further out-dated code
1369+ - Removed entire section on opportunistic encryption - this was never in
1370+ strongSwan.
1371+ + Add and install apparmor profiles
1372+ - d/rules: Install AppArmor profiles
1373+ - d/control: Add dh-apparmor build-dep
1374+ - d/usr.lib.ipsec.{charon, lookip, stroke}: Add latest AppArmor profiles
1375+ for charon, lookip and stroke
1376+ - d/libcharon-extra-plugins.install: Install profile for lookip
1377+ - d/strongswan-charon.install: Install profile for charon
1378+ - d/strongswan-starter.install: Install profile for stroke
1379+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
1380+ + d/rules: Sorted and only one enable option per configure line
1381+ + Mass enablement of extra plugins and features to allow a user to use
1382+ strongswan for a variety of use cases without having to rebuild.
1383+ - d/control: Add required additional build-deps
1384+ - d/rules: Enable features at configure stage
1385+ - d/control: Mention addtionally enabled plugins
1386+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1387+ - d/libstrongswan.install: Add plugins (so, conf)
1388+ + d/rules: Disable duplicheck as per
1389+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
1390+ + Remove ha plugin (requires special kernel)
1391+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
1392+ - d/rules: Do not enable ha plugin
1393+ - d/control: Drop listing the ha plugin in the package description
1394+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1395+ via this userspace implementation (please do note that this is still
1396+ considered experimental by upstream).
1397+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1398+ - d/control: List kernel-libipsec plugin at extra plugins description
1399+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1400+ upstream recommends to not load kernel-libipsec by default.
1401+ + Relocate tnc plugin
1402+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1403+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1404+ + d/strongswan-starter.install: Install pool feature, that useful due to
1405+ having attr-sql plugin that is enabled now.
1406+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
1407+ - d/libstrongswan-extra-plugins.install: Remove plugins
1408+ - d/libstrongswan.install: Add plugins
1409+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1410+ + d/libstrongswan.install: Add kernel-netlink configuration files
1411+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1412+ + Add updated logcheck rules
1413+ - debian/libstrongswan.strongswan.logcheck.*: Remove outdated files
1414+ - debian/strongswan.logcheck: Add updated logcheck rules
1415+ + Add updated DEP8 tests
1416+ - d/tests/*: Add DEP8 tests
1417+ - d/control: Enable autotestpkg
1418+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
1419+ autopkgtest the bliss test takes longer than the default
1420+ + Complete the disabling of libfast
1421+ - Note: This was partially accepted in Debian, it is no more
1422+ packaging medcli and medsrv, but still builds and mentions it
1423+ - d/rules: Add --disable-fast to avoid build time and dependencies
1424+ - d/control: Remove medcli, medsrv from package description
1425+ * Dropped Changes:
1426+ + Adding build-dep to iptables-dev (no change, was only in Changelog)
1427+ + Dropping of build deps libfcgi-dev, clearsilver-dev (in Debian)
1428+ + Adding strongswan-plugin-* virtual packages for dist-upgrade (no
1429+ upgrade path left needing them)
1430+ + Most of "disabling libfast" (Debian dropped it from package content)
1431+ + Transition for ipsec service (no upgrade path left)
1432+ + Reverted part of the cleanup to d/strongswan-starter.postinst as using
1433+ service should rather use invoke-rc.d (so it is a partial revert of our
1434+ delta)
1435+ + Transition handling (breaks/replaces) from per-plugin packages to the
1436+ three grouped plugin packages (no upgrade path left)
1437+ + debian/strongswan-starter.dirs: Don't touch /etc/init.d. (while "correct"
1438+ it is effectively a no-op still, so not worth the delta)
1439+ + Lower dpkg-dev to 1.16.1 from 1.16.2 to enable backporting to Precise
1440+ (no more needed)
1441+ + d/rules: Remove configure option --enable-unit-test (unit tests run by
1442+ default)
1443+ * Added Changes:
1444+ + Fix strongswan ipsec status issue with apparmor (LP: #1587886)
1445+ + d/control, d/libstrongswan.install, d/libstrongswan-extra-plugins: Fixup
1446+ the relocation of the ccm plugin which missed to move the conffiles.
1447+ + Complete move of test-vectors (was missing in d/control)
1448+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
1449+ "only" to extra-plugins Mgf1 is not listed as default plugin at
1450+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
1451+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
1452+ libstrongswan-extra-plugins.
1453+ + Add missing mention of md4 plugin in d/control
1454+ + Add missing mention of libchecksum integrity test in d/control
1455+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1456+ missed that)
1457+ + Use override_dh_strip to to fix library integrity checking instead of
1458+ DEB_BUILD_OPTION to avoid overwriting user build flags.
1459+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1460+ plugins for the most common use cases from extra-plugins into a new
1461+ standard-plugins package. This will allow those use cases without pulling
1462+ in too much more plugins (a bit like the tnc package). Recommend that
1463+ package from strongswan-libcharon (LP: #1640826).
1464+ + Fix Dep8 tests for the now extra strongswan-pki package for pki
1465+ + Fix Dep8 tests for the now extra strongswan-scepclient package
1466+
1467+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 07 Nov 2016 16:16:41 +0100
1468+
1469 strongswan (5.5.1-1) unstable; urgency=medium
1470
1471 * New upstream bugfix release.
1472@@ -544,6 +1888,177 @@ strongswan (5.3.5-2) unstable; urgency=medium
1473
1474 -- Yves-Alexis Perez <corsac@debian.org> Mon, 14 Mar 2016 23:53:34 +0100
1475
1476+strongswan (5.3.5-1ubuntu4) yakkety; urgency=medium
1477+
1478+ * Build-depend on libjson-c-dev instead of libjson0-dev.
1479+ * Rebuild against libjson-c3.
1480+
1481+ -- Graham Inggs <ginggs@ubuntu.com> Fri, 29 Apr 2016 19:04:22 +0200
1482+
1483+strongswan (5.3.5-1ubuntu3) xenial; urgency=medium
1484+
1485+ * Rebuild against libmysqlclient20.
1486+
1487+ -- Robie Basak <robie.basak@ubuntu.com> Tue, 05 Apr 2016 13:02:48 +0000
1488+
1489+strongswan (5.3.5-1ubuntu2) xenial; urgency=medium
1490+
1491+ * debian/tests/plugins: rdrand may or may not be loaded, depending on the
1492+ cpu features.
1493+
1494+ -- Iain Lane <iain@orangesquash.org.uk> Mon, 22 Feb 2016 17:13:01 +0000
1495+
1496+strongswan (5.3.5-1ubuntu1) xenial; urgency=medium
1497+
1498+ * debian/{rules,control,libstrongswan-extra-plugins.install}
1499+ Enable bliss plugin
1500+ * debian/{rules,control,libstrongswan-extra-plugins.install}
1501+ Enable chapoly plugin
1502+ * debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch
1503+ Upstream suggests to not load this plugin by default as it has
1504+ some limitations.
1505+ https://wiki.strongswan.org/projects/strongswan/wiki/Kernel-libipsec
1506+ * debian/patches/increase-bliss-test-timeout.patch
1507+ Under QEMU/KVM for autopkgtest bliss test takes a bit longer then default
1508+ * Update Apparmor profiles
1509+ - usr.lib.ipsec.charon
1510+ - add capability audit_write for xauth-pam (LP: #1470277)
1511+ - add capability dac_override (needed by agent plugin)
1512+ - allow priv dropping (LP: #1333655)
1513+ - allow caching CRLs (LP: #1505222)
1514+ - allow rw access to /dev/net/tun for kernel-libipsec (LP: #1309594)
1515+ - usr.lib.ipsec.stroke
1516+ - allow priv dropping (LP: #1333655)
1517+ - add local include
1518+ - usr.lib.ipsec.lookip
1519+ - add local include
1520+ * Merge from Debian, which includes fixes for all previous CVEs
1521+ Fixes (LP: #1330504, #1451091, #1448870, #1470277)
1522+ Remaining changes:
1523+ * debian/control
1524+ - Lower dpkg-dev to 1.16.1 from 1.16.2 to enable backporting to Precise
1525+ - Update Maintainer for Ubuntu
1526+ - Add build-deps
1527+ - dh-apparmor
1528+ - iptables-dev
1529+ - libjson0-dev
1530+ - libldns-dev
1531+ - libmysqlclient-dev
1532+ - libpcsclite-dev
1533+ - libsoup2.4-dev
1534+ - libtspi-dev
1535+ - libunbound-dev
1536+ - Drop build-deps
1537+ - libfcgi-dev
1538+ - clearsilver-dev
1539+ - Create virtual packages for all strongswan-plugin-* for dist-upgrade
1540+ - Set XS-Testsuite: autopkgtest
1541+ * debian/rules:
1542+ - Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity checking.
