Merge ~ahasenack/ubuntu/+source/strongswan:noble-strongswan-merge-2 into ubuntu/+source/strongswan:debian/sid

Proposed by Andreas Hasenack
Status: Merged
Approved by: git-ubuntu bot
Approved revision: not available
Merge reported by: git-ubuntu bot
Merged at revision: 7ec4d6030e7a61cd5e1e93eeda8aa43a1a156dd3
Proposed branch: ~ahasenack/ubuntu/+source/strongswan:noble-strongswan-merge-2
Merge into: ubuntu/+source/strongswan:debian/sid
Diff against target: 2750 lines (+2431/-4)
10 files modified
debian/changelog (+1934/-0)
debian/control (+8/-3)
debian/libcharon-extra-plugins.install (+6/-0)
debian/libcharon-extra-plugins.maintscript (+8/-0)
debian/libstrongswan-extra-plugins.install (+3/-0)
debian/rules (+3/-0)
debian/tests/control (+6/-0)
debian/tests/host-to-host (+401/-0)
debian/tests/utils (+61/-0)
debian/usr.sbin.swanctl (+1/-1)
Reviewer Review Type Date Requested Status
git-ubuntu bot Approve
Bryce Harrington (community) Approve
Canonical Server Reporter Pending
Review via email: mp+459188@code.launchpad.net

Description of the change

Second merge of the cycle, no changes this time.

PPA: https://launchpad.net/~ahasenack/+archive/ubuntu/noble-strongswan-merge/+packages

DEP8: all green (amd64, arm64). armhf won't run because of isolation-machine, so it's green too.

I didn't select all architectures in the PPA, I don't think it's necessary (famous last words). The DEP8 queue is quite big in noble.

To post a comment you must log in.
Revision history for this message
Bryce Harrington (bryce) wrote :

LGTM, +1

I skimmed through the dep8 tests and spotted no issues. Verified changes are present in the diff, and match to the last merge. Tags match what they should. Verified tests are green:

  - strongswan/5.9.12-1ubuntu1~ppa1
    + ✅ strongswan on noble for amd64 @ 04.01.24 19:41:33 Log️ 🗒️
    + ✅ strongswan on noble for arm64 @ 03.01.24 09:42:53 Log️ 🗒️
  - strongswan/5.9.13-2ubuntu1~ppa1
    + ✅ strongswan on noble for amd64 @ 22.01.24 16:58:03 Log️ 🗒️
    + ✅ strongswan on noble for arm64 @ 22.01.24 17:10:35 Log️ 🗒️
    + ✅ strongswan on noble for armhf @ 22.01.24 16:34:22 Log️ 🗒️

review: Approve
Revision history for this message
git-ubuntu bot (git-ubuntu-bot) wrote :

Approvers: ahasenack, bryce
Uploaders: ahasenack, bryce
MP auto-approved

review: Approve
Revision history for this message
Andreas Hasenack (ahasenack) wrote :

Thanks, uploaded:

Uploading strongswan_5.9.13-2ubuntu1.dsc
Uploading strongswan_5.9.13.orig.tar.bz2
Uploading strongswan_5.9.13-2ubuntu1.debian.tar.xz
Uploading strongswan_5.9.13-2ubuntu1_source.buildinfo
Uploading strongswan_5.9.13-2ubuntu1_source.changes