1543+ - Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths in
1544+ tests.
1545+ - Change init/systemd program name to strongswan
1546+ - Install AppArmor profiles
1547+ - Removed pieces on 'patching ipsec.conf' on build.
1548+ - Enablement of features per Ubuntu current config suggested from
1549+ upstream recommendation
1550+ - Unpack and sort enabled features to one-per-line
1551+ - Disable duplicheck as per
1552+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
1553+ - Disable libfast (--disable-fast):
1554+ Requires dropping medsrv, medcli plugins which depend on libfast
1555+ - Add configure options
1556+ --with-tss=trousers
1557+ - Remove configure options:
1558+ --enable-ha (requires special kernel)
1559+ --enable-unit-test (unit tests run by default)
1560+ - Drop logcheck install
1561+ * debian/tests/*
1562+ - Add DEP8 test for strongswan service and plugins
1563+ * debian/strongswan-starter.strongswan.service
1564+ - Add new systemd file instead of patching upstream
1565+ * debian/strongswan-starter.links
1566+ - removed, use Ubuntu systemd file instead of linking to upstream
1567+ * debian/usr.lib.ipsec.{charon, lookip, stroke}
1568+ - added AppArmor profiles for charon, lookip and stroke
1569+ * debian/libcharon-extra-plugins.install
1570+ - Add plugins
1571+ - kernel-libipsec.{so, lib, conf, apparmor}
1572+ - Remove plugins
1573+ - libstrongswan-ha.so
1574+ - Relocate plugins
1575+ - libstrongswan-tnc-tnccs.so (strongswan-tnc-base.install)
1576+ * debian/libstrongswan-extra-plugins.install
1577+ - Add plugins (so, lib, conf)
1578+ - acert
1579+ - attr-sql
1580+ - coupling
1581+ - dnscert
1582+ - fips-prf
1583+ - gmp
1584+ - ipseckey
1585+ - load-tester
1586+ - mysql
1587+ - ntru
1588+ - radattr
1589+ - soup
1590+ - sqlite
1591+ - sql
1592+ - systime-fix
1593+ - unbound
1594+ - whitelist
1595+ - Relocate plugins (so, lib, conf)
1596+ - ccm (libstrongswan.install)
1597+ - test-vectors (libstrongswan.install)
1598+ * debian/libstrongswan.install
1599+ - Sort sections
1600+ - Add plugins (so, lib, conf)
1601+ - libchecksum
1602+ - ccm
1603+ - eap-identity
1604+ - md4
1605+ - test-vectors
1606+ * debian/strongswan-charon.install
1607+ - Add AppArmor profile for charon
1608+ * debian/strongswan-starter.install
1609+ - Add tools, manpages, conf
1610+ - openac
1611+ - pool
1612+ - _updown_espmark
1613+ - Add AppArmor profile for stroke
1614+ * debian/strongswan-tnc-base.install
1615+ - Add new subpackage for TNC
1616+ - remove non-existent (dropped in 5.2.1) libpts library files
1617+ * debian/strongswan-tnc-client.install
1618+ - Add new subpackage for TNC
1619+ * debian/strongswan-tnc-ifmap.install
1620+ - Add new subpackage for TNC
1621+ * debian/strongswan-tnc-pdp.install
1622+ - Add new subpackage for TNC
1623+ * debian/strongswan-tnc-server.install
1624+ - Add new subpackage for TNC
1625+ * debian/strongswan-starter.postinit:
1626+ - Removed section about runlevel changes, it's almost 2014.
1627+ - Adapted service restart section for Upstart.
1628+ - Remove old symlinks to init.d files is necessary.
1629+ * debian/strongswan-starter.dirs: Don't touch /etc/init.d.
1630+ * debian/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1631+ * debian/strongswan-starter.prerm: Stop strongswan service on package
1632+ removal (as opposed to using the old init.d script).
1633+ * debian/libstrongswan.strongswan.logcheck combined into debian/strongswan.logcheck
1634+ - logcheck patterns updated to be helpful
1635+ * debian/strongswan-starter.postinst: Removed further out-dated code and
1636+ entire section on opportunistic encryption - this was never in strongSwan.
1637+ * debian/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1638+ Drop changes:
1639+ * debian/control
1640+ - Per-plugin package breakup: Reducing packaging delta from Debian
1641+ - Don't build dhcp, farp subpackages: Reduce packging delta from Debian
1642+ * debian/watch: Already exists in Debian merge
1643+ * debian/upstream/signing-key.asc: Upstream has newer version.
1644+
1645+ -- Ryan Harper <ryan.harper@canonical.com> Fri, 12 Feb 2016 11:24:53 -0600
1646+
1647 strongswan (5.3.5-1) unstable; urgency=medium
1648
1649 * New upstream bugfix release.
1650@@ -816,6 +2331,210 @@ strongswan (5.1.2-1) unstable; urgency=medium
1651
1652 -- Yves-Alexis Perez <corsac@debian.org> Wed, 12 Mar 2014 11:22:38 +0100
1653
1654+strongswan (5.1.2-0ubuntu8) xenial; urgency=medium
1655+
1656+ * Import FTBFS for s390x from Debian 5.1.2-3 upload. (LP: #1521240)
1657+
1658+ -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 30 Nov 2015 15:46:06 +0000
1659+
1660+strongswan (5.1.2-0ubuntu7) xenial; urgency=medium
1661+
1662+ * SECURITY UPDATE: authentication bypass in eap-mschapv2 plugin
1663+ - debian/patches/CVE-2015-8023.patch: only succeed authentication if
1664+ MSK was established in
1665+ src/libcharon/plugins/eap_mschapv2/eap_mschapv2.c.
1666+ - CVE-2015-8023
1667+ * debian/patches/disable_ntru_test.patch: disable test causing FTBFS
1668+ until regression is properly investigated.
1669+
1670+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 19 Nov 2015 14:00:17 -0500
1671+
1672+strongswan (5.1.2-0ubuntu6) wily; urgency=medium
1673+
1674+ * SECURITY UPDATE: user credential disclosure to rogue servers
1675+ - debian/patches/CVE-2015-4171.patch: enforce remote authentication
1676+ config before proceeding with own authentication in
1677+ src/libcharon/sa/ikev2/tasks/ike_auth.c.
1678+ - CVE-2015-4171
1679+ * debian/rules: don't FTBFS from unused service file
1680+
1681+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 08 Jun 2015 12:50:38 -0400
1682+
1683+strongswan (5.1.2-0ubuntu5) vivid; urgency=medium
1684+
1685+ * Add a systemd unit corresponding to strongswan-starter.strongswan.upstart.
1686+
1687+ -- Martin Pitt <martin.pitt@ubuntu.com> Fri, 16 Jan 2015 08:27:54 +0100
1688+
1689+strongswan (5.1.2-0ubuntu4) vivid; urgency=medium
1690+
1691+ * SECURITY UPDATE: denial of service via DH group 1025
1692+ - debian/patches/CVE-2014-9221.patch: define MODP_CUSTOM outside of
1693+ IKE DH range in src/libstrongswan/crypto/diffie_hellman.c,
1694+ src/libstrongswan/crypto/diffie_hellman.h.
1695+ - CVE-2014-9221
1696+
1697+ -- Tyler Hicks <tyhicks@canonical.com> Mon, 05 Jan 2015 08:25:29 -0500
1698+
1699+strongswan (5.1.2-0ubuntu3) utopic; urgency=low
1700+
1701+ * Added "libgcrypt20-dev | libgcrypt11-dev" to build dependencies to fix
1702+ build.