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/debian/changelog b/debian/changelog
2index 973aa4f..1ca3472 100644
3--- a/debian/changelog
4+++ b/debian/changelog
5@@ -1,3 +1,32 @@
6+strongswan (5.9.13-2ubuntu1) noble; urgency=medium
7+
8+ * Merge with Debian unstable (LP: #2050099). Remaining changes:
9+ - d/control: strongswan-starter hard-depends on strongswan-charon,
10+ therefore bump the dependency from Recommends to Depends. At the same
11+ time avoid a circular dependency by dropping
12+ strongswan-charon->strongswan-starter from Depends to Recommends as the
13+ binaries can work without the services but not vice versa.
14+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
15+ + d/control: mention plugins in package description
16+ + d/rules: enable ntru at build time
17+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
18+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
19+ + d/control: update libcharon-extra-plugins description.
20+ + d/libcharon-extra-plugins.install: install .so and conf files.
21+ + d/rules: add plugins to the configuration arguments.
22+ - Remove conf files of plugins removed from libcharon-extra-plugins
23+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
24+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
25+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
26+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
27+ properly.
28+ - d/t/{control,host-to-host,utils}: new host-to-host test
29+ (LP #1999525)
30+ - d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl
31+ (LP #1999935)
32+
33+ -- Andreas Hasenack <andreas@canonical.com> Mon, 22 Jan 2024 11:48:33 -0300
34+
35 strongswan (5.9.13-2) unstable; urgency=medium
36
37 * d/control: drop build-dep on systemd (Closes: #1060509)
38@@ -10,6 +39,42 @@ strongswan (5.9.13-1) unstable; urgency=medium
39
40 -- Yves-Alexis Perez <corsac@debian.org> Thu, 11 Jan 2024 17:09:17 +0100
41
42+strongswan (5.9.12-1ubuntu1) noble; urgency=medium
43+
44+ * Merge with Debian unstable (LP: #2040430). Remaining changes:
45+ - d/control: strongswan-starter hard-depends on strongswan-charon,
46+ therefore bump the dependency from Recommends to Depends. At the same
47+ time avoid a circular dependency by dropping
48+ strongswan-charon->strongswan-starter from Depends to Recommends as the
49+ binaries can work without the services but not vice versa.
50+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
51+ + d/control: mention plugins in package description
52+ + d/rules: enable ntru at build time
53+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
54+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
55+ + d/control: update libcharon-extra-plugins description.
56+ + d/libcharon-extra-plugins.install: install .so and conf files.
57+ + d/rules: add plugins to the configuration arguments.
58+ - Remove conf files of plugins removed from libcharon-extra-plugins
59+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
60+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
61+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
62+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
63+ properly.
64+ - d/t/{control,host-to-host,utils}: new host-to-host test
65+ (LP #1999525)
66+ - d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl
67+ (LP #1999935)
68+ * Dropped:
69+ - SECURITY UPDATE: Buffer Overflow When Handling DH Public Values
70+ + debian/patches/CVE-2023-41913.patch: Validate DH public key to fix
71+ potential buffer overflow in
72+ src/charon-tkm/src/tkm/tkm_diffie_hellman.c.
73+ + CVE-2023-41913
74+ [Fixed upstream in 5.9.12]
75+
76+ -- Andreas Hasenack <andreas@canonical.com> Thu, 04 Jan 2024 10:25:23 -0300
77+
78 strongswan (5.9.12-1) unstable; urgency=medium
79
80 * New upstream version 5.9.12
81@@ -26,6 +91,52 @@ strongswan (5.9.11-2) unstable; urgency=medium
82
83 -- Yves-Alexis Perez <corsac@debian.org> Mon, 13 Nov 2023 20:22:47 +0100
84
85+strongswan (5.9.11-1ubuntu2) noble; urgency=medium
86+
87+ * SECURITY UPDATE: Buffer Overflow When Handling DH Public Values
88+ - debian/patches/CVE-2023-41913.patch: Validate DH public key to fix
89+ potential buffer overflow in
90+ src/charon-tkm/src/tkm/tkm_diffie_hellman.c.
91+ - CVE-2023-41913
92+
93+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 07 Nov 2023 11:43:00 +0200
94+
95+strongswan (5.9.11-1ubuntu1) mantic; urgency=medium
96+
97+ * Merge with Debian unstable (LP: #2018113). Remaining changes:
98+ - d/control: strongswan-starter hard-depends on strongswan-charon,
99+ therefore bump the dependency from Recommends to Depends. At the same
100+ time avoid a circular dependency by dropping
101+ strongswan-charon->strongswan-starter from Depends to Recommends as the
102+ binaries can work without the services but not vice versa.
103+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
104+ + d/control: mention plugins in package description
105+ + d/rules: enable ntru at build time
106+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
107+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
108+ + d/control: update libcharon-extra-plugins description.
109+ + d/libcharon-extra-plugins.install: install .so and conf files.
110+ + d/rules: add plugins to the configuration arguments.
111+ - Remove conf files of plugins removed from libcharon-extra-plugins
112+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
113+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
114+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
115+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
116+ properly.
117+ - d/t/{control,host-to-host,utils}: new host-to-host test
118+ (LP #1999525)
119+ - d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl
120+ (LP #1999935)
121+ * Dropped:
122+ - SECURITY UPDATE: Incorrectly Accepted Untrusted Public Key With
123+ Incorrect Refcount
124+ + debian/patches/CVE-2023-26463.patch: fix authentication bypass and
125+ expired pointer dereference in src/libtls/tls_server.c.
126+ + CVE-2023-26463
127+ [Fixed upstream in 5.9.10]
128+
129+ -- Andreas Hasenack <andreas@canonical.com> Fri, 23 Jun 2023 14:05:18 -0300
130+
131 strongswan (5.9.11-1) unstable; urgency=medium
132
133 * New upstream version 5.9.10
134@@ -45,6 +156,66 @@ strongswan (5.9.8-4) unstable; urgency=medium
135
136 -- Yves-Alexis Perez <corsac@debian.org> Sun, 26 Feb 2023 09:40:09 +0100
137
138+strongswan (5.9.8-3ubuntu4) lunar; urgency=medium
139+
140+ * d/t/utils: also give `cloud-init status --wait` the same amount of
141+ ${limit} seconds to complete, and bump limit to 5min. The logs show
142+ the container started up fine, with an IP.
143+
144+ -- Andreas Hasenack <andreas@canonical.com> Mon, 06 Mar 2023 11:00:58 -0300
145+
146+strongswan (5.9.8-3ubuntu3) lunar; urgency=medium
147+
148+ * SECURITY UPDATE: Incorrectly Accepted Untrusted Public Key With
149+ Incorrect Refcount
150+ - debian/patches/CVE-2023-26463.patch: fix authentication bypass and
151+ expired pointer dereference in src/libtls/tls_server.c.
152+ - CVE-2023-26463
153+
154+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 02 Mar 2023 12:58:47 -0500
155+
156+strongswan (5.9.8-3ubuntu2) lunar; urgency=medium
157+
158+ * d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl
159+ (LP: #1999935)
160+
161+ -- Andreas Hasenack <andreas@canonical.com> Fri, 16 Dec 2022 16:07:51 -0300
162+
163+strongswan (5.9.8-3ubuntu1) lunar; urgency=medium
164+
165+ * Merge with Debian unstable (LP: #1993449). Remaining changes:
166+ - d/control: strongswan-starter hard-depends on strongswan-charon,
167+ therefore bump the dependency from Recommends to Depends. At the same
168+ time avoid a circular dependency by dropping
169+ strongswan-charon->strongswan-starter from Depends to Recommends as the
170+ binaries can work without the services but not vice versa.
171+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
172+ + d/control: mention plugins in package description
173+ + d/rules: enable ntru at build time
174+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
175+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
176+ + d/control: update libcharon-extra-plugins description.
177+ + d/libcharon-extra-plugins.install: install .so and conf files.
178+ + d/rules: add plugins to the configuration arguments.
179+ - Remove conf files of plugins removed from libcharon-extra-plugins
180+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
181+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
182+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
183+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
184+ properly.
185+ * Dropped:
186+ - SECURITY UPDATE: Using Untrusted URIs for Revocation Checking
187+ + debian/patches/CVE-2022-40617.patch: do online revocation checks only
188+ after basic trust chain validation in
189+ src/libstrongswan/credentials/credential_manager.c.
190+ + CVE-2022-40617
191+ [Included upstream in 5.9.8]
192+ * Added:
193+ - d/t/{control,host-to-host,utils}: new host-to-host test
194+ (LP: #1999525)
195+
196+ -- Andreas Hasenack <andreas@canonical.com> Tue, 13 Dec 2022 11:04:24 -0300
197+
198 strongswan (5.9.8-3) unstable; urgency=medium
199
200 * d/tests: also drop _copyright test since the util is gone as well
201@@ -73,6 +244,46 @@ strongswan (5.9.8-1) unstable; urgency=medium
202
203 -- Yves-Alexis Perez <corsac@debian.org> Wed, 05 Oct 2022 15:25:18 +0200
204
205+strongswan (5.9.6-1ubuntu2) kinetic; urgency=medium
206+
207+ * SECURITY UPDATE: Using Untrusted URIs for Revocation Checking
208+ - debian/patches/CVE-2022-40617.patch: do online revocation checks only
209+ after basic trust chain validation in
210+ src/libstrongswan/credentials/credential_manager.c.
211+ - CVE-2022-40617
212+
213+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 05 Oct 2022 08:11:03 -0400
214+
215+strongswan (5.9.6-1ubuntu1) kinetic; urgency=medium
216+
217+ * Merge with Debian unstable (LP: #1971328). Remaining changes:
218+ - d/control: strongswan-starter hard-depends on strongswan-charon,
219+ therefore bump the dependency from Recommends to Depends. At the same
220+ time avoid a circular dependency by dropping
221+ strongswan-charon->strongswan-starter from Depends to Recommends as the
222+ binaries can work without the services but not vice versa.
223+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
224+ + d/control: mention plugins in package description
225+ + d/rules: enable ntru at build time
226+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
227+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
228+ + d/control: update libcharon-extra-plugins description.
229+ + d/libcharon-extra-plugins.install: install .so and conf files.
230+ + d/rules: add plugins to the configuration arguments.
231+ - Remove conf files of plugins removed from libcharon-extra-plugins
232+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
233+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
234+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
235+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
236+ properly.
237+ * Dropped:
238+ - d/p/lp1964977-fix-ipsec-pki-segfault.patch: Fix "ipsec pki"
239+ segmentation fault; don't access OpenSSL objects inside atexit()
240+ handlers. (LP #1964977)
241+ [included by upstream in version 5.9.6]
242+
243+ -- Lucas Kanashiro <kanashiro@ubuntu.com> Fri, 10 Jun 2022 15:03:17 -0300
244+
245 strongswan (5.9.6-1) unstable; urgency=medium
246
247 * New upstream version 5.9.6
248@@ -81,6 +292,42 @@ strongswan (5.9.6-1) unstable; urgency=medium
249
250 -- Yves-Alexis Perez <corsac@debian.org> Sat, 07 May 2022 20:19:18 +0200
251
252+strongswan (5.9.5-2ubuntu2) jammy; urgency=medium
253+
254+ * d/p/lp1964977-fix-ipsec-pki-segfault.patch: Fix "ipsec pki"
255+ segmentation fault; don't access OpenSSL objects inside atexit()
256+ handlers. (LP: #1964977)
257+
258+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Fri, 18 Mar 2022 14:24:34 -0400
259+
260+strongswan (5.9.5-2ubuntu1) jammy; urgency=medium
261+
262+ * Merge with Debian unstable. Remaining changes:
263+ - d/control: strongswan-starter hard-depends on strongswan-charon,
264+ therefore bump the dependency from Recommends to Depends. At the same
265+ time avoid a circular dependency by dropping
266+ strongswan-charon->strongswan-starter from Depends to Recommends as the
267+ binaries can work without the services but not vice versa.
268+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
269+ + d/control: mention plugins in package description
270+ + d/rules: enable ntru at build time
271+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
272+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887)
273+ + d/control: update libcharon-extra-plugins description.
274+ + d/libcharon-extra-plugins.install: install .so and conf files.
275+ + d/rules: add plugins to the configuration arguments.
276+ - Remove conf files of plugins removed from libcharon-extra-plugins
277+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
278+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
279+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
280+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
281+ properly.
282+ * Dropped patches included in new version:
283+ - debian/patches/CVE-2021-45079.patch
284+ - debian/patches/load-legacy-provider-in-openssl3.patch
285+
286+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 03 Feb 2022 10:49:49 -0500
287+
288 strongswan (5.9.5-2) unstable; urgency=medium
289
290 * actually fix lintian overrides
291@@ -96,6 +343,60 @@ strongswan (5.9.5-1) unstable; urgency=medium
292
293 -- Yves-Alexis Perez <corsac@debian.org> Wed, 26 Jan 2022 14:38:54 +0100