1703+
1704+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 15 Oct 2014 16:49:18 +0000
1705+
1706+strongswan (5.1.2-0ubuntu2) trusty; urgency=medium
1707+
1708+ * SECURITY UPDATE: remote authentication bypass
1709+ - debian/patches/CVE-2014-2338.patch: reject CREATE_CHILD_SA exchange
1710+ on unestablished IKE_SAs in src/libcharon/sa/ikev2/task_manager_v2.c.
1711+ - CVE-2014-2338
1712+
1713+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 14 Apr 2014 11:24:34 -0400
1714+
1715+strongswan (5.1.2-0ubuntu1) trusty; urgency=low
1716+
1717+ * New upstream release.
1718+
1719+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 01 Mar 2014 08:53:17 +0000
1720+
1721+strongswan (5.1.2~rc2-0ubuntu2) trusty; urgency=low
1722+
1723+ * debian/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1724+ * debian/usr.lib.ipsec.charon: Allow read access to /run/charon.
1725+
1726+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 19 Feb 2014 13:07:16 +0000
1727+
1728+strongswan (5.1.2~rc2-0ubuntu1) trusty; urgency=low
1729+
1730+ * New upstream release candidate.
1731+
1732+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 19 Feb 2014 12:59:21 +0000
1733+
1734+strongswan (5.1.2~rc1-0ubuntu4) trusty; urgency=medium
1735+
1736+ * debian/strongswan-tnc-*.install: Fixed files so libraries go into correct
1737+ packages.
1738+ * debian/usr.lib.ipsec.stroke: Allow access to strongswan.d directories.
1739+
1740+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 17 Feb 2014 18:12:38 +0000
1741+
1742+strongswan (5.1.2~rc1-0ubuntu3) trusty; urgency=low
1743+
1744+ * debian/rules: Exclude rdrand.conf in dh_install's --fail-missing.
1745+
1746+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:46:46 +0000
1747+
1748+strongswan (5.1.2~rc1-0ubuntu2) trusty; urgency=low
1749+
1750+ * debian/libstrongswan.install: Moved rdrand plugin configuration to rules
1751+ as it's only useful on amd64.
1752+ * debian/watch: Added opts=pgpsigurlmangle option.
1753+ * debian/upstream/signing-key.asc: Added key: 0xB34DBA77.
1754+
1755+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:32:10 +0000
1756+
1757+strongswan (5.1.2~rc1-0ubuntu1) trusty; urgency=medium
1758+
1759+ * New upstream release candidate.
1760+ * debian/*.install - include new configuration files for plugins in
1761+ appropiate packages.
1762+
1763+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:03:14 +0000
1764+
1765+strongswan (5.1.2~dr3+git20130120-0ubuntu3) trusty; urgency=low
1766+
1767+ * debian/control:
1768+ - Added Breaks/Replaces for all library files which have been moved
1769+ about (LP: #1278176).
1770+ - Removed build-dependency on check and added one on dh-apparmor.
1771+ * debian/strongswan-starter.postinst: Removed further out-dated code and
1772+ entire section on opportunistic encryption - this was never in strongSwan.
1773+ * debian/rules: Removed pieces on 'patching ipsec.conf' on build.
1774+
1775+ -- Jonathan Davies <jonathan.davies@canonical.com> Sun, 09 Feb 2014 23:53:23 +0000
1776+
1777+strongswan (5.1.2~dr3+git20130120-0ubuntu2) trusty; urgency=low
1778+
1779+ * debian/control: Fixed references to plugin-fips-prf.
1780+
1781+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 22 Jan 2014 11:22:14 +0000
1782+
1783+strongswan (5.1.2~dr3+git20130120-0ubuntu1) trusty; urgency=low
1784+
1785+ * Upstream Git snapshot for build fixes with regards to entropy.
1786+ * debian/rules:
1787+ - Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity checking.
1788+ - Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths in
1789+ tests.
1790+
1791+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 20 Jan 2014 19:00:59 +0000
1792+
1793+strongswan (5.1.2~dr3-0ubuntu1) trusty; urgency=low
1794+
1795+ * New upstream developer release.
1796+ * Made changes to packaging per upstream suggestions.
1797+ - Dropped medcli and medsrv packages - not recommended by upstream at this
1798+ time.
1799+ - Dropped ha plugin - needs special kernel.
1800+ - Improved all package descriptions in general.
1801+ - Drop build-dep on clearsilver-dev and libfcgi-dev - no longer needed.
1802+ - Removed debian/*logcheck* files - not relevant to strongSwan.
1803+ - Split dhcp and farp packages into sub-packages.
1804+ - Build kernel-libipsec, ntru, systime-fix, and xauth-noauth plugins.
1805+ - Changes to TNC-related packages.
1806+ * Created AppArmor profiles for lookip and stroke.
1807+
1808+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 15 Jan 2014 22:52:53 +0000
1809+
1810+strongswan (5.1.2~dr2+git20130106-0ubuntu2) trusty; urgency=low
1811+
1812+ * libstrongswan.install: Removed lingering unit-tester.so reference.
1813+
1814+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 06 Jan 2014 20:29:59 +0000
1815+
1816+strongswan (5.1.2~dr2+git20130106-0ubuntu1) trusty; urgency=low
1817+
1818+ * Git snapshot of commit 94e10f15e51ead788d9947e966878ebfdc95b7ce.
1819+ Incorporates upstream fixes for:
1820+ - Integrity testing.
1821+ - Unit test failures on little endian systems.
1822+ * Dropped debian/patches/02_test_asn1_fix_32bit_time_test.patch - fixed
1823+ upstream.
1824+ * debian/rules:
1825+ - Stop using CK_TIMEOUT_MULTIPLIER.
1826+ - Stop enabling the test suite only on non-powerpc arches (it runs
1827+ anyway).
1828+
1829+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 06 Jan 2014 20:17:20 +0000
1830+
1831+strongswan (5.1.2~dr2-0ubuntu3) trusty; urgency=low
1832+
1833+ * debian/control: Reinstate missing comma in dependencies.
1834+
1835+ -- Jonathan Davies <jonathan.davies@canonical.com> Fri, 03 Jan 2014 05:39:13 +0000
1836+
1837+strongswan (5.1.2~dr2-0ubuntu2) trusty; urgency=low
1838+
1839+ * Added debian/patches/02_test_asn1_fix_32bit_time_test.patch - fixes issue
1840+ where test for >2038 tests on 32-bit platforms is broken.
1841+ - Reported upstream: https://wiki.strongswan.org/issues/477
1842+ * debian/control: Added strongswan-plugin-ntru to strongswan-ike Suggests.
1843+
1844+ -- Jonathan Davies <jonathan.davies@canonical.com> Fri, 03 Jan 2014 05:02:32 +0000
1845+
1846+strongswan (5.1.2~dr2-0ubuntu1) trusty; urgency=low
1847+
1848+ * New upstream developer release.
1849+ * debian/rules: Configure with: --enable-af-alg, --enable-ntru, --enable-soup,
1850+ and --enable-unity.
1851+ * debian/control:
1852+ - New plugin packages created for the above
1853+ - Split fips-prf into its own package.
1854+ - Added build-dependency on libsoup2.4-dev.
1855+
1856+ -- Jonathan Davies <jonathan.davies@canonical.com> Thu, 02 Jan 2014 17:37:33 +0000
1857+
1858 strongswan (5.1.1-3) unstable; urgency=low
1859
1860 * Upload to unstable.
1861@@ -907,6 +2626,192 @@ strongswan (5.1.1-1) unstable; urgency=low
1862
1863 -- Yves-Alexis Perez <corsac@debian.org> Fri, 24 Jan 2014 21:22:32 +0100
1864
1865+strongswan (5.1.1-0ubuntu17) trusty; urgency=low
1866+
1867+ * debian/control:
1868+ - Make strongswan-ike depend on iproute2.
1869+ - Added xauth plugin dependency on strongswan-plugin-eap-gtc.
1870+ - Created strongswan-libfast package.
1871+
1872+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 01 Jan 2014 17:04:45 +0000
1873+
1874+strongswan (5.1.1-0ubuntu16) trusty; urgency=low
1875+
1876+ * debian/control:
1877+ - Further splitting of plugins into subpackages (such as all EAP plugins
1878+ to their own packages).
1879+ - Added libpcsclite-dev to build-dependencies.
1880+ * debian/rules:
1881+ - Sort configure options in alphabetical order.
1882+ - Added configure option of --enable-eap-aka-3gpp2, --enable-eap-dynamic,
1883+ --enable-eap-sim-file, --enable-eap-sim-pcsc,
1884+ --enable-eap-simaka-pseudonym, --enable-eap-simaka-reauth and
1885+ --enable-eap-simaka-sql.
1886+ - Don't exclude medsrv from install.
1887+ * Moved eap-identity.so to libstrongswan package as it's used by all the
1888+ other EAP plugins.
1889+
1890+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 21:25:50 +0000
1891+
1892+strongswan (5.1.1-0ubuntu15) trusty; urgency=low
1893+
1894+ * debian/control:
1895+ - Split plugins from libstrongswan package into modular subpackages.
1896+ - Added libmysqlclient-dev to build-dependencies.
1897+ - strongswan-ike: Set to depend on either strongswan-plugins-openssl or
1898+ strongswan-plugins-gcrypt.
1899+ - strongswan-ike: All other plugins added to Suggests.
1900+ - Created two new TNC packages: strongswan-tnc-ifmap and
1901+ strongswan-tnc-pdp and added to tnc-imcvs Suggests.
1902+ * debian/rules: Added to CONFIGUREARGS: --enable-certexpire,
1903+ --enable-error-notify, --enable-mysql, --enable-load-tester,
1904+ --enable-radattr, --enable-tnc-pdp, and --enable-whitelist.
1905+ * debian/strongswan-ike.install: Moved eap-identity.so to -tnc-imcvs package.
1906+
1907+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 16:15:32 +0000
1908+
1909+strongswan (5.1.1-0ubuntu14) trusty; urgency=low
1910+
1911+ * debian/rules:
1912+ - CK_TIMEOUT_MULTIPLIER back down to 6.
1913+ - Disable unit tests on powerpc.
1914+
1915+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:39:48 +0000
1916+
1917+strongswan (5.1.1-0ubuntu13) trusty; urgency=low
1918+
1919+ * debian/rules: CK_TIMEOUT_MULTIPLIER to 10 as just powerppc is being stubborn.
1920+
1921+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:23:42 +0000
1922+
1923+strongswan (5.1.1-0ubuntu12) trusty; urgency=low
1924+
1925+ * debian/rules: Bring CK_TIMEOUT_MULTIPLIER up to 6 to fix powerppc and
1926+ armhf.
1927+
1928+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:03:40 +0000
1929+
1930+strongswan (5.1.1-0ubuntu11) trusty; urgency=low
1931+
1932+ * 02_increase-test_rsa_generate-timeout.patch: Removed - only fixed build on
1933+ one extra arch.
1934+ * debian/rules: Set CK_TIMEOUT_MULTIPLIER to 4.
1935+
1936+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 06:51:47 +0000
1937+
1938+strongswan (5.1.1-0ubuntu10) trusty; urgency=low
1939+
1940+ * debian/patches: Added patch 02_increase-test_rsa_generate-timeout.patch -
1941+ - Increases RSA key generate test timeout to 30 seconds so that it doesn't
1942+ fail on armhf, arm64, and powerppc.
1943+ * Contrary to what the last changelog entry says, we are still running
1944+ strongswan as root (with AppArmor protection).
1945+
1946+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 06:06:47 +0000
1947+
1948+strongswan (5.1.1-0ubuntu9) trusty; urgency=low
1949+
1950+ * debian/rules: Added to configure options:
1951+ - --enable-tnc-ifmap: enable TNC IF-MAP module.
1952+ - --enable-duplicheck: enable duplicheck plugin.
1953+ - --enable-imv-swid, --enable-imc-swid: Added.
1954+ - Run strongswan as it's own user.
1955+ * debian/strongswan-starter.install: Install duplicheck.
1956+ * debian/strongswan-tnc-imcvs.install: Install swidtags.
1957+
1958+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 19:33:27 +0000
1959+
1960+strongswan (5.1.1-0ubuntu8) trusty; urgency=low
1961+
1962+ * debian/rules: Added to configure options:
1963+ - --enable-unit-tests: check unit testing on build.
1964+ - --enable-unbound: for validating DNS lookups.
1965+ - --enable-dnscert: for DNSCERT peer authentication.
1966+ - --enable-ipseckey: for IPSEC key authentication.
1967+ - --enable-lookip: for LookIP functionality.
1968+ - --enable-coupling: certificate coupling functionality.
1969+ * debian/control: Added check, libldns-dev, libunbound-dev to
1970+ build-dependencies.
1971+ * debian/libstrongswan.install: Install new plugin .so's.
1972+ * debian/strongswan-starter.install: Added lookip.
1973+
1974+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:52:07 +0000
1975+
1976+strongswan (5.1.1-0ubuntu7) trusty; urgency=low
1977+
1978+ * strongswan-starter.install: Moved pt-tls-client to tnc-imcvs (to prevent
1979+ the former from depending on the latter).
1980+
1981+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:30:19 +0000
1982+
1983+strongswan (5.1.1-0ubuntu6) trusty; urgency=low
1984+
1985+ * debian/strongswan-starter.prerm: Stop strongswan service on package
1986+ removal (as opposed to using the old init.d script).
1987+
1988+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:22:10 +0000
1989+
1990+strongswan (5.1.1-0ubuntu5) trusty; urgency=low
1991+
1992+ * debian/rules:
1993+ - CONFIGUREARGS: Merged Debian and RPM options.
1994+ - Brings in TNC functionality.
1995+ * debian/control:
1996+ - Added build-dependency on libtspi-dev.
1997+ - Created strongswan-tnc-imcvs binary package for TNC components.
1998+ - Added strongswan-tnc-imcvs to libstrongswan's Suggests.
1999+ * debian/libstrongswan.install:
2000+ - Included newly built MD4 and SQLite libraries.
2001+ - Removed 'tnc' references (moved to TNC package).
2002+ * debian/strongswan-tnc-imcvs.install: Created - handle new TNC libraries and
2003+ binaries.
2004+ * debian/usr.lib.ipsec.charon: Allow access to TNC modules.
2005+
2006+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 14:05:43 +0000
2007+
2008+strongswan (5.1.1-0ubuntu4) trusty; urgency=low
2009+
2010+ * debian/usr.lib.ipsec.charon: Added - AppArmor profile for charon.
2011+ * debian/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
2012+ * debian/control: strongswan-ike - Stop depending on ipsec-tools.
2013+
2014+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 05:35:17 +0000
2015+
2016+strongswan (5.1.1-0ubuntu3) trusty; urgency=low
2017+
2018+ * strongswan-starter.strongswan.upstart - Only start strongSwan when a
2019+ network connection is available.
2020+ * debian/control: Downgrade build-dep version of dpkg-dev from 1.16.2 to
2021+ 1.16.1 - to make precise backporting easier.
2022+
2023+ -- Jonathan Davies <jonathan.davies@canonical.com> Thu, 12 Dec 2013 10:43:15 +0000
2024+
2025+strongswan (5.1.1-0ubuntu2) trusty; urgency=low
2026+
2027+ * strongswan-starter.strongswan.upstart - Created Upstart job for
2028+ strongSwan.
2029+ * debian/rules: Set dh_installinit to install above file.
2030+ * debian/strongswan-starter.postinit:
2031+ - Removed section about runlevel changes, it's almost 2014.
2032+ - Adapted service restart section for Upstart.
2033+ - Remove old symlinks to init.d files is necessary.
2034+ * debian/strongswan-starter.dirs: Don't touch /etc/init.d.
2035+
2036+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 11 Dec 2013 23:10:28 +0000
2037+
2038+strongswan (5.1.1-0ubuntu1) trusty; urgency=low
2039+
2040+ * New upstream release.