294
295+strongswan (5.9.4-1ubuntu4) jammy; urgency=medium
296+
297+ * SECURITY UPDATE: Incorrect Handling of Early EAP-Success Messages
298+ - debian/patches/CVE-2021-45079.patch: enforce failure if MSK
299+ generation fails in src/libcharon/plugins/eap_gtc/eap_gtc.c,
300+ src/libcharon/plugins/eap_md5/eap_md5.c,
301+ src/libcharon/plugins/eap_radius/eap_radius.c,
302+ src/libcharon/sa/eap/eap_method.h,
303+ src/libcharon/sa/ikev2/authenticators/eap_authenticator.c.
304+ - CVE-2021-45079
305+
306+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 01 Feb 2022 07:23:37 -0500
307+
308+strongswan (5.9.4-1ubuntu3) jammy; urgency=medium
309+
310+ * No-change rebuild against libssl3
311+
312+ -- Steve Langasek <steve.langasek@ubuntu.com> Thu, 09 Dec 2021 00:19:38 +0000
313+
314+strongswan (5.9.4-1ubuntu2) jammy; urgency=medium
315+
316+ * Add d/p/load-legacy-provider-in-openssl3.patch.
317+ Upstream cherry-pick to fix FTBFS against OpenSSL 3.0. (LP: #1946213)
318+
319+ -- Paride Legovini <paride@ubuntu.com> Wed, 17 Nov 2021 17:04:27 +0100
320+
321+strongswan (5.9.4-1ubuntu1) jammy; urgency=medium
322+
323+ * Merge with Debian unstable. Remaining changes:
324+ - d/control: strongswan-starter hard-depends on strongswan-charon,
325+ therefore bump the dependency from Recommends to Depends. At the same
326+ time avoid a circular dependency by dropping
327+ strongswan-charon->strongswan-starter from Depends to Recommends as the
328+ binaries can work without the services but not vice versa.
329+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
330+ + d/control: mention plugins in package description
331+ + d/rules: enable ntru at build time
332+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
333+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887)
334+ + d/control: update libcharon-extra-plugins description.
335+ + d/libcharon-extra-plugins.install: install .so and conf files.
336+ + d/rules: add plugins to the configuration arguments.
337+ - Remove conf files of plugins removed from libcharon-extra-plugins
338+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
339+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
340+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
341+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
342+ properly.
343+ * Dropped changes:
344+ - Compile the tpm plugin against the tpm2 software stack (tss2).
345+ Merged in Debian (5.9.4-1).
346+
347+ -- Paride Legovini <paride@ubuntu.com> Fri, 12 Nov 2021 12:34:30 +0100
348+
349 strongswan (5.9.4-1) unstable; urgency=medium
350
351 [ Paride Legovini ]
352@@ -112,6 +413,62 @@ strongswan (5.9.4-1) unstable; urgency=medium
353
354 -- Yves-Alexis Perez <corsac@debian.org> Tue, 19 Oct 2021 22:34:40 +0200
355
356+strongswan (5.9.1-1ubuntu3.1) impish-security; urgency=medium
357+
358+ * SECURITY UPDATE: Integer Overflow in gmp Plugin
359+ - debian/patches/CVE-2021-41990.patch: reject RSASSA-PSS params with
360+ negative salt length in
361+ src/libstrongswan/credentials/keys/signature_params.c,
362+ src/libstrongswan/plugins/gmp/gmp_rsa_public_key.c.
363+ - CVE-2021-41990
364+ * SECURITY UPDATE: Integer Overflow When Replacing Certificates in Cache
365+ - debian/patches/CVE-2021-41991.patch: prevent crash due to integer
366+ overflow/sign change in
367+ src/libstrongswan/credentials/sets/cert_cache.c.
368+ - CVE-2021-41991
369+
370+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 18 Oct 2021 13:10:30 -0400
371+
372+strongswan (5.9.1-1ubuntu3) impish; urgency=medium
373+
374+ * Compile the tpm plugin against the tpm2 software stack (tss2)
375+ (Debian packaging cherry-pick, LP: #1940079)
376+ - d/rules: add the --enable-tss-tss2 configure flag
377+ - d/control: add Build-Depends: libtss2-dev
378+
379+ -- Paride Legovini <paride@ubuntu.com> Thu, 16 Sep 2021 11:40:38 +0200
380+
381+strongswan (5.9.1-1ubuntu2) impish; urgency=medium
382+
383+ * No-change rebuild due to OpenLDAP soname bump.
384+
385+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Mon, 21 Jun 2021 18:09:22 -0400
386+
387+strongswan (5.9.1-1ubuntu1) hirsute; urgency=medium
388+
389+ * Merge with Debian unstable. Remaining changes:
390+ - d/control: strongswan-starter hard-depends on strongswan-charon,
391+ therefore bump the dependency from Recommends to Depends. At the same
392+ time avoid a circular dependency by dropping
393+ strongswan-charon->strongswan-starter from Depends to Recommends as the
394+ binaries can work without the services but not vice versa.
395+ - re-add post-quantum encryption algorithm (NTRU) (LP: 1863749)
396+ + d/control: mention plugins in package description
397+ + d/rules: enable ntru at build time
398+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
399+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887)
400+ + d/control: update libcharon-extra-plugins description.
401+ + d/libcharon-extra-plugins.install: install .so and conf files.
402+ + d/rules: add plugins to the configuration arguments.
403+ - Remove conf files of plugins removed from libcharon-extra-plugins
404+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
405+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
406+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
407+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
408+ properly.
409+
410+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 19 Jan 2021 12:39:11 +0100
411+
412 strongswan (5.9.1-1) unstable; urgency=medium
413
414 * New upstream version 5.9.1
415@@ -126,6 +483,45 @@ strongswan (5.9.0-1) unstable; urgency=medium
416
417 -- Yves-Alexis Perez <corsac@debian.org> Thu, 17 Sep 2020 10:21:30 +0200
418
419+strongswan (5.8.4-1ubuntu2) groovy; urgency=medium
420+
421+ * Re-enable eap-{dynamic,peap} libcharon plugins (LP: #1878887)
422+ - d/control: update libcharon-extra-plugins description.
423+ - d/libcharon-extra-plugins.install: install .so and conf files.
424+ - d/rules: add plugins to the configuration arguments.
425+ * Remove conf files of plugins removed from libcharon-extra-plugins
426+ - The conf file of the following plugins were removed: eap-aka-3gpp2,
427+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
428+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
429+ - Created d/libcharon-extra-plugins.maintscript to handle the removals
430+ properly.
431+
432+ -- Lucas Kanashiro <kanashiro@ubuntu.com> Thu, 21 May 2020 14:53:05 -0300
433+
434+strongswan (5.8.4-1ubuntu1) groovy; urgency=medium
435+
436+ * Merge with Debian unstable. Remaining changes:
437+ - d/control: strongswan-starter hard-depends on strongswan-charon,
438+ therefore bump the dependency from Recommends to Depends. At the same
439+ time avoid a circular dependency by dropping
440+ strongswan-charon->strongswan-starter from Depends to Recommends as the
441+ binaries can work without the services but not vice versa.
442+ - re-add post-quantum encryption algorithm (NTRU) (LP: 1863749)
443+ + d/control: mention plugins in package description
444+ + d/rules: enable ntru at build time
445+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
446+ * Dropped:
447+ - d/control: build-depend on libiptc-dev to avoid FTBFS (LP: #1861975)
448+ This is needed due to changes in regard to Debian bug 947176 and 939243
449+ and can later be dropped again.
450+ [applied by Debian in version 5.8.2-2]
451+ - d/control: Transition from former Ubuntu only libcharon-standard-plugins
452+ to common libcharon-extauth-plugins (drop after 20.04)
453+ - d/control: Transition from strongswan-tnc-* being in extra packages
454+ to libcharon-extra-plugins (drop after 20.04)
455+
456+ -- Lucas Kanashiro <lucas.kanashiro@canonical.com> Thu, 30 Apr 2020 18:06:55 -0300
457+
458 strongswan (5.8.4-1) unstable; urgency=medium
459
460 * New upstream version 5.8.4 (Closes: #956446)
461@@ -141,6 +537,43 @@ strongswan (5.8.2-2) unstable; urgency=medium
462
463 -- Yves-Alexis Perez <corsac@debian.org> Thu, 13 Feb 2020 22:46:40 +0100
464
465+strongswan (5.8.2-1ubuntu3) focal; urgency=medium
466+
467+ * Reverting part of 5.8.2-1ubuntu2 changes to remove BLISS again as
468+ there is a potential local side-channel attack on strongSwan's BLISS
469+ implementation (https://eprint.iacr.org/2017/505). (LP: #1866765)
470+
471+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 10 Mar 2020 07:56:56 +0100
472+
473+strongswan (5.8.2-1ubuntu2) focal; urgency=medium
474+
475+ * re-add post-quantum computer signature scheme (BLISS) and encryption
476+ algorithm (NTRU) as well as the dependent nttfft library (LP: #1863749)
477+ - d/control: mention plugins in package description
478+ - d/rules: enable ntru and bliss at build time
479+ - d/libstrongswan-extra-plugins.install: ship config and shared objects
480+
481+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 04 Mar 2020 07:54:26 +0100
482+
483+strongswan (5.8.2-1ubuntu1) focal; urgency=medium
484+
485+ * Merge with Debian unstable (LP: #1861971). Remaining changes:
486+ - d/control: Transition from strongswan-tnc-* being in extra packages
487+ to libcharon-extra-plugins (drop after 20.04)
488+ - d/control: Transition from former Ubuntu only libcharon-standard-plugins
489+ to common libcharon-extauth-plugins (drop after 20.04)
490+ - d/control: strongswan-starter hard-depends on strongswan-charon,
491+ therefore bump the dependency from Recommends to Depends. At the same
492+ time avoid a circular dependency by dropping
493+ strongswan-charon->strongswan-starter from Depends to Recommends as the
494+ binaries can work without the services but not vice versa.
495+ * Added Changes
496+ - d/control: build-depend on libiptc-dev to avoid FTBFS (LP: #1861975)
497+ This is needed due to changes in regard to Debian bug 947176 and 939243
498+ and can later be dropped again.
499+
500+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 05 Feb 2020 08:28:30 +0100
501+
502 strongswan (5.8.2-1) unstable; urgency=medium
503
504 [ Jean-Michel Vourgère ]
505@@ -157,6 +590,83 @@ strongswan (5.8.2-1) unstable; urgency=medium
506
507 -- Yves-Alexis Perez <corsac@debian.org> Wed, 01 Jan 2020 14:35:46 +0100
508
509+strongswan (5.8.1-1ubuntu1) focal; urgency=medium
510+
511+ * Merge with Debian unstable (LP: #1852579). Remaining changes:
512+ - d/control: Transition from strongswan-tnc-* being in extra packages
513+ to libcharon-extra-plugins
514+ * Added Changes:
515+ - d/control: Transition from former Ubuntu only libcharon-standard-plugins
516+ to common libcharon-extauth-plugins (drop after 20.04)
517+ - d/control: strongswan-starter hard-depends on strongswan-charon,
518+ therefore bump the dependency from Recommends to Depends. At the same
519+ time avoid a circular dependency by dropping
520+ strongswan-charon->strongswan-starter from Depends to Recommends as the
521+ binaries can work without the services but not vice versa.
522+ * Dropped Changes (now in Debian):
523+ - Clean up d/strongswan-starter.postinst: section about runlevel changes
524+ - Clean up d/strongswan-starter.postinst: Removed entire section on
525+ opportunistic encryption disabling - this was never in strongSwan and
526+ won't be see upstream issue #2160.
527+ - d/rules: Removed patching ipsec.conf on build (not using the
528+ debconf-managed config.)
529+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
530+ used for debconf-managed include of private key).
531+ - Add plugin kernel-libipsec to allow the use of strongswan in containers
532+ via this userspace implementation (please do note that this is still
533+ considered experimental by upstream).
534+ + d/libcharon-extra-plugins.install: Add kernel-libipsec components
535+ + d/control: List kernel-libipsec plugin at extra plugins description
536+ + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
537+ upstream recommends to not load kernel-libipsec by default.
538+ - d/control: Mention mgf1 plugin which is in libstrongswan now
539+ - Complete the disabling of libfast; This was partially accepted in Debian,
540+ it is no more packaging medcli and medsrv, but still builds and
541+ mentions it.
542+ + d/rules: Add --disable-fast to avoid build time and dependencies
543+ + d/control: Remove medcli, medsrv from package description
544+ - Add now built (since 5.5.1) libraries libtpmtss and nttfft to
545+ libstrongswan-extra-plugins (no deps from default plugins).
546+ - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
547+ plugins for the most common use cases from extra-plugins into a new
548+ standard-plugins package. This will allow those use cases without pulling
549+ in too much more plugins (a bit like the tnc package). Recommend that
550+ package from strongswan-libcharon.
551+ - d/usr.lib.ipsec.charon: allow reading of own FDs (LP 1786250)
552+ - d/usr.sbin.charon-systemd: allow CLUSTERIP for ha plugin (LP 1773956)
553+ - executables need to be able to read map and execute themselves otherwise
554+ execution in some environments e.g. containers is blocked (LP 1780534)
555+ + d/usr.lib.ipsec.stroke: add rmix permission to stroke binary
556+ + d/usr.lib.ipsec.lookip: add rmix permission to lookip binary
557+ - d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: resync apparmor
558+ profiles of both ways to start charon (LP 1807664)
559+ - d/usr.sbin.swanctl: add apparmor rule for af-alg plugin (LP 1807962)
560+ - We fixed up tpmtss and nttfft in the past, but tpmtss is now packaged in
561+ Debian so this part was be dropped. Two changes remain
562+ - d/control: fix the mentioning of tpmtss in d/control
563+ - apparmor fixes for container and root usage (LP 1826238)
564+ + d/usr.sbin.swanctl: allow reading own binary