2041+ * Removed: debian/patches/CVE-2013-6075, CVE-2013-6076.patch - upsteamed.
2042+ * debian/control: Updated Standards-Version to 3.9.5 and applied
2043+ XSBC-Original-Maintainer policy.
2044+ * strongswan-starter.install:
2045+ - pki tool is now in /usr/bin.
2046+ - Install pt-tls-client.
2047+ - Install manpages (LP: #1206263).
2048+
2049+ -- Jonathan Davies <jpds@ubuntu.com> Sun, 01 Dec 2013 17:43:59 +0000
2050+
2051 strongswan (5.1.0-3) unstable; urgency=high
2052
2053 * urgency=high for the security fixes.
2054diff --git a/debian/control b/debian/control
2055index e8bb298..a433e83 100644
2056--- a/debian/control
2057+++ b/debian/control
2058@@ -1,7 +1,8 @@
2059 Source: strongswan
2060 Section: net
2061 Priority: optional
2062-Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org>
2063+Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
2064+XSBC-Original-Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org>
2065 Uploaders: Yves-Alexis Perez <corsac@debian.org>
2066 Standards-Version: 4.6.2
2067 Vcs-Browser: https://salsa.debian.org/debian/strongswan
2068@@ -137,6 +138,7 @@ Description: strongSwan utility and crypto library (extra plugins)
2069 - gcrypt (Crypto backend based on libgcrypt, provides
2070 RSA/DH/ciphers/hashers/rng)
2071 - ldap (LDAP fetching plugin based on libldap)
2072+ - ntru (key exchanged based on post-quantum computer NTRU)
2073 - padlock (VIA padlock crypto backend, provides AES128/SHA1)
2074 - pkcs11 (PKCS#11 smartcard backend)
2075 - rdrand (High quality / high performance random source using the Intel
2076@@ -204,6 +206,9 @@ Description: strongSwan charon library (extra plugins)
2077 - unity (Cisco Unity extensions for IKEv1)
2078 - xauth-eap (XAuth backend that uses EAP methods to verify passwords)
2079 - xauth-pam (XAuth backend that uses PAM modules to verify passwords)
2080+ - eap-dynamic (EAP proxy plugin that dynamically selects an EAP method
2081+ requested/supported by the client (since 5.0.1))
2082+ - eap-peap (EAP-PEAP protocol handler, wraps other EAP methods securely)
2083
2084 Package: strongswan-starter
2085 Architecture: any
2086@@ -211,9 +216,9 @@ Pre-Depends: ${misc:Pre-Depends}
2087 Depends: adduser,
2088 libstrongswan (= ${binary:Version}),
2089 sysvinit-utils (>= 3.05-3),
2090+ strongswan-charon,
2091 ${misc:Depends},
2092 ${shlibs:Depends}
2093-Recommends: strongswan-charon
2094 Conflicts: openswan
2095 Description: strongSwan daemon starter and configuration file parser
2096 The strongSwan VPN suite uses the native IPsec stack in the standard
2097@@ -252,9 +257,9 @@ Architecture: any
2098 Pre-Depends: debconf | debconf-2.0
2099 Depends: iproute2 [linux-any] | iproute [linux-any],
2100 libstrongswan (= ${binary:Version}),
2101- strongswan-starter,
2102 ${misc:Depends},
2103 ${shlibs:Depends}
2104+Recommends: strongswan-starter,
2105 Provides: ike-server
2106 Description: strongSwan Internet Key Exchange daemon
2107 The strongSwan VPN suite uses the native IPsec stack in the standard
2108diff --git a/debian/libcharon-extra-plugins.install b/debian/libcharon-extra-plugins.install
2109index 94fbabd..91ca716 100644
2110--- a/debian/libcharon-extra-plugins.install
2111+++ b/debian/libcharon-extra-plugins.install
2112@@ -2,9 +2,11 @@
2113 usr/lib/ipsec/plugins/libstrongswan-addrblock.so
2114 usr/lib/ipsec/plugins/libstrongswan-certexpire.so
2115 usr/lib/ipsec/plugins/libstrongswan-eap-aka.so
2116+usr/lib/ipsec/plugins/libstrongswan-eap-dynamic.so
2117 usr/lib/ipsec/plugins/libstrongswan-eap-gtc.so
2118 usr/lib/ipsec/plugins/libstrongswan-eap-identity.so
2119 usr/lib/ipsec/plugins/libstrongswan-eap-md5.so
2120+usr/lib/ipsec/plugins/libstrongswan-eap-peap.so
2121 usr/lib/ipsec/plugins/libstrongswan-eap-radius.so
2122 usr/lib/ipsec/plugins/libstrongswan-eap-tls.so
2123 usr/lib/ipsec/plugins/libstrongswan-eap-tnc.so
2124@@ -25,9 +27,11 @@ usr/lib/ipsec/plugins/libstrongswan-xauth-pam.so
2125 usr/share/strongswan/templates/config/plugins/addrblock.conf
2126 usr/share/strongswan/templates/config/plugins/certexpire.conf
2127 usr/share/strongswan/templates/config/plugins/eap-aka.conf
2128+usr/share/strongswan/templates/config/plugins/eap-dynamic.conf
2129 usr/share/strongswan/templates/config/plugins/eap-gtc.conf
2130 usr/share/strongswan/templates/config/plugins/eap-identity.conf
2131 usr/share/strongswan/templates/config/plugins/eap-md5.conf
2132+usr/share/strongswan/templates/config/plugins/eap-peap.conf
2133 usr/share/strongswan/templates/config/plugins/eap-radius.conf
2134 usr/share/strongswan/templates/config/plugins/eap-tls.conf
2135 usr/share/strongswan/templates/config/plugins/eap-tnc.conf
2136@@ -49,9 +53,11 @@ etc/strongswan.d/tnc.conf
2137 etc/strongswan.d/charon/addrblock.conf
2138 etc/strongswan.d/charon/certexpire.conf
2139 etc/strongswan.d/charon/eap-aka.conf
2140+etc/strongswan.d/charon/eap-dynamic.conf
2141 etc/strongswan.d/charon/eap-gtc.conf
2142 etc/strongswan.d/charon/eap-identity.conf
2143 etc/strongswan.d/charon/eap-md5.conf
2144+etc/strongswan.d/charon/eap-peap.conf
2145 etc/strongswan.d/charon/eap-radius.conf
2146 etc/strongswan.d/charon/eap-tls.conf
2147 etc/strongswan.d/charon/eap-tnc.conf
2148diff --git a/debian/libcharon-extra-plugins.maintscript b/debian/libcharon-extra-plugins.maintscript
2149new file mode 100644
2150index 0000000..f6e7a3a
2151--- /dev/null
2152+++ b/debian/libcharon-extra-plugins.maintscript
2153@@ -0,0 +1,8 @@
2154+rm_conffile /etc/strongswan.d/charon/eap-aka-3gpp2.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2155+rm_conffile /etc/strongswan.d/charon/eap-sim-file.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2156+rm_conffile /etc/strongswan.d/charon/eap-sim-pcsc.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2157+rm_conffile /etc/strongswan.d/charon/eap-sim.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2158+rm_conffile /etc/strongswan.d/charon/eap-simaka-pseudonym.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2159+rm_conffile /etc/strongswan.d/charon/eap-simaka-reauth.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2160+rm_conffile /etc/strongswan.d/charon/eap-simaka-sql.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2161+rm_conffile /etc/strongswan.d/charon/xauth-noauth.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2162diff --git a/debian/libstrongswan-extra-plugins.install b/debian/libstrongswan-extra-plugins.install
2163index 2846e21..8f71239 100644
2164--- a/debian/libstrongswan-extra-plugins.install
2165+++ b/debian/libstrongswan-extra-plugins.install
2166@@ -9,6 +9,7 @@ usr/lib/ipsec/plugins/libstrongswan-curl.so
2167 usr/lib/ipsec/plugins/libstrongswan-curve25519.so
2168 usr/lib/ipsec/plugins/libstrongswan-gcrypt.so
2169 usr/lib/ipsec/plugins/libstrongswan-ldap.so
2170+usr/lib/ipsec/plugins/libstrongswan-ntru.so
2171 usr/lib/ipsec/plugins/libstrongswan-pkcs11.so
2172 usr/lib/ipsec/plugins/libstrongswan-test-vectors.so
2173 usr/lib/ipsec/plugins/libstrongswan-tpm.so
2174@@ -21,6 +22,7 @@ usr/share/strongswan/templates/config/plugins/curl.conf
2175 usr/share/strongswan/templates/config/plugins/curve25519.conf
2176 usr/share/strongswan/templates/config/plugins/gcrypt.conf
2177 usr/share/strongswan/templates/config/plugins/ldap.conf
2178+usr/share/strongswan/templates/config/plugins/ntru.conf
2179 usr/share/strongswan/templates/config/plugins/pkcs11.conf
2180 usr/share/strongswan/templates/config/plugins/test-vectors.conf
2181 usr/share/strongswan/templates/config/plugins/tpm.conf
2182@@ -32,6 +34,7 @@ etc/strongswan.d/charon/curl.conf
2183 etc/strongswan.d/charon/curve25519.conf
2184 etc/strongswan.d/charon/gcrypt.conf
2185 etc/strongswan.d/charon/ldap.conf
2186+etc/strongswan.d/charon/ntru.conf
2187 etc/strongswan.d/charon/pkcs11.conf
2188 etc/strongswan.d/charon/test-vectors.conf
2189 etc/strongswan.d/charon/tpm.conf
2190diff --git a/debian/rules b/debian/rules
2191index 14c7ca7..155946a 100755
2192--- a/debian/rules
2193+++ b/debian/rules
2194@@ -15,9 +15,11 @@ CONFIGUREARGS := --libdir=/usr/lib --libexecdir=/usr/lib \
2195 --enable-curl \
2196 --enable-eap-aka \
2197 --enable-eap-gtc \
2198+ --enable-eap-dynamic \
2199 --enable-eap-identity \
2200 --enable-eap-md5 \
2201 --enable-eap-mschapv2 \
2202+ --enable-eap-peap \
2203 --enable-eap-radius \
2204 --enable-eap-tls \
2205 --enable-eap-tnc \
2206@@ -32,6 +34,7 @@ CONFIGUREARGS := --libdir=/usr/lib --libexecdir=/usr/lib \
2207 --enable-led \
2208 --enable-lookip \
2209 --enable-mediation \
2210+ --enable-ntru \
2211 --enable-openssl \
2212 --enable-pkcs11 \
2213 --enable-test-vectors \
2214diff --git a/debian/tests/control b/debian/tests/control
2215index 997a870..3675f33 100644
2216--- a/debian/tests/control
2217+++ b/debian/tests/control
2218@@ -5,3 +5,9 @@ Restrictions: needs-root isolation-container allow-stderr
2219 Tests: daemon plugins
2220 Depends: strongswan-starter, libstrongswan-standard-plugins, libstrongswan-extra-plugins, libcharon-extra-plugins
2221 Restrictions: needs-root isolation-machine allow-stderr
2222+
2223+Tests: host-to-host
2224+Depends: strongswan-swanctl, strongswan-pki, libstrongswan-extra-plugins,
2225+ charon-systemd, lsb-release, snapd, dctrl-tools, libtss2-tcti-tabrmd0,
2226+ bind9-dnsutils
2227+Restrictions: needs-root isolation-machine allow-stderr skippable
2228diff --git a/debian/tests/host-to-host b/debian/tests/host-to-host
2229new file mode 100755
2230index 0000000..3a76da0
2231--- /dev/null
2232+++ b/debian/tests/host-to-host
2233@@ -0,0 +1,401 @@
2234+#!/bin/bash
2235+
2236+# host to host setup from https://docs.strongswan.org/docs/5.9/config/quickstart.html
2237+
2238+set -e
2239+set -o pipefail
2240+
2241+# exit early if not on Ubuntu
2242+if [ "$(lsb_release --short --id)" != "Ubuntu" ]; then
2243+ echo "This test only runs on Ubuntu, skipping."
2244+ exit 77
2245+fi
2246+
2247+cleanup() {
2248+ if [ $? -ne 0 ]; then
2249+ set +e
2250+ echo "Something failed, gathering debug info"
2251+ echo
2252+ echo "Installed strongswan packages:"
2253+ dpkg -l | grep -E "(strongswan|charon)"
2254+ echo
2255+ echo "loaded kernel modules:"
2256+ lsmod
2257+ echo
2258+ echo "journal logs from host:"
2259+ journalctl --no-pager -u strongswan.service || :
2260+ echo
2261+ echo "LXD details:"
2262+ lxc network list
2263+ lxc list
2264+ echo
2265+ for container in $(lxc list -f compact -c ns | grep -F RUNNING | awk '{print $1}'); do
2266+ echo "journal logs from container ${container}"
2267+ lxc exec "${container}" -- journalctl -u strongswan.service --no-pager || :
2268+ echo
2269+ echo "strongswan data from container ${container}"
2270+ for cmd in stats list-certs list-conns list-pols list-sas; do
2271+ echo "${cmd}:"
2272+ lxc exec "${container}" -- swanctl --${cmd} || :
2273+ echo
2274+ done
2275+ done
2276+ fi
2277+ set +e
2278+ rm -rf "${WORKDIR}"
2279+ for container in "${PEERS[@]}"; do
2280+ lxc delete --force "${container}" > /dev/null 2>&1 || :
2281+ done
2282+}
2283+
2284+trap cleanup EXIT
2285+
2286+WORKDIR=$(mktemp -d)
2287+PEERS=("moon" "sun")
2288+declare -A REMOTE
2289+REMOTE["moon"]="sun"
2290+REMOTE["sun"]="moon"
2291+PUBKEY_ALGO="ed25519"
2292+TESTNAME=$(basename "${0}")
2293+
2294+# ca
2295+CA_KEY_FILE="${WORKDIR}/strongswanKey.pem"
2296+REQ_FILE="${WORKDIR}/req.pem" # can be reused for multiple reqs
2297+CA_CERT_FILE="${WORKDIR}/strongswanCert.pem"
2298+
2299+source debian/tests/utils
2300+
2301+check_pol() {
2302+ #root@moon:~# swanctl --list-pols
2303+ #moon-sun/moon-sun, TUNNEL
2304+ # local: 10.38.71.14/32
2305+ # remote: 10.38.71.194/32
2306+ local me="${1}"
2307+ local pol="${2}"
2308+ local -i failures=0
2309+ local tunnel
2310+ local ip
2311+ local policy_ip
2312+
2313+ echo "Checking policy for:"
2314+ echo -n " we have a tunnel: "
2315+ if echo "${pol}" | head -n 1 | grep -qF TUNNEL; then
2316+ echo "OK"
2317+ else
2318+ echo "FAIL"
2319+ failures=$((failures+1))
2320+ fi
2321+
2322+ # moon-sun/moon-sun, TUNNEL -> tunnel = moon-sun
2323+ tunnel=$(echo "${pol}" | head -n 1 | cut -d , -f 1)
2324+ echo -n " tunnel matches local-remote: "
2325+ if echo "${tunnel}" | grep -qE "^${me}-${REMOTE[${me}]}/${me}-${REMOTE[${me}]}"; then
2326+ echo "OK"
2327+ else
2328+ echo "FAIL (tunnel=${tunnel})"
2329+ failures=$((failures+1))
2330+ fi
2331+
2332+ echo -n " local IP matches local peer: "
2333+ ip=$(lxc exec "${me}" -- dig +short "${me}.lxd")/32
2334+ policy_ip=$(echo "${pol}" | sed -n -r "s,^[[:blank:]]+local:[[:blank:]]+([0-9.]+/32),\1,p")
2335+ if [ "${ip}" = "${policy_ip}" ]; then
2336+ echo "OK"
2337+ else
2338+ echo "FAIL: local ip ${ip} != policy local ip ${policy_ip}"
2339+ failures=$((failures+1))
2340+ fi
2341+
2342+ echo -n " remote IP matches remote peer: "
2343+ ip=$(lxc exec "${me}" -- dig +short "${REMOTE[${me}]}.lxd")/32
2344+ policy_ip=$(echo "${pol}" | sed -n -r "s,^[[:blank:]]+remote:[[:blank:]]+([0-9.]+/32),\1,p")
2345+ if [ "${ip}" = "${policy_ip}" ]; then
2346+ echo "OK"
2347+ else
2348+ echo "FAIL: local ip ${ip} != policy local ip ${policy_ip}"
2349+ failures=$((failures+1))
2350+ fi
2351+
2352+ return ${failures}
2353+}
2354+
2355+check_sa() {
2356+ local -i failures=0
2357+ local me="${1}"
2358+ local sa="${2}"
2359+ local name=""
2360+ local sa_ip
2361+
2362+ # SAs look like this:
2363+ # moon-sun: #1, ESTABLISHED, IKEv2, f1bdc688a5078946_i* bf6e1559c5a87ab9_r
2364+ # local 'C=CH, O=strongswan, CN=moon.strongswan.org' @ 10.84.128.22[4500]
2365+ # remote 'C=CH, O=strongswan, CN=sun.strongswan.org' @ 10.84.128.191[4500]
2366+ # AES_CBC-128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519
2367+ # established 11s ago, rekeying in 14147s
2368+ # moon-sun: #2, reqid 1, INSTALLED, TUNNEL, ESP:AES_GCM_16-128
2369+ # installed 11s ago, rekeying in 3285s, expires in 3949s
2370+ # in c3bcdf8d, 168 bytes, 2 packets, 0s ago
2371+ # out caf49378, 168 bytes, 2 packets, 0s ago
2372+ # local 10.84.128.22/32
2373+ # remote 10.84.128.191/32
2374+
2375+ echo "Checking SA for:"
2376+
2377+ echo -n " established SA: "
2378+ if echo "${sa}" | grep -qE "^[[:alnum:]]+-[[:alnum:]]+:.*ESTABLISHED"; then
2379+ echo "OK"
2380+ else
2381+ echo "FAIL"
2382+ failures=$((failures+1))
2383+ fi
2384+
2385+ # parse the connection name from the first line: $local-$remote: #1,....