565+ + d/usr.sbin.charon-systemd: allow accessing the binary
566+ + d/usr.sbin.swanctl: add attach_disconnected to work inside containers
567+ + d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: add CAP_SETPCAP
568+ to apparmor to allow dropping caps
569+ * Dropped Changes (too uncommon to support by default)
570+ - d/libstrongswan.install: Add kernel-netlink configuration files
571+ - d/usr.sbin.charon-systemd: allow to contact mysql for sql and
572+ attr-sql plugins (LP 1766240) - no more needed as itisn't enabled.
573+ - Mass enablement of extra plugins and features to allow a user to use
574+ strongswan for a variety of extra use cases without having to rebuild.
575+ + d/control: Add required additional build-deps
576+ + d/control: Mention addtionally enabled plugins
577+ + d/rules: Enable features at configure stage
578+ + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
579+ + d/libstrongswan.install: Add plugins (so, conf)
580+ + d/strongswan-starter.install: Install pool feature, which is useful
581+ since we now have attr-sql plugin enabled it.
582+ - Enable additional TNC plugins and add them to libcharon-extra-plugins
583+
584+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 14 Nov 2019 15:00:15 +0100
585+
586 strongswan (5.8.1-1) unstable; urgency=medium
587
588 * d/rules: disable http and stream tests under CI
589@@ -226,6 +736,99 @@ strongswan (5.8.0-1) unstable; urgency=medium
590
591 -- Yves-Alexis Perez <corsac@debian.org> Mon, 26 Aug 2019 12:58:23 +0200
592
593+strongswan (5.7.2-1ubuntu3) eoan; urgency=medium
594+
595+ * No change rebuild for libmysqlclient21.
596+
597+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 15 Aug 2019 09:34:34 +0200
598+
599+strongswan (5.7.2-1ubuntu2) eoan; urgency=medium
600+
601+ * Rebuild against new libjson-c4.
602+
603+ -- Gianfranco Costamagna <locutusofborg@debian.org> Mon, 01 Jul 2019 10:53:07 +0200
604+
605+strongswan (5.7.2-1ubuntu1) eoan; urgency=medium
606+
607+ [ Christian Ehrhardt ]
608+ * Merge with Debian unstable. Remaining changes:
609+ - Clean up d/strongswan-starter.postinst: section about runlevel changes
610+ - Clean up d/strongswan-starter.postinst: Removed entire section on
611+ opportunistic encryption disabling - this was never in strongSwan and
612+ won't be see upstream issue #2160.
613+ - d/rules: Removed patching ipsec.conf on build (not using the
614+ debconf-managed config.)
615+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
616+ used for debconf-managed include of private key).
617+ - Mass enablement of extra plugins and features to allow a user to use
618+ strongswan for a variety of extra use cases without having to rebuild.
619+ + d/control: Add required additional build-deps
620+ + d/control: Mention addtionally enabled plugins
621+ + d/rules: Enable features at configure stage
622+ + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
623+ + d/libstrongswan.install: Add plugins (so, conf)
624+ + d/strongswan-starter.install: Install pool feature, which is useful
625+ since we now have attr-sql plugin enabled it.
626+ - Add plugin kernel-libipsec to allow the use of strongswan in containers
627+ via this userspace implementation (please do note that this is still
628+ considered experimental by upstream).
629+ + d/libcharon-extra-plugins.install: Add kernel-libipsec components
630+ + d/control: List kernel-libipsec plugin at extra plugins description
631+ + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
632+ upstream recommends to not load kernel-libipsec by default.
633+ - d/libstrongswan.install: Add kernel-netlink configuration files
634+ - Complete the disabling of libfast; This was partially accepted in Debian,
635+ it is no more packaging medcli and medsrv, but still builds and
636+ mentions it.
637+ + d/rules: Add --disable-fast to avoid build time and dependencies
638+ + d/control: Remove medcli, medsrv from package description
639+ - d/control: Mention mgf1 plugin which is in libstrongswan now
640+ - Add now built (since 5.5.1) libraries libtpmtss and nttfft to
641+ libstrongswan-extra-plugins (no deps from default plugins).
642+ - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
643+ plugins for the most common use cases from extra-plugins into a new
644+ standard-plugins package. This will allow those use cases without pulling
645+ in too much more plugins (a bit like the tnc package). Recommend that
646+ package from strongswan-libcharon.
647+ - d/usr.sbin.charon-systemd: allow to contact mysql for sql and
648+ attr-sql plugins (LP #1766240)
649+ - d/usr.lib.ipsec.charon: allow reading of own FDs (LP #1786250)
650+ - d/usr.sbin.charon-systemd: allow CLUSTERIP for ha plugin (LP: 1773956)
651+ - executables need to be able to read map and execute themselves otherwise
652+ execution in some environments e.g. containers is blocked (LP: 1780534)
653+ + d/usr.lib.ipsec.stroke: add rmix permission to stroke binary
654+ + d/usr.lib.ipsec.lookip: add rmix permission to lookip binary
655+ - d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: resync apparmor
656+ profiles of both ways to start charon (LP: 1807664)
657+ - d/usr.sbin.swanctl: add apparmor rule for af-alg plugin (LP: 1807962)
658+ * Dropped changes
659+ - d/p/lp1795813-mysql-Don-t-release-the-connection-if-transactions-a.patch:
660+ fix SIGSEGV when using mysql plugin (LP: 1795813)
661+ [upstream in 5.7.2]
662+ - d/libstrongswan.install: Reorder conf and .so alphabetically
663+ [was a non functional change, dropped to avoid merge noise]
664+ - Relocate tnc plugin
665+ [TNC is back at libcharon-extra-plugins as it is in Debian]
666+ * Added changes:
667+ - We fixed up tpmtss and nttfft in the past, but tpmtss is now packaged in
668+ Debian so this part was be dropped. Two changes remain
669+ - d/control: fix the mentioning of tpmtss in d/control
670+ - add nttfft (can be merged with the mass enablement change later)
671+ - Transitional packages to go back from strongswan-tnc-* being in extra
672+ packages to be part of libcharon-extra-plugins.
673+ [can be dropped after 20.04]
674+
675+ [ Simon Deziel ]
676+ * Added changes:
677+ - apparmor fixes for container and root usage (LP: #1826238)
678+ + d/usr.sbin.swanctl: allow reading own binary
679+ + d/usr.sbin.charon-systemd: allow accessing the binary
680+ + d/usr.sbin.swanctl: add attach_disconnected to work inside containers
681+ + d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: add CAP_SETPCAP
682+ to apparmor to allow dropping caps
683+
684+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Fri, 26 Apr 2019 11:31:17 +0200
685+
686 strongswan (5.7.2-1) unstable; urgency=medium
687
688 * d/control: remove Rene from Uploaders, thanks!
689@@ -244,6 +847,86 @@ strongswan (5.7.2-1) unstable; urgency=medium
690
691 -- Yves-Alexis Perez <corsac@debian.org> Wed, 02 Jan 2019 13:02:11 +0100
692
693+strongswan (5.7.1-1ubuntu2) disco; urgency=medium
694+
695+ * d/usr.sbin.charon-systemd: fix rule for CLUSTERIP to match effective
696+ path (LP: #1773956)
697+ * d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: resync apparmor
698+ profiles of both ways to start charon (LP: #1807664)
699+ * d/usr.sbin.swanctl: add apparmor rule for af-alg plugin (LP: #1807962)
700+
701+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 10 Dec 2018 08:30:01 +0100
702+
703+strongswan (5.7.1-1ubuntu1) disco; urgency=medium
704+
705+ * Merge with Debian unstable (LP: #1806401). Remaining changes:
706+ - Clean up d/strongswan-starter.postinst: section about runlevel changes
707+ - Clean up d/strongswan-starter.postinst: Removed entire section on
708+ opportunistic encryption disabling - this was never in strongSwan and
709+ won't be see upstream issue #2160.
710+ - d/rules: Removed patching ipsec.conf on build (not using the
711+ debconf-managed config.)
712+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
713+ used for debconf-managed include of private key).
714+ - Mass enablement of extra plugins and features to allow a user to use
715+ strongswan for a variety of extra use cases without having to rebuild.
716+ + d/control: Add required additional build-deps
717+ + d/control: Mention addtionally enabled plugins
718+ + d/rules: Enable features at configure stage
719+ + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
720+ + d/libstrongswan.install: Add plugins (so, conf)
721+ - d/strongswan-starter.install: Install pool feature, which is useful since
722+ we have attr-sql plugin enabled as well using it.
723+ - Add plugin kernel-libipsec to allow the use of strongswan in containers
724+ via this userspace implementation (please do note that this is still
725+ considered experimental by upstream).
726+ + d/libcharon-extra-plugins.install: Add kernel-libipsec components
727+ + d/control: List kernel-libipsec plugin at extra plugins description
728+ + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
729+ upstream recommends to not load kernel-libipsec by default.
730+ - Relocate tnc plugin
731+ + debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
732+ + Add new subpackage for TNC in d/strongswan-tnc-* and d/control
733+ - d/libstrongswan.install: Reorder conf and .so alphabetically
734+ - d/libstrongswan.install: Add kernel-netlink configuration files
735+ - Complete the disabling of libfast; This was partially accepted in Debian,
736+ it is no more packaging medcli and medsrv, but still builds and
737+ mentions it.
738+ + d/rules: Add --disable-fast to avoid build time and dependencies
739+ + d/control: Remove medcli, medsrv from package description
740+ - d/control: Mention mgf1 plugin which is in libstrongswan now
741+ - Add now built (since 5.5.1) libraries libtpmtss and nttfft to
742+ libstrongswan-extra-plugins (no deps from default plugins).
743+ - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
744+ plugins for the most common use cases from extra-plugins into a new
745+ standard-plugins package. This will allow those use cases without pulling
746+ in too much more plugins (a bit like the tnc package). Recommend that
747+ package from strongswan-libcharon.
748+ - d/usr.sbin.charon-systemd: allow to contact mysql for sql and
749+ attr-sql plugins (LP #1766240)
750+ - d/usr.lib.ipsec.charon: allow reading of own FDs (LP #1786250)
751+ * Added Changes:
752+ - d/p/lp1795813-mysql-Don-t-release-the-connection-if-transactions-a.patch:
753+ fix SIGSEGV when using mysql plugin (LP: #1795813)
754+ - d/usr.sbin.charon-systemd: allow CLUSTERIP for ha plugin (LP: #1773956)
755+ - executables need to be able to read map and execute themselves otherwise
756+ execution in some environments e.g. containers is blocked (LP: #1780534)
757+ + d/usr.lib.ipsec.stroke: add rmix permission to stroke binary
758+ + d/usr.lib.ipsec.lookip: add rmix permission to lookip binary
759+ - adapt "mass enablement of extra plugins" to match 5.7.x changes
760+ + d/rules: use new options for swima instead of swid
761+ + d/strongswan-tnc-server.install: add new sec updater tool
762+ + d/strongswan-tnc-client.install: add new sw-collector tool
763+ * Dropped (in Debian now):
764+ - SECURITY UPDATE: Insufficient input validation in gmp plugin
765+ (CVE-2018-17540)
766+ - SECURITY UPDATE: Insufficient input validation in gmp plugin
767+ (CVE-2018-16151 CVE-2018-16152)
768+ - d/usr.lib.ipsec.charon, d/usr/sbin/charon-systemd: Add support for
769+ usr-merge, thanks to Christian Ehrhardt. LP #1784023
770+
771+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 03 Dec 2018 15:18:31 +0100
772+
773 strongswan (5.7.1-1) unstable; urgency=medium
774
775 [ Ondřej Nový ]
776@@ -274,6 +957,96 @@ strongswan (5.7.0-1) unstable; urgency=medium
777
778 -- Yves-Alexis Perez <corsac@debian.org> Mon, 24 Sep 2018 16:36:28 +0200
779
780+strongswan (5.6.3-1ubuntu5) disco; urgency=medium
781+
782+ * No-change rebuild against libunbound8
783+
784+ -- Steve Langasek <steve.langasek@ubuntu.com> Sun, 11 Nov 2018 09:01:53 +0000
785+
786+strongswan (5.6.3-1ubuntu4) cosmic; urgency=medium
787+
788+ * d/usr.lib.ipsec.charon: allow reading of own FDs (LP: #1786250)
789+ Thanks to Matt Callaghan.
790+
791+ -- Andreas Hasenack <andreas@canonical.com> Thu, 04 Oct 2018 10:34:01 -0300
792+
793+strongswan (5.6.3-1ubuntu3) cosmic; urgency=medium
794+
795+ * SECURITY UPDATE: Insufficient input validation in gmp plugin
796+ - debian/patches/strongswan-4.4.0-5.7.0_gmp-pkcs1-overflow.patch: fix
797+ buffer overflow with very small RSA keys in
798+ src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c.
799+ - CVE-2018-17540
800+
801+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 01 Oct 2018 13:23:59 -0400
802+
803+strongswan (5.6.3-1ubuntu2) cosmic; urgency=medium
804+
805+ * SECURITY UPDATE: Insufficient input validation in gmp plugin
806+ - debian/patches/strongswan-5.6.1-5.6.3_gmp-pkcs1-verify.patch: don't
807+ parse PKCS1 v1.5 RSA signatures to verify them in
808+ src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c,
809+ src/libstrongswan/plugins/gmp/gmp_rsa_public_key.c.
810+ - CVE-2018-16151
811+ - CVE-2018-16152
812+
813+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 25 Sep 2018 10:16:15 -0400
814+
815+strongswan (5.6.3-1ubuntu1) cosmic; urgency=medium
816+
817+ * Merge with Debian unstable. Remaining changes:
818+ - Clean up d/strongswan-starter.postinst: section about runlevel changes
819+ - Clean up d/strongswan-starter.postinst: Removed entire section on
820+ opportunistic encryption disabling - this was never in strongSwan and
821+ won't be see upstream issue #2160.
822+ - d/rules: Removed patching ipsec.conf on build (not using the
823+ debconf-managed config.)
824+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