2386+ name=$(echo "${sa}" | head -n 1 | sed -r "s/^([[:alnum:]]+)-[[:alnum:]]+:.*/\1/")
2387+ echo -n " local DN matches CN=${name}.strongswan.org: "
2388+ if echo "${sa}" | grep -qE "^[[:blank:]]*local.*CN=${name}\.strongswan\.org"; then
2389+ echo "OK"
2390+ else
2391+ echo "FAIL"
2392+ failures=$((failures+1))
2393+ fi
2394+
2395+ # parse the connection name from the first line: $local-$remote: #1,....
2396+ name=$(echo "${sa}" | head -n 1 | sed -r "s/^[[:alnum:]]+-([[:alnum:]]+):.*/\1/")
2397+ echo -n " remote DN matches CN=${name}.strongswan.org: "
2398+ if echo "${sa}" | grep -qE "^[[:blank:]]*remote.*CN=${name}\.strongswan\.org"; then
2399+ echo "OK"
2400+ else
2401+ echo "FAIL"
2402+ failures=$((failures+1))
2403+ fi
2404+
2405+ echo -n " local IP matches local peer: "
2406+ ip=$(lxc exec "${me}" -- dig +short "${me}.lxd")/32
2407+ sa_ip=$(echo "${sa}" | sed -n -r "s,^[[:blank:]]+local[[:blank:]]+([0-9.]+/32),\1,p")
2408+ if [ "${ip}" = "${sa_ip}" ]; then
2409+ echo "OK"
2410+ else
2411+ echo "FAIL: local ip ${ip} != SA local ip ${sa_ip}"
2412+ failures=$((failures+1))
2413+ fi
2414+
2415+ echo -n " remote IP matches remote peer: "
2416+ ip=$(lxc exec "${me}" -- dig +short "${REMOTE[${me}]}.lxd")/32
2417+ sa_ip=$(echo "${sa}" | sed -n -r "s,^[[:blank:]]+remote[[:blank:]]+([0-9.]+/32),\1,p")
2418+ if [ "${ip}" = "${sa_ip}" ]; then
2419+ echo "OK"
2420+ else
2421+ echo "FAIL: remote ip ${ip} != SA remote ip ${sa_ip}"
2422+ failures=$((failures+1))
2423+ fi
2424+
2425+ # TODO: check for cipher, if it matches the algo used in the pubkey
2426+ # TODO: check for traffic, should not be zero
2427+
2428+ return ${failures}
2429+}
2430+
2431+_setup_peer() {
2432+ local peer="${1}"
2433+ local algo="${2}"
2434+ local key_file="${WORKDIR}/${peer}Key.pem"
2435+ local cert_file="${WORKDIR}/${peer}Cert.pem"
2436+
2437+ pki --gen --type "${algo}" --outform pem > "${key_file}"
2438+
2439+ pki --req --type priv --in "${key_file}" \
2440+ --dn "C=CH, O=strongswan, CN=${peer}.strongswan.org" \
2441+ --san "${peer}.strongswan.org" --outform pem > "${REQ_FILE}"
2442+
2443+ pki --issue --cacert "${CA_CERT_FILE}" --cakey "${CA_KEY_FILE}" \
2444+ --type pkcs10 --in "${REQ_FILE}" --serial 01 --lifetime 5 \
2445+ --outform pem --flag serverAuth > "${cert_file}"
2446+}
2447+
2448+_setup_lxd() {
2449+ lxd init --auto
2450+ network=$(lxc network list --format=compact | grep -E "bridge.*YES.*CREATED" | awk '{print $1}')
2451+ lxc network set "${network:-lxdbr0}" ipv6.address=none
2452+ if [ -n "${http_proxy}" ]; then
2453+ lxc config set core.proxy_http "${http_proxy}"
2454+ fi
2455+ if [ -n "${https_proxy}" ]; then
2456+ lxc config set core.proxy_https "${https_proxy}"
2457+ fi
2458+ if [ -n "${noproxy}" ]; then
2459+ lxc config set core.proxy_ignore_hosts "${noproxy}"
2460+ fi
2461+}
2462+
2463+_setup_host_containers() {
2464+ local release
2465+ local ip
2466+ local -i result=0
2467+ local -a deps
2468+
2469+ release=$(lsb_release -cs)
2470+ readarray -t deps < <(get_test_dependencies "${TESTNAME}" snapd dctrl-tools)
2471+
2472+ for container in "${PEERS[@]}"; do
2473+ echo "Launching container ${container} with release ${release}"
2474+ lxc launch "ubuntu-daily:${release}" "${container}" -c security.nesting=true -q
2475+ echo -en "Waiting for container ${container} to be ready "
2476+ wait_container_ready "${container}"
2477+
2478+ echo "Copying over /etc/apt to container ${container}"
2479+ lxc exec "${container}" -- rm -rf /etc/apt
2480+ lxc exec "${container}" -- mkdir -p /etc/apt
2481+ tar -cC /etc/apt . | lxc exec "${container}" -- tar -xC /etc/apt
2482+
2483+ echo "Installing deps in container ${container} (${deps[*]})"
2484+ output=$(lxc exec "${container}" -- apt-get update -q) || {
2485+ result=$?
2486+ echo "apt-get update failed in container ${container}"
2487+ echo "${output}"
2488+ return ${result}
2489+ }
2490+ output=$(lxc exec "${container}" --env DEBIAN_FRONTEND=noninteractive -- apt-get dist-upgrade -q -y) || {
2491+ result=$?
2492+ echo "apt-get dist-upgrade failed in container ${container}"
2493+ echo "${output}"
2494+ return ${result}
2495+ }
2496+ output=$(lxc exec "${container}" --env DEBIAN_FRONTEND=noninteractive -- apt-get install -q -y "${deps[@]}") || {
2497+ result=$?