825+ used for debconf-managed include of private key).
826+ - Mass enablement of extra plugins and features to allow a user to use
827+ strongswan for a variety of extra use cases without having to rebuild.
828+ + d/control: Add required additional build-deps
829+ + d/control: Mention addtionally enabled plugins
830+ + d/rules: Enable features at configure stage
831+ + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
832+ + d/libstrongswan.install: Add plugins (so, conf)
833+ - d/strongswan-starter.install: Install pool feature, which is useful since
834+ we have attr-sql plugin enabled as well using it.
835+ - Add plugin kernel-libipsec to allow the use of strongswan in containers
836+ via this userspace implementation (please do note that this is still
837+ considered experimental by upstream).
838+ + d/libcharon-extra-plugins.install: Add kernel-libipsec components
839+ + d/control: List kernel-libipsec plugin at extra plugins description
840+ + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
841+ upstream recommends to not load kernel-libipsec by default.
842+ - Relocate tnc plugin
843+ + debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
844+ + Add new subpackage for TNC in d/strongswan-tnc-* and d/control
845+ - d/libstrongswan.install: Reorder conf and .so alphabetically
846+ - d/libstrongswan.install: Add kernel-netlink configuration files
847+ - Complete the disabling of libfast; This was partially accepted in Debian,
848+ it is no more packaging medcli and medsrv, but still builds and
849+ mentions it.
850+ + d/rules: Add --disable-fast to avoid build time and dependencies
851+ + d/control: Remove medcli, medsrv from package description
852+ - d/control: Mention mgf1 plugin which is in libstrongswan now
853+ - Add now built (since 5.5.1) libraries libtpmtss and nttfft to
854+ libstrongswan-extra-plugins (no deps from default plugins).
855+ - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
856+ plugins for the most common use cases from extra-plugins into a new
857+ standard-plugins package. This will allow those use cases without pulling
858+ in too much more plugins (a bit like the tnc package). Recommend that
859+ package from strongswan-libcharon.
860+ - d/usr.sbin.charon-systemd: allow to contact mysql for sql and
861+ attr-sql plugins (LP #1766240)
862+ - d/usr.lib.ipsec.charon, d/usr/sbin/charon-systemd: Add support for
863+ usr-merge, thanks to Christian Ehrhardt. LP #1784023
864+ * Dropped:
865+ - d/usr.sbin.charon-systemd: allow systemd notifications (LP: #1765652)
866+ [Fixed in 5.6.3-1]
867+
868+ -- Andreas Hasenack <andreas@canonical.com> Thu, 23 Aug 2018 13:05:11 -0300
869+
870 strongswan (5.6.3-1) unstable; urgency=medium
871
872 * New upstream version 5.6.2
873@@ -289,6 +1062,78 @@ strongswan (5.6.3-1) unstable; urgency=medium
874
875 -- Yves-Alexis Perez <corsac@debian.org> Mon, 04 Jun 2018 10:23:22 +0200
876
877+strongswan (5.6.2-2ubuntu2) cosmic; urgency=medium
878+
879+ * Add support for usr-merge, thanks to Christian Ehrhardt. LP: #1784023
880+
881+ -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 21 Aug 2018 00:42:38 +0100
882+
883+strongswan (5.6.2-2ubuntu1) cosmic; urgency=medium
884+
885+ * Merge with Debian unstable, closes LP: #1773814 and LP: #1772705.
886+ Remaining changes:
887+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
888+ + Clean up d/strongswan-starter.postinst: Removed entire section on
889+ opportunistic encryption disabling - this was never in strongSwan and
890+ won't be see upstream issue #2160.
891+ + d/rules: Removed patching ipsec.conf on build (not using the
892+ debconf-managed config.)
893+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
894+ used for debconf-managed include of private key).
895+ + Mass enablement of extra plugins and features to allow a user to use
896+ strongswan for a variety of extra use cases without having to rebuild.
897+ - d/control: Add required additional build-deps
898+ - d/control: Mention addtionally enabled plugins
899+ - d/rules: Enable features at configure stage
900+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
901+ - d/libstrongswan.install: Add plugins (so, conf)
902+ + d/strongswan-starter.install: Install pool feature, which is useful since
903+ we have attr-sql plugin enabled as well using it.
904+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
905+ via this userspace implementation (please do note that this is still
906+ considered experimental by upstream).
907+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
908+ - d/control: List kernel-libipsec plugin at extra plugins description
909+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
910+ upstream recommends to not load kernel-libipsec by default.
911+ + Relocate tnc plugin
912+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
913+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
914+ + d/libstrongswan.install: Reorder conf and .so alphabetically
915+ + d/libstrongswan.install: Add kernel-netlink configuration files
916+ + Complete the disabling of libfast; This was partially accepted in Debian,
917+ it is no more packaging medcli and medsrv, but still builds and
918+ mentions it.
919+ - d/rules: Add --disable-fast to avoid build time and dependencies
920+ - d/control: Remove medcli, medsrv from package description
921+ + d/control: Mention mgf1 plugin which is in libstrongswan now
922+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
923+ libstrongswan-extra-plugins (no deps from default plugins).
924+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
925+ plugins for the most common use cases from extra-plugins into a new
926+ standard-plugins package. This will allow those use cases without pulling
927+ in too much more plugins (a bit like the tnc package). Recommend that
928+ package from strongswan-libcharon.
929+ * Dropped Changes (no more needed after 18.04)
930+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
931+ missed that, droppable after 18.04)
932+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
933+ libstrongswan as we dropped relocating ccm and test-vectors.
934+ (droppable >18.04).
935+ + d/control: add breaks/replace from libstrongswan to
936+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
937+ (droppable >18.04).
938+ + d/control: bump breaks/replaces for the move of the updown plugin
939+ (Missed Changelog entry on last merge)
940+ + d/control: fix dependencies of strongswan-libcharon due to the move
941+ the updown plugin (droppable >18.04).
942+ * Added Changes:
943+ + d/usr.sbin.charon-systemd: allow to contact mysql for sql and
944+ attr-sql plugins (LP: #1766240)
945+ + d/usr.sbin.charon-systemd: allow systemd notifications (LP: #1765652)
946+
947+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 29 May 2018 08:21:42 +0200
948+
949 strongswan (5.6.2-2) unstable; urgency=medium
950
951 * charon-nm: Fix building list of DNS/MDNS servers with libnm
952@@ -299,6 +1144,74 @@ strongswan (5.6.2-2) unstable; urgency=medium
953
954 -- Yves-Alexis Perez <corsac@debian.org> Fri, 13 Apr 2018 13:46:04 +0200
955
956+strongswan (5.6.2-1ubuntu2) bionic; urgency=medium
957+
958+ * d/control: fix dependencies of strongswan-libcharon due to the move
959+ the updown plugin.
960+
961+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 20 Mar 2018 07:37:29 +0100
962+
963+strongswan (5.6.2-1ubuntu1) bionic; urgency=medium
964+
965+ * Merge with Debian unstable (LP: #1753018). Remaining changes:
966+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
967+ + Clean up d/strongswan-starter.postinst: Removed entire section on
968+ opportunistic encryption disabling - this was never in strongSwan and
969+ won't be see upstream issue #2160.
970+ + Ubuntu is not using the debconf triggered private key generation
971+ - d/rules: Removed patching ipsec.conf on build (not using the
972+ debconf-managed config.)
973+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
974+ used for debconf-managed include of private key).
975+ + Mass enablement of extra plugins and features to allow a user to use
976+ strongswan for a variety of extra use cases without having to rebuild.
977+ - d/control: Add required additional build-deps
978+ - d/control: Mention addtionally enabled plugins
979+ - d/rules: Enable features at configure stage
980+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
981+ - d/libstrongswan.install: Add plugins (so, conf)
982+ + d/strongswan-starter.install: Install pool feature, which is useful since
983+ we have attr-sql plugin enabled as well using it.
984+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
985+ via this userspace implementation (please do note that this is still
986+ considered experimental by upstream).
987+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
988+ - d/control: List kernel-libipsec plugin at extra plugins description
989+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
990+ upstream recommends to not load kernel-libipsec by default.
991+ + Relocate tnc plugin
992+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
993+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
994+ + d/libstrongswan.install: Reorder conf and .so alphabetically
995+ + d/libstrongswan.install: Add kernel-netlink configuration files
996+ + Complete the disabling of libfast; This was partially accepted in Debian,
997+ it is no more packaging medcli and medsrv, but still builds and
998+ mentions it.
999+ - d/rules: Add --disable-fast to avoid build time and dependencies
1000+ - d/control: Remove medcli, medsrv from package description
1001+ + d/control: Mention mgf1 plugin which is in libstrongswan now
1002+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
1003+ libstrongswan-extra-plugins (no deps from default plugins).
1004+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1005+ missed that, droppable after 18.04)
1006+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1007+ plugins for the most common use cases from extra-plugins into a new
1008+ standard-plugins package. This will allow those use cases without pulling
1009+ in too much more plugins (a bit like the tnc package). Recommend that
1010+ package from strongswan-libcharon.
1011+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
1012+ libstrongswan as we dropped relocating ccm and test-vectors.
1013+ (droppable >18.04).
1014+ + d/control: add breaks/replace from libstrongswan to
1015+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
1016+ (droppable >18.04).
1017+ * Added Changes:
1018+ + d/control: bump breaks/replaces from strongswan-libcharon to strongswan-
1019+ starter as we followed Debian to move the updown plugin but need to
1020+ match Ubuntu versions (Droppable >18.04).
1021+
1022+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Fri, 16 Mar 2018 11:08:47 +0100
1023+
1024 strongswan (5.6.2-1) unstable; urgency=medium
1025
1026 * d/NEWS: add information about disabled algorithms (closes: #883072)
1027@@ -321,6 +1234,129 @@ strongswan (5.6.1-3) unstable; urgency=medium
1028
1029 -- Yves-Alexis Perez <corsac@debian.org> Sun, 17 Dec 2017 16:40:39 +0100
1030
1031+strongswan (5.6.1-2ubuntu4) bionic; urgency=medium
1032+
1033+ * SECURITY UPDATE: DoS via crafted RSASSA-PSS signature
1034+ - debian/patches/CVE-2018-6459.patch: Properly handle MGF1 algorithm
1035+ identifier without parameters in
1036+ src/libstrongswan/credentials/keys/signature_params.c.
1037+ - CVE-2018-6459
1038+
1039+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 07 Mar 2018 14:52:02 +0100
1040+
1041+strongswan (5.6.1-2ubuntu3) bionic; urgency=medium
1042+
1043+ * No-change rebuild against libcurl4
1044+
1045+ -- Steve Langasek <steve.langasek@ubuntu.com> Wed, 28 Feb 2018 08:52:09 +0000
1046+
1047+strongswan (5.6.1-2ubuntu2) bionic; urgency=high
1048+
1049+ * No change rebuild against openssl1.1.
1050+
1051+ -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 12 Feb 2018 16:00:24 +0000
1052+
1053+strongswan (5.6.1-2ubuntu1) bionic; urgency=medium
1054+
1055+ * Merge with Debian unstable (LP: #1717343).
1056+ Also fixes and issue with multiple psk's (LP: #1734207). Remaining changes:
1057+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
1058+ + Clean up d/strongswan-starter.postinst: Removed entire section on
1059+ opportunistic encryption disabling - this was never in strongSwan and
1060+ won't be see upstream issue #2160.
1061+ + Ubuntu is not using the debconf triggered private key generation
1062+ - d/rules: Removed patching ipsec.conf on build (not using the
1063+ debconf-managed config.)
1064+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
1065+ used for debconf-managed include of private key).
1066+ + Mass enablement of extra plugins and features to allow a user to use
1067+ strongswan for a variety of extra use cases without having to rebuild.
1068+ - d/control: Add required additional build-deps
1069+ - d/control: Mention addtionally enabled plugins
1070+ - d/rules: Enable features at configure stage
1071+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1072+ - d/libstrongswan.install: Add plugins (so, conf)
1073+ + d/strongswan-starter.install: Install pool feature, which is useful since
1074+ we have attr-sql plugin enabled as well using it.
1075+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1076+ via this userspace implementation (please do note that this is still
1077+ considered experimental by upstream).
1078+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1079+ - d/control: List kernel-libipsec plugin at extra plugins description
1080+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1081+ upstream recommends to not load kernel-libipsec by default.
1082+ + Relocate tnc plugin
1083+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1084+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1085+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1086+ + d/libstrongswan.install: Add kernel-netlink configuration files
1087+ + Complete the disabling of libfast; This was partially accepted in Debian,
1088+ it is no more packaging medcli and medsrv, but still builds and
1089+ mentions it.
1090+ - d/rules: Add --disable-fast to avoid build time and dependencies
1091+ - d/control: Remove medcli, medsrv from package description
1092+ + d/control: Mention mgf1 plugin which is in libstrongswan now
1093+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
1094+ libstrongswan-extra-plugins (no deps from default plugins).
1095+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1096+ missed that, droppable after 18.04)
1097+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1098+ plugins for the most common use cases from extra-plugins into a new
1099+ standard-plugins package. This will allow those use cases without pulling
1100+ in too much more plugins (a bit like the tnc package). Recommend that
1101+ package from strongswan-libcharon.
1102+ * Added changes:
1103+ + d/strongswan-tnc-client.install (relocate tnc) swidtag creation changed
1104+ in 5.6
1105+ + d/strongswan-tnc-server.install (relocate tnc) pacman no more needed
1106+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
1107+ libstrongswan as we dropped relocating ccm and test-vectors.
1108+ (droppable >18.04).
1109+ - d/control: add breaks/replace from libstrongswan to
1110+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
1111+ (droppable >18.04).
1112+ * Dropped changes:
1113+ + Update init/service handling (debian default matches Ubuntu past now)
1114+ Dropping this fixes (LP: #1734886)
1115+ - d/rules: Change init/systemd program name to strongswan
1116+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
1117+ patching upstream
1118+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
1119+ linking to upstream
1120+ + d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call
1121+ (this is a never failing no-op for us, no need for Delta).
1122+ + d/strongswan-starter.prerm: Stop strongswan service on package removal
1123+ (ipsec now maps to strongswan service, so this works as-is).
1124+ + Clean up d/strongswan-starter.postinst: rename service ipsec to
1125+ strongswan (ipsec now maps to strongswan service, so this works as-is)
1126+ + Clean up d/strongswan-starter.postinst: daemon enable/disable (the
1127+ whole section is disabled, so no need for delta)
1128+ + (is upstream) CVE-2017-11185 patches
1129+ + (is upstream) FTBFS upstream fix for changed include files
1130+ + (is upstream) debian/patches/increase-bliss-test-timeout.patch: Under
1131+ QEMU/KVM autopkgtest the bliss test takes longer than the default
1132+ + (in Debian) add now built (since 5.5.1) mgf1 plugin to
1133+ libstrongswan-extra-plugins.
1134+ + (in Debian) d/strongswan-starter.install: install stroke apparmor profile
1135+ + (this was enabled as part of the former delta, squash changes to no-up)
1136+ d/rules: Disable duplicheck.
1137+ + (not needed) Relocate plugins test-vectors from extra-plugins to
1138+ libstrongswan
1139+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
1140+ - d/libstrongswan.install: Add plugins/confiles
1141+ - d/control: move package descriptions and add required breaks/replaces
1142+ + (not needed) Relocate plugins ccm from extra-plugins to libstrongswan
1143+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
1144+ - d/libstrongswan.install: Add plugins/confiles
1145+ - d/control: move package descriptions and add required breaks/replaces
1146+ + (while using it requires special kernel, it does not hurt to be
1147+ available in the package) Remove ha plugin
1148+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
1149+ - d/rules: Do not enable ha plugin
1150+ - d/control: Drop listing the ha plugin in the package description
1151+
1152+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 29 Nov 2017 15:55:18 +0100
1153+
1154 strongswan (5.6.1-2) unstable; urgency=medium
1155
1156 * move counters plugin from -starter to -libcharon. closes: #882431
1157@@ -407,6 +1443,213 @@ strongswan (5.5.2-1) experimental; urgency=medium
1158
1159 -- Yves-Alexis Perez <corsac@debian.org> Fri, 19 May 2017 11:32:00 +0200
1160
1161+strongswan (5.5.1-4ubuntu3) bionic; urgency=medium
1162+
1163+ * Fix Artful FTBFS due to newer glibc (LP: #1724859)
1164+ - d/p/utils-Include-stdint.h.patch: upstream fix for changed include
1165+ files.
1166+
1167+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 19 Oct 2017 15:18:52 +0200
1168+
1169+strongswan (5.5.1-4ubuntu2) artful; urgency=medium
1170+
1171+ * SECURITY UPDATE: Fix RSA signature verification
1172+ - debian/patches/CVE-2017-11185.patch: does some
1173+ verifications in order to avoid null-point dereference
1174+ in src/libstrongswan/gmp/gmp_rsa_public_key.c
1175+ - CVE-2017-11185
1176+
1177+ -- Leonidas S. Barbosa <leo.barbosa@canonical.com> Tue, 15 Aug 2017 14:49:49 -0300
1178+
1179+strongswan (5.5.1-4ubuntu1) artful; urgency=medium
1180+
1181+ * Merge from Debian to pick up latest security changes (CVE-2017-9022,
1182+ CVE-2017-9023).
1183+ * Remaining Changes:
1184+ + Update init/service handling
1185+ - d/rules: Change init/systemd program name to strongswan
1186+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
1187+ patching upstream
1188+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
1189+ linking to upstream
1190+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1191+ - d/strongswan-starter.prerm: Stop strongswan service on package
1192+ removal (as opposed to using the old init.d script).
1193+ + Clean up d/strongswan-starter.postinst:
1194+ - Removed section about runlevel changes
1195+ - Adapted service restart section for Upstart (kept to be Trusty
1196+ backportable).
1197+ - Remove old symlinks to init.d files is necessary.
1198+ - Removed further out-dated code
1199+ - Removed entire section on opportunistic encryption - this was never in
1200+ strongSwan.
1201+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
1202+ + Mass enablement of extra plugins and features to allow a user to use
1203+ strongswan for a variety of use cases without having to rebuild.
1204+ - d/control: Add required additional build-deps
1205+ - d/rules: Enable features at configure stage
1206+ - d/control: Mention addtionally enabled plugins
1207+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1208+ - d/libstrongswan.install: Add plugins (so, conf)
1209+ + d/rules: Disable duplicheck as per
1210+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
1211+ + Remove ha plugin (requires special kernel)
1212+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
1213+ - d/rules: Do not enable ha plugin
1214+ - d/control: Drop listing the ha plugin in the package description
1215+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1216+ via this userspace implementation (please do note that this is still
1217+ considered experimental by upstream).
1218+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1219+ - d/control: List kernel-libipsec plugin at extra plugins description
1220+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1221+ upstream recommends to not load kernel-libipsec by default.
1222+ + Relocate tnc plugin
1223+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1224+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1225+ + d/strongswan-starter.install: Install pool feature, that useful due to
1226+ having attr-sql plugin that is enabled now.
1227+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
1228+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
1229+ - d/libstrongswan.install: Add plugins/confiles
1230+ - d/control: move package descriptions and add required breaks/replaces
1231+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1232+ + d/libstrongswan.install: Add kernel-netlink configuration files
1233+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1234+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
1235+ autopkgtest the bliss test takes longer than the default (Upstream in
1236+ 5.5.2 via issue 2204)
1237+ + Complete the disabling of libfast; This was partially accepted in Debian,
1238+ it is no more packaging medcli and medsrv, but still builds and
1239+ mentions it.
1240+ - d/rules: Add --disable-fast to avoid build time and dependencies
1241+ - d/control: Remove medcli, medsrv from package description
1242+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
1243+ "only" to extra-plugins Mgf1 is not listed as default plugin at
1244+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
1245+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
1246+ libstrongswan-extra-plugins.
1247+ + Add missing mention of md4 plugin in d/control
1248+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1249+ missed that)
1250+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1251+ plugins for the most common use cases from extra-plugins into a new
1252+ standard-plugins package. This will allow those use cases without pulling
1253+ in too much more plugins (a bit like the tnc package). Recommend that
1254+ package from strongswan-libcharon.
1255+
1256+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 31 May 2017 15:57:54 +0200
1257+
1258+strongswan (5.5.1-3ubuntu1) artful; urgency=medium
1259+
1260+ * Merge from Debian to pick up latest changes. Among others this includes:
1261+ - a lot of the Delta we upstreamed to Debian (more discussions are ongoing
1262+ but likely have to wait until Debian stretch was released)
1263+ - enabling mediation support (LP: #1657413)
1264+ * Remaining Changes:
1265+ + Update init/service handling
1266+ - d/rules: Change init/systemd program name to strongswan
1267+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
1268+ patching upstream
1269+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
1270+ linking to upstream
1271+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1272+ - d/strongswan-starter.prerm: Stop strongswan service on package
1273+ removal (as opposed to using the old init.d script).
1274+ + Clean up d/strongswan-starter.postinst:
1275+ - Removed section about runlevel changes
1276+ - Adapted service restart section for Upstart (kept to be Trusty
1277+ backportable).
1278+ - Remove old symlinks to init.d files is necessary.
1279+ - Removed further out-dated code
1280+ - Removed entire section on opportunistic encryption - this was never in
1281+ strongSwan.
1282+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
1283+ + Mass enablement of extra plugins and features to allow a user to use
1284+ strongswan for a variety of use cases without having to rebuild.
1285+ - d/control: Add required additional build-deps
1286+ - d/rules: Enable features at configure stage
1287+ - d/control: Mention addtionally enabled plugins
1288+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1289+ - d/libstrongswan.install: Add plugins (so, conf)
1290+ + d/rules: Disable duplicheck as per
1291+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
1292+ + Remove ha plugin (requires special kernel)
1293+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
1294+ - d/rules: Do not enable ha plugin
1295+ - d/control: Drop listing the ha plugin in the package description
1296+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1297+ via this userspace implementation (please do note that this is still
1298+ considered experimental by upstream).
1299+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1300+ - d/control: List kernel-libipsec plugin at extra plugins description
1301+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1302+ upstream recommends to not load kernel-libipsec by default.
1303+ + Relocate tnc plugin
1304+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1305+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1306+ + d/strongswan-starter.install: Install pool feature, that useful due to
1307+ having attr-sql plugin that is enabled now.
1308+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
1309+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
1310+ - d/libstrongswan.install: Add plugins/confiles
1311+ - d/control: move package descriptions and add required breaks/replaces
1312+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1313+ + d/libstrongswan.install: Add kernel-netlink configuration files
1314+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1315+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
1316+ autopkgtest the bliss test takes longer than the default (Upstream in
1317+ 5.5.2 via issue 2204)
1318+ + Complete the disabling of libfast; This was partially accepted in Debian,
1319+ it is no more packaging medcli and medsrv, but still builds and
1320+ mentions it.
1321+ - d/rules: Add --disable-fast to avoid build time and dependencies
1322+ - d/control: Remove medcli, medsrv from package description
1323+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
1324+ "only" to extra-plugins Mgf1 is not listed as default plugin at
1325+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
1326+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
1327+ libstrongswan-extra-plugins.
1328+ + Add missing mention of md4 plugin in d/control
1329+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1330+ missed that)
1331+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1332+ plugins for the most common use cases from extra-plugins into a new