2498+ echo "apt-get install ${deps[*]} failed in container ${container}"
2499+ echo "${output}"
2500+ return ${result}
2501+ }
2502+ echo "Done for container ${container}"
2503+ done
2504+}
2505+
2506+_setup_host_containers_certs() {
2507+ for container in "${PEERS[@]}"; do
2508+ echo "Copying ${CA_CERT_FILE} to container ${container}"
2509+ lxc file push "${CA_CERT_FILE}" "${container}/etc/swanctl/x509ca/"
2510+
2511+ echo "Copying ${container} cert and key"
2512+ lxc file push "${WORKDIR}/${container}Key.pem" "${container}/etc/swanctl/private/"
2513+ lxc file push "${WORKDIR}/${container}Cert.pem" "${container}/etc/swanctl/x509/"
2514+ done
2515+}
2516+
2517+_setup_host_containers_strongswan() {
2518+ local config
2519+
2520+ config=$(mktemp)
2521+
2522+ for peer in "${PEERS[@]}"; do
2523+ conn_name="${peer}-${REMOTE[${peer}]}"
2524+ cat > "${config}" <<EOF
2525+connections {
2526+ ${conn_name} {
2527+ remote_addrs = ${REMOTE[${peer}]}.lxd
2528+ local {
2529+ auth=pubkey
2530+ certs = ${peer}Cert.pem
2531+ }
2532+ remote {
2533+ auth = pubkey
2534+ id = "C=CH, O=strongswan, CN=${REMOTE[${peer}]}.strongswan.org"
2535+ }
2536+ children {
2537+ ${conn_name} {
2538+ start_action = trap
2539+ }
2540+ }
2541+ }
2542+}
2543+EOF
2544+ lxc file push "${config}" "${peer}/etc/swanctl/conf.d/${conn_name}.conf"
2545+ echo "Loading creds in container ${peer}"
2546+ lxc exec "${peer}" -- swanctl --load-creds
2547+ echo "Loading connections in container ${peer}"
2548+ lxc exec "${peer}" -- swanctl --load-conns
2549+ done
2550+}
2551+
2552+setup() {
2553+ local algo=${1:-ed25519}
2554+ echo "Creating a CA"
2555+ echo
2556+ echo "Generating private key for CA"
2557+ pki --gen --type "${algo}" --outform pem > "${CA_KEY_FILE}"
2558+
2559+ echo "Generating self-signed certificate for CA"
2560+ pki \
2561+ --self --ca --lifetime 10 --in "${CA_KEY_FILE}" \
2562+ --dn "C=CH, O=strongSwan, CN=strongSwan Root CA" \
2563+ --outform pem > "${CA_CERT_FILE}"
2564+ echo "Here is the CA cert:"
2565+ pki --print --in "${CA_CERT_FILE}"
2566+
2567+ for peer in "${PEERS[@]}"; do
2568+ echo "Generating key and certificate for peer ${peer}"
2569+ _setup_peer "${peer}" "${algo}"
2570+ done
2571+
2572+ echo "Setting up host LXD"
2573+ _setup_lxd
2574+
2575+ echo "Creating host containers"
2576+ _setup_host_containers
2577+
2578+ echo "Copy certificates to containers"
2579+ _setup_host_containers_certs
2580+
2581+ echo "Configuring strongswan in containers"
2582+ _setup_host_containers_strongswan
2583+}
2584+
2585+test_ping() {
2586+ for peer in "${PEERS[@]}"; do
2587+ echo "Generating traffic from ${peer} to ${REMOTE[${peer}]}"
2588+ # first ping to establish the tunnel always fails
2589+ lxc exec "${peer}" -- ping -c 2 -W 3 "${REMOTE[${peer}]}.lxd" > /dev/null 2>&1 || :
2590+ # this one must work
2591+ lxc exec "${peer}" -- ping -c 4 -W 3 "${REMOTE[${peer}]}.lxd"
2592+ echo
2593+ done
2594+}
2595+
2596+test_sa() {
2597+ for peer in "${PEERS[@]}"; do
2598+ sa=$(lxc exec "${peer}" -- swanctl --list-sas)
2599+ echo "This is the ${peer} SA:"
2600+ if [ -z "${sa}" ]; then
2601+ echo "FAILED: SA is empty (swanctl --list-sas)"
2602+ return 1
2603+ fi
2604+ echo "${sa}"
2605+ echo
2606+ check_sa "${peer}" "${sa}"
2607+ echo
2608+ done
2609+}
2610+
2611+test_pol() {
2612+ for peer in "${PEERS[@]}"; do
2613+ pol=$(lxc exec "${peer}" -- swanctl --list-pols)
2614+ echo "This is the ${peer} policy:"
2615+ if [ -z "${pol}" ]; then
2616+ echo "FAILED: pol is empty (swanctl --list-pols)"
2617+ return 1
2618+ fi
2619+ echo "${pol}"
2620+ echo
2621+ check_pol "${peer}" "${pol}"
2622+ echo
2623+ done
2624+}
2625+
2626+
2627+# the lxd deb package last existed in focal, so we install the snap
2628+snap list lxd > /dev/null 2>&1 || snap install lxd
2629+
2630+setup "${PUBKEY_ALGO}"
2631+
2632+test_ping
2633+test_sa
2634+test_pol
2635diff --git a/debian/tests/utils b/debian/tests/utils
2636new file mode 100644
2637index 0000000..e8a8584
2638--- /dev/null
2639+++ b/debian/tests/utils
2640@@ -0,0 +1,61 @@
2641+wait_container_ready() {
2642+ local container="${1}"
2643+ local -i limit=300 # seconds
2644+ local -i i=0
2645+ while /bin/true; do
2646+ ip=$(lxc list "${container}" -c 4 --format=compact | tail -1 | awk '{print $1}')
2647+ if [ -n "${ip}" ]; then
2648+ break
2649+ fi
2650+ i=$((i+1))
2651+ if [ ${i} -ge ${limit} ]; then
2652+ return 1
2653+ fi
2654+ sleep 1s
2655+ echo -n "."
2656+ done
2657+ while ! nc -z "${ip}" 22; do
2658+ echo -n "."
2659+ i=$((i+1))
2660+ if [ ${i} -ge ${limit} ]; then
2661+ return 1
2662+ fi
2663+ sleep 1s
2664+ done
2665+ # cloud-init might still be doing things...
2666+ # this call blocks, so wrap it in its own little timeout
2667+ # Give it ${limit} seconds too
2668+ output=$(lxc exec "${container}" -- timeout --verbose ${limit} cloud-init status --wait) || {
2669+ result=$?
2670+ echo "cloud-init status --wait failed on container ${container}"
2671+ echo "${output}"
2672+ return ${result}
2673+ }
2674+ echo
2675+}
2676+
2677+get_test_dependencies() {
2678+ local test_name="${1}"
2679+ shift
2680+ local exclusions="$*"
2681+ # Get test dependencies which we need to install in the containers
2682+ # we will create:
2683+ # -s: show Depends field
2684+ # -n: omit field name in output
2685+ # -X: do an exact match, instead of substring
2686+ # -F Tests: apply regexp to Tests field
2687+ depends=$(grep-dctrl -s Depends -n -F Tests -X "${test_name}" debian/tests/control | tr -d ,)
2688+ [ -n "${depends}" ] || {
2689+ echo "Failed to obtain list of dependencies for this test"
2690+ return 1
2691+ }
2692+ # remove exclusions, if any
2693+ for p in ${depends}; do
2694+ if echo "${exclusions}" | grep -qwF "${p}"; then
2695+ continue
2696+ else
2697+ echo "${p}"
2698+ fi
2699+ done
2700+}
2701+
2702diff --git a/debian/usr.sbin.swanctl b/debian/usr.sbin.swanctl
2703index 455c7cb..54c2b06 100644
2704--- a/debian/usr.sbin.swanctl
2705+++ b/debian/usr.sbin.swanctl
2706@@ -22,7 +22,7 @@
2707 /run/charon.vici rw,
2708
2709 # Allow reading own binary
2710- /usr/sbin/swanctl r,
2711+ /usr/sbin/swanctl rm,
2712
2713 # for af-alg plugin
2714 network alg seqpacket,

Subscribers

People subscribed via source and target branches