1333+ standard-plugins package. This will allow those use cases without pulling
1334+ in too much more plugins (a bit like the tnc package). Recommend that
1335+ package from strongswan-libcharon.
1336+ * Dropped Changes:
1337+ + Add and install apparmor profiles (in Debian)
1338+ - d/rules: Install AppArmor profiles
1339+ - d/control: Add dh-apparmor build-dep
1340+ - d/usr.lib.ipsec.{charon, lookip, stroke}: Add latest AppArmor profiles
1341+ for charon, lookip and stroke
1342+ - d/libcharon-extra-plugins.install: Install profile for lookip
1343+ - d/strongswan-charon.install: Install profile for charon
1344+ - d/strongswan-starter.install: Install profile for stroke
1345+ - Fix strongswan ipsec status issue with apparmor
1346+ - Fix Dep8 tests for the now extra strongswan-pki package for pki
1347+ - Fix Dep8 tests for the now extra strongswan-scepclient package
1348+ + d/rules: Sorted and only one enable option per configure line (in
1349+ Debian)
1350+ + Add updated logcheck rules (in Debian)
1351+ - debian/libstrongswan.strongswan.logcheck.*: Remove outdated files
1352+ - debian/strongswan.logcheck: Add updated logcheck rules
1353+ + Add updated DEP8 tests (in Debian)
1354+ - d/tests/*: Add DEP8 tests
1355+ - d/control: Enable autotestpkg
1356+ + d/rules: do not strip for library integrity checking (After Discussion
1357+ with Debian this isn't acceptable there, but at the same time it turned
1358+ out the real use-case of this never uses this lib but instead third
1359+ party checks of checksums for e.g. FIPS cert; so drop the Delta)
1360+ - Use override_dh_strip to to avoid overwriting user build flags.
1361+ - Add missing mention of libchecksum integrity test in d/control
1362+ + d/rules: Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths
1363+ in tests to avoid issues in low entropy environments. (Debian has
1364+ disabled !x86 tests for the same reason, one solution is enough)
1365+
1366+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 04 May 2017 14:06:23 +0200
1367+
1368 strongswan (5.5.1-3) unstable; urgency=medium
1369
1370 [ Christian Ehrhardt ]
1371@@ -440,6 +1683,136 @@ strongswan (5.5.1-2) unstable; urgency=medium
1372
1373 -- Yves-Alexis Perez <corsac@debian.org> Wed, 07 Dec 2016 08:34:52 +0100
1374
1375+strongswan (5.5.1-1ubuntu2) zesty; urgency=medium
1376+
1377+ * Update Maintainers which was missed while merging 5.5.1-1.
1378+
1379+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 19 Dec 2016 16:02:40 +0100
1380+
1381+strongswan (5.5.1-1ubuntu1) zesty; urgency=medium
1382+
1383+ * Merge from Debian (complex delta, discussions and broken out changes can be
1384+ found in the merge proposal linked from the merge bug LP: #1631198)
1385+ * Remaining Changes:
1386+ + d/rules: Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity
1387+ checking.
1388+ + d/rules: Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths
1389+ in tests to avoid issues in low entropy environments.
1390+ + Update init/service handling
1391+ - d/rules: Change init/systemd program name to strongswan
1392+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
1393+ patching upstream
1394+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
1395+ linking to upstream
1396+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1397+ - d/strongswan-starter.prerm: Stop strongswan service on package
1398+ removal (as opposed to using the old init.d script).
1399+ + Clean up d/strongswan-starter.postinst:
1400+ - Removed section about runlevel changes
1401+ - Adapted service restart section for Upstart (kept to be Trusty
1402+ backportable).
1403+ - Remove old symlinks to init.d files is necessary.
1404+ - Removed further out-dated code
1405+ - Removed entire section on opportunistic encryption - this was never in
1406+ strongSwan.
1407+ + Add and install apparmor profiles
1408+ - d/rules: Install AppArmor profiles
1409+ - d/control: Add dh-apparmor build-dep
1410+ - d/usr.lib.ipsec.{charon, lookip, stroke}: Add latest AppArmor profiles
1411+ for charon, lookip and stroke
1412+ - d/libcharon-extra-plugins.install: Install profile for lookip
1413+ - d/strongswan-charon.install: Install profile for charon
1414+ - d/strongswan-starter.install: Install profile for stroke
1415+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
1416+ + d/rules: Sorted and only one enable option per configure line
1417+ + Mass enablement of extra plugins and features to allow a user to use
1418+ strongswan for a variety of use cases without having to rebuild.
1419+ - d/control: Add required additional build-deps
1420+ - d/rules: Enable features at configure stage
1421+ - d/control: Mention addtionally enabled plugins
1422+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1423+ - d/libstrongswan.install: Add plugins (so, conf)
1424+ + d/rules: Disable duplicheck as per
1425+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
1426+ + Remove ha plugin (requires special kernel)
1427+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
1428+ - d/rules: Do not enable ha plugin
1429+ - d/control: Drop listing the ha plugin in the package description
1430+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1431+ via this userspace implementation (please do note that this is still
1432+ considered experimental by upstream).
1433+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1434+ - d/control: List kernel-libipsec plugin at extra plugins description
1435+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1436+ upstream recommends to not load kernel-libipsec by default.
1437+ + Relocate tnc plugin
1438+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1439+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1440+ + d/strongswan-starter.install: Install pool feature, that useful due to
1441+ having attr-sql plugin that is enabled now.
1442+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
1443+ - d/libstrongswan-extra-plugins.install: Remove plugins
1444+ - d/libstrongswan.install: Add plugins
1445+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1446+ + d/libstrongswan.install: Add kernel-netlink configuration files
1447+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1448+ + Add updated logcheck rules
1449+ - debian/libstrongswan.strongswan.logcheck.*: Remove outdated files
1450+ - debian/strongswan.logcheck: Add updated logcheck rules
1451+ + Add updated DEP8 tests
1452+ - d/tests/*: Add DEP8 tests
1453+ - d/control: Enable autotestpkg
1454+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
1455+ autopkgtest the bliss test takes longer than the default
1456+ + Complete the disabling of libfast
1457+ - Note: This was partially accepted in Debian, it is no more
1458+ packaging medcli and medsrv, but still builds and mentions it
1459+ - d/rules: Add --disable-fast to avoid build time and dependencies
1460+ - d/control: Remove medcli, medsrv from package description
1461+ * Dropped Changes:
1462+ + Adding build-dep to iptables-dev (no change, was only in Changelog)
1463+ + Dropping of build deps libfcgi-dev, clearsilver-dev (in Debian)
1464+ + Adding strongswan-plugin-* virtual packages for dist-upgrade (no
1465+ upgrade path left needing them)
1466+ + Most of "disabling libfast" (Debian dropped it from package content)
1467+ + Transition for ipsec service (no upgrade path left)
1468+ + Reverted part of the cleanup to d/strongswan-starter.postinst as using
1469+ service should rather use invoke-rc.d (so it is a partial revert of our
1470+ delta)
1471+ + Transition handling (breaks/replaces) from per-plugin packages to the
1472+ three grouped plugin packages (no upgrade path left)
1473+ + debian/strongswan-starter.dirs: Don't touch /etc/init.d. (while "correct"
1474+ it is effectively a no-op still, so not worth the delta)
1475+ + Lower dpkg-dev to 1.16.1 from 1.16.2 to enable backporting to Precise
1476+ (no more needed)
1477+ + d/rules: Remove configure option --enable-unit-test (unit tests run by
1478+ default)
1479+ * Added Changes:
1480+ + Fix strongswan ipsec status issue with apparmor (LP: #1587886)
1481+ + d/control, d/libstrongswan.install, d/libstrongswan-extra-plugins: Fixup
1482+ the relocation of the ccm plugin which missed to move the conffiles.
1483+ + Complete move of test-vectors (was missing in d/control)
1484+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
1485+ "only" to extra-plugins Mgf1 is not listed as default plugin at
1486+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
1487+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
1488+ libstrongswan-extra-plugins.
1489+ + Add missing mention of md4 plugin in d/control
1490+ + Add missing mention of libchecksum integrity test in d/control
1491+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1492+ missed that)
1493+ + Use override_dh_strip to to fix library integrity checking instead of
1494+ DEB_BUILD_OPTION to avoid overwriting user build flags.
1495+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1496+ plugins for the most common use cases from extra-plugins into a new
1497+ standard-plugins package. This will allow those use cases without pulling
1498+ in too much more plugins (a bit like the tnc package). Recommend that
1499+ package from strongswan-libcharon (LP: #1640826).
1500+ + Fix Dep8 tests for the now extra strongswan-pki package for pki
1501+ + Fix Dep8 tests for the now extra strongswan-scepclient package
1502+
1503+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 07 Nov 2016 16:16:41 +0100
1504+
1505 strongswan (5.5.1-1) unstable; urgency=medium
1506
1507 * New upstream bugfix release.
1508@@ -556,6 +1929,177 @@ strongswan (5.3.5-2) unstable; urgency=medium
1509
1510 -- Yves-Alexis Perez <corsac@debian.org> Mon, 14 Mar 2016 23:53:34 +0100
1511
1512+strongswan (5.3.5-1ubuntu4) yakkety; urgency=medium
1513+
1514+ * Build-depend on libjson-c-dev instead of libjson0-dev.
1515+ * Rebuild against libjson-c3.
1516+
1517+ -- Graham Inggs <ginggs@ubuntu.com> Fri, 29 Apr 2016 19:04:22 +0200
1518+
1519+strongswan (5.3.5-1ubuntu3) xenial; urgency=medium
1520+
1521+ * Rebuild against libmysqlclient20.
1522+
1523+ -- Robie Basak <robie.basak@ubuntu.com> Tue, 05 Apr 2016 13:02:48 +0000
1524+
1525+strongswan (5.3.5-1ubuntu2) xenial; urgency=medium
1526+
1527+ * debian/tests/plugins: rdrand may or may not be loaded, depending on the
1528+ cpu features.
1529+
1530+ -- Iain Lane <iain@orangesquash.org.uk> Mon, 22 Feb 2016 17:13:01 +0000
1531+
1532+strongswan (5.3.5-1ubuntu1) xenial; urgency=medium
1533+
1534+ * debian/{rules,control,libstrongswan-extra-plugins.install}
1535+ Enable bliss plugin
1536+ * debian/{rules,control,libstrongswan-extra-plugins.install}
1537+ Enable chapoly plugin
1538+ * debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch
1539+ Upstream suggests to not load this plugin by default as it has
1540+ some limitations.
1541+ https://wiki.strongswan.org/projects/strongswan/wiki/Kernel-libipsec
1542+ * debian/patches/increase-bliss-test-timeout.patch
1543+ Under QEMU/KVM for autopkgtest bliss test takes a bit longer then default
1544+ * Update Apparmor profiles
1545+ - usr.lib.ipsec.charon
1546+ - add capability audit_write for xauth-pam (LP: #1470277)
1547+ - add capability dac_override (needed by agent plugin)
1548+ - allow priv dropping (LP: #1333655)
1549+ - allow caching CRLs (LP: #1505222)
1550+ - allow rw access to /dev/net/tun for kernel-libipsec (LP: #1309594)
1551+ - usr.lib.ipsec.stroke
1552+ - allow priv dropping (LP: #1333655)
1553+ - add local include
1554+ - usr.lib.ipsec.lookip
1555+ - add local include
1556+ * Merge from Debian, which includes fixes for all previous CVEs
1557+ Fixes (LP: #1330504, #1451091, #1448870, #1470277)
1558+ Remaining changes:
1559+ * debian/control
1560+ - Lower dpkg-dev to 1.16.1 from 1.16.2 to enable backporting to Precise
1561+ - Update Maintainer for Ubuntu
1562+ - Add build-deps
1563+ - dh-apparmor
1564+ - iptables-dev
1565+ - libjson0-dev
1566+ - libldns-dev
1567+ - libmysqlclient-dev
1568+ - libpcsclite-dev
1569+ - libsoup2.4-dev
1570+ - libtspi-dev
1571+ - libunbound-dev
1572+ - Drop build-deps
1573+ - libfcgi-dev
1574+ - clearsilver-dev
1575+ - Create virtual packages for all strongswan-plugin-* for dist-upgrade
1576+ - Set XS-Testsuite: autopkgtest
1577+ * debian/rules:
1578+ - Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity checking.
1579+ - Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths in
1580+ tests.
1581+ - Change init/systemd program name to strongswan
1582+ - Install AppArmor profiles
1583+ - Removed pieces on 'patching ipsec.conf' on build.
1584+ - Enablement of features per Ubuntu current config suggested from
1585+ upstream recommendation
1586+ - Unpack and sort enabled features to one-per-line
1587+ - Disable duplicheck as per
1588+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
1589+ - Disable libfast (--disable-fast):
1590+ Requires dropping medsrv, medcli plugins which depend on libfast
1591+ - Add configure options
1592+ --with-tss=trousers
1593+ - Remove configure options:
1594+ --enable-ha (requires special kernel)
1595+ --enable-unit-test (unit tests run by default)
1596+ - Drop logcheck install
1597+ * debian/tests/*
1598+ - Add DEP8 test for strongswan service and plugins
1599+ * debian/strongswan-starter.strongswan.service
1600+ - Add new systemd file instead of patching upstream
1601+ * debian/strongswan-starter.links
1602+ - removed, use Ubuntu systemd file instead of linking to upstream
1603+ * debian/usr.lib.ipsec.{charon, lookip, stroke}
1604+ - added AppArmor profiles for charon, lookip and stroke
1605+ * debian/libcharon-extra-plugins.install
1606+ - Add plugins
1607+ - kernel-libipsec.{so, lib, conf, apparmor}
1608+ - Remove plugins
1609+ - libstrongswan-ha.so
1610+ - Relocate plugins
1611+ - libstrongswan-tnc-tnccs.so (strongswan-tnc-base.install)
1612+ * debian/libstrongswan-extra-plugins.install
1613+ - Add plugins (so, lib, conf)
1614+ - acert
1615+ - attr-sql
1616+ - coupling
1617+ - dnscert
1618+ - fips-prf
1619+ - gmp
1620+ - ipseckey
1621+ - load-tester
1622+ - mysql
1623+ - ntru
1624+ - radattr
1625+ - soup
1626+ - sqlite
1627+ - sql
1628+ - systime-fix
1629+ - unbound
1630+ - whitelist
1631+ - Relocate plugins (so, lib, conf)
1632+ - ccm (libstrongswan.install)
1633+ - test-vectors (libstrongswan.install)
1634+ * debian/libstrongswan.install
1635+ - Sort sections
1636+ - Add plugins (so, lib, conf)
1637+ - libchecksum
1638+ - ccm
1639+ - eap-identity
1640+ - md4
1641+ - test-vectors
1642+ * debian/strongswan-charon.install
1643+ - Add AppArmor profile for charon
1644+ * debian/strongswan-starter.install
1645+ - Add tools, manpages, conf
1646+ - openac
1647+ - pool
1648+ - _updown_espmark
1649+ - Add AppArmor profile for stroke
1650+ * debian/strongswan-tnc-base.install
1651+ - Add new subpackage for TNC
1652+ - remove non-existent (dropped in 5.2.1) libpts library files
1653+ * debian/strongswan-tnc-client.install
1654+ - Add new subpackage for TNC
1655+ * debian/strongswan-tnc-ifmap.install
1656+ - Add new subpackage for TNC
1657+ * debian/strongswan-tnc-pdp.install
1658+ - Add new subpackage for TNC
1659+ * debian/strongswan-tnc-server.install
1660+ - Add new subpackage for TNC
1661+ * debian/strongswan-starter.postinit:
1662+ - Removed section about runlevel changes, it's almost 2014.
1663+ - Adapted service restart section for Upstart.
1664+ - Remove old symlinks to init.d files is necessary.
1665+ * debian/strongswan-starter.dirs: Don't touch /etc/init.d.
1666+ * debian/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1667+ * debian/strongswan-starter.prerm: Stop strongswan service on package
1668+ removal (as opposed to using the old init.d script).
1669+ * debian/libstrongswan.strongswan.logcheck combined into debian/strongswan.logcheck
1670+ - logcheck patterns updated to be helpful
1671+ * debian/strongswan-starter.postinst: Removed further out-dated code and
1672+ entire section on opportunistic encryption - this was never in strongSwan.
1673+ * debian/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1674+ Drop changes:
1675+ * debian/control
1676+ - Per-plugin package breakup: Reducing packaging delta from Debian
1677+ - Don't build dhcp, farp subpackages: Reduce packging delta from Debian
1678+ * debian/watch: Already exists in Debian merge
1679+ * debian/upstream/signing-key.asc: Upstream has newer version.
1680+
1681+ -- Ryan Harper <ryan.harper@canonical.com> Fri, 12 Feb 2016 11:24:53 -0600
1682+
1683 strongswan (5.3.5-1) unstable; urgency=medium
1684
1685 * New upstream bugfix release.
1686@@ -828,6 +2372,210 @@ strongswan (5.1.2-1) unstable; urgency=medium
1687
1688 -- Yves-Alexis Perez <corsac@debian.org> Wed, 12 Mar 2014 11:22:38 +0100
1689
1690+strongswan (5.1.2-0ubuntu8) xenial; urgency=medium
1691+
1692+ * Import FTBFS for s390x from Debian 5.1.2-3 upload. (LP: #1521240)
1693+
1694+ -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 30 Nov 2015 15:46:06 +0000
1695+
1696+strongswan (5.1.2-0ubuntu7) xenial; urgency=medium
1697+
1698+ * SECURITY UPDATE: authentication bypass in eap-mschapv2 plugin
1699+ - debian/patches/CVE-2015-8023.patch: only succeed authentication if
1700+ MSK was established in
1701+ src/libcharon/plugins/eap_mschapv2/eap_mschapv2.c.
1702+ - CVE-2015-8023
1703+ * debian/patches/disable_ntru_test.patch: disable test causing FTBFS
1704+ until regression is properly investigated.
1705+
1706+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 19 Nov 2015 14:00:17 -0500
1707+
1708+strongswan (5.1.2-0ubuntu6) wily; urgency=medium
1709+
1710+ * SECURITY UPDATE: user credential disclosure to rogue servers
1711+ - debian/patches/CVE-2015-4171.patch: enforce remote authentication
1712+ config before proceeding with own authentication in
1713+ src/libcharon/sa/ikev2/tasks/ike_auth.c.
1714+ - CVE-2015-4171
1715+ * debian/rules: don't FTBFS from unused service file
1716+
1717+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 08 Jun 2015 12:50:38 -0400
1718+
1719+strongswan (5.1.2-0ubuntu5) vivid; urgency=medium
1720+
1721+ * Add a systemd unit corresponding to strongswan-starter.strongswan.upstart.
1722+
1723+ -- Martin Pitt <martin.pitt@ubuntu.com> Fri, 16 Jan 2015 08:27:54 +0100
1724+
1725+strongswan (5.1.2-0ubuntu4) vivid; urgency=medium
1726+
1727+ * SECURITY UPDATE: denial of service via DH group 1025
1728+ - debian/patches/CVE-2014-9221.patch: define MODP_CUSTOM outside of
1729+ IKE DH range in src/libstrongswan/crypto/diffie_hellman.c,
1730+ src/libstrongswan/crypto/diffie_hellman.h.
1731+ - CVE-2014-9221
1732+
1733+ -- Tyler Hicks <tyhicks@canonical.com> Mon, 05 Jan 2015 08:25:29 -0500
1734+
1735+strongswan (5.1.2-0ubuntu3) utopic; urgency=low
1736+
1737+ * Added "libgcrypt20-dev | libgcrypt11-dev" to build dependencies to fix
1738+ build.
1739+
1740+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 15 Oct 2014 16:49:18 +0000
1741+
1742+strongswan (5.1.2-0ubuntu2) trusty; urgency=medium
1743+
1744+ * SECURITY UPDATE: remote authentication bypass
1745+ - debian/patches/CVE-2014-2338.patch: reject CREATE_CHILD_SA exchange
1746+ on unestablished IKE_SAs in src/libcharon/sa/ikev2/task_manager_v2.c.
1747+ - CVE-2014-2338
1748+
1749+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 14 Apr 2014 11:24:34 -0400
1750+
1751+strongswan (5.1.2-0ubuntu1) trusty; urgency=low
1752+
1753+ * New upstream release.
1754+
1755+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 01 Mar 2014 08:53:17 +0000
1756+
1757+strongswan (5.1.2~rc2-0ubuntu2) trusty; urgency=low
1758+
1759+ * debian/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1760+ * debian/usr.lib.ipsec.charon: Allow read access to /run/charon.
1761+
1762+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 19 Feb 2014 13:07:16 +0000
1763+
1764+strongswan (5.1.2~rc2-0ubuntu1) trusty; urgency=low
1765+
1766+ * New upstream release candidate.
1767+
1768+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 19 Feb 2014 12:59:21 +0000
1769+
1770+strongswan (5.1.2~rc1-0ubuntu4) trusty; urgency=medium
1771+
1772+ * debian/strongswan-tnc-*.install: Fixed files so libraries go into correct
1773+ packages.
1774+ * debian/usr.lib.ipsec.stroke: Allow access to strongswan.d directories.
1775+
1776+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 17 Feb 2014 18:12:38 +0000
1777+
1778+strongswan (5.1.2~rc1-0ubuntu3) trusty; urgency=low
1779+
1780+ * debian/rules: Exclude rdrand.conf in dh_install's --fail-missing.
1781+
1782+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:46:46 +0000
1783+
1784+strongswan (5.1.2~rc1-0ubuntu2) trusty; urgency=low
1785+
1786+ * debian/libstrongswan.install: Moved rdrand plugin configuration to rules
1787+ as it's only useful on amd64.
1788+ * debian/watch: Added opts=pgpsigurlmangle option.
1789+ * debian/upstream/signing-key.asc: Added key: 0xB34DBA77.
1790+
1791+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:32:10 +0000
1792+
1793+strongswan (5.1.2~rc1-0ubuntu1) trusty; urgency=medium
1794+
1795+ * New upstream release candidate.
1796+ * debian/*.install - include new configuration files for plugins in
1797+ appropiate packages.
1798+
1799+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:03:14 +0000
1800+
1801+strongswan (5.1.2~dr3+git20130120-0ubuntu3) trusty; urgency=low
1802+
1803+ * debian/control:
1804+ - Added Breaks/Replaces for all library files which have been moved
1805+ about (LP: #1278176).
1806+ - Removed build-dependency on check and added one on dh-apparmor.
1807+ * debian/strongswan-starter.postinst: Removed further out-dated code and
1808+ entire section on opportunistic encryption - this was never in strongSwan.
1809+ * debian/rules: Removed pieces on 'patching ipsec.conf' on build.
1810+
1811+ -- Jonathan Davies <jonathan.davies@canonical.com> Sun, 09 Feb 2014 23:53:23 +0000
1812+
1813+strongswan (5.1.2~dr3+git20130120-0ubuntu2) trusty; urgency=low
1814+
1815+ * debian/control: Fixed references to plugin-fips-prf.
1816+
1817+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 22 Jan 2014 11:22:14 +0000
1818+
1819+strongswan (5.1.2~dr3+git20130120-0ubuntu1) trusty; urgency=low
1820+
1821+ * Upstream Git snapshot for build fixes with regards to entropy.
1822+ * debian/rules:
1823+ - Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity checking.
1824+ - Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths in
1825+ tests.
1826+
1827+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 20 Jan 2014 19:00:59 +0000
1828+
1829+strongswan (5.1.2~dr3-0ubuntu1) trusty; urgency=low
1830+
1831+ * New upstream developer release.
1832+ * Made changes to packaging per upstream suggestions.
1833+ - Dropped medcli and medsrv packages - not recommended by upstream at this
1834+ time.
1835+ - Dropped ha plugin - needs special kernel.
1836+ - Improved all package descriptions in general.
1837+ - Drop build-dep on clearsilver-dev and libfcgi-dev - no longer needed.
1838+ - Removed debian/*logcheck* files - not relevant to strongSwan.
1839+ - Split dhcp and farp packages into sub-packages.
1840+ - Build kernel-libipsec, ntru, systime-fix, and xauth-noauth plugins.
1841+ - Changes to TNC-related packages.
1842+ * Created AppArmor profiles for lookip and stroke.
1843+
1844+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 15 Jan 2014 22:52:53 +0000
1845+
1846+strongswan (5.1.2~dr2+git20130106-0ubuntu2) trusty; urgency=low
1847+
1848+ * libstrongswan.install: Removed lingering unit-tester.so reference.
1849+
1850+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 06 Jan 2014 20:29:59 +0000
1851+
1852+strongswan (5.1.2~dr2+git20130106-0ubuntu1) trusty; urgency=low
1853+
1854+ * Git snapshot of commit 94e10f15e51ead788d9947e966878ebfdc95b7ce.
1855+ Incorporates upstream fixes for:
1856+ - Integrity testing.
1857+ - Unit test failures on little endian systems.
1858+ * Dropped debian/patches/02_test_asn1_fix_32bit_time_test.patch - fixed
1859+ upstream.
1860+ * debian/rules:
1861+ - Stop using CK_TIMEOUT_MULTIPLIER.
1862+ - Stop enabling the test suite only on non-powerpc arches (it runs
1863+ anyway).
1864+
1865+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 06 Jan 2014 20:17:20 +0000
1866+
1867+strongswan (5.1.2~dr2-0ubuntu3) trusty; urgency=low
1868+
1869+ * debian/control: Reinstate missing comma in dependencies.
1870+
1871+ -- Jonathan Davies <jonathan.davies@canonical.com> Fri, 03 Jan 2014 05:39:13 +0000
1872+
1873+strongswan (5.1.2~dr2-0ubuntu2) trusty; urgency=low
1874+
1875+ * Added debian/patches/02_test_asn1_fix_32bit_time_test.patch - fixes issue
1876+ where test for >2038 tests on 32-bit platforms is broken.
1877+ - Reported upstream: https://wiki.strongswan.org/issues/477
1878+ * debian/control: Added strongswan-plugin-ntru to strongswan-ike Suggests.
1879+
1880+ -- Jonathan Davies <jonathan.davies@canonical.com> Fri, 03 Jan 2014 05:02:32 +0000
1881+
1882+strongswan (5.1.2~dr2-0ubuntu1) trusty; urgency=low
1883+
1884+ * New upstream developer release.
1885+ * debian/rules: Configure with: --enable-af-alg, --enable-ntru, --enable-soup,
1886+ and --enable-unity.
1887+ * debian/control:
1888+ - New plugin packages created for the above
1889+ - Split fips-prf into its own package.
1890+ - Added build-dependency on libsoup2.4-dev.
1891+
1892+ -- Jonathan Davies <jonathan.davies@canonical.com> Thu, 02 Jan 2014 17:37:33 +0000
1893+
1894 strongswan (5.1.1-3) unstable; urgency=low
1895
1896 * Upload to unstable.
1897@@ -919,6 +2667,192 @@ strongswan (5.1.1-1) unstable; urgency=low
1898
1899 -- Yves-Alexis Perez <corsac@debian.org> Fri, 24 Jan 2014 21:22:32 +0100
1900
1901+strongswan (5.1.1-0ubuntu17) trusty; urgency=low
1902+
1903+ * debian/control:
1904+ - Make strongswan-ike depend on iproute2.
1905+ - Added xauth plugin dependency on strongswan-plugin-eap-gtc.
1906+ - Created strongswan-libfast package.
1907+
1908+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 01 Jan 2014 17:04:45 +0000
1909+
1910+strongswan (5.1.1-0ubuntu16) trusty; urgency=low
1911+
1912+ * debian/control:
1913+ - Further splitting of plugins into subpackages (such as all EAP plugins
1914+ to their own packages).
1915+ - Added libpcsclite-dev to build-dependencies.
1916+ * debian/rules:
1917+ - Sort configure options in alphabetical order.
1918+ - Added configure option of --enable-eap-aka-3gpp2, --enable-eap-dynamic,
1919+ --enable-eap-sim-file, --enable-eap-sim-pcsc,
1920+ --enable-eap-simaka-pseudonym, --enable-eap-simaka-reauth and
1921+ --enable-eap-simaka-sql.
1922+ - Don't exclude medsrv from install.
1923+ * Moved eap-identity.so to libstrongswan package as it's used by all the
1924+ other EAP plugins.
1925+
1926+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 21:25:50 +0000
1927+
1928+strongswan (5.1.1-0ubuntu15) trusty; urgency=low
1929+
1930+ * debian/control:
1931+ - Split plugins from libstrongswan package into modular subpackages.
1932+ - Added libmysqlclient-dev to build-dependencies.
1933+ - strongswan-ike: Set to depend on either strongswan-plugins-openssl or
1934+ strongswan-plugins-gcrypt.
1935+ - strongswan-ike: All other plugins added to Suggests.
1936+ - Created two new TNC packages: strongswan-tnc-ifmap and
1937+ strongswan-tnc-pdp and added to tnc-imcvs Suggests.
1938+ * debian/rules: Added to CONFIGUREARGS: --enable-certexpire,
1939+ --enable-error-notify, --enable-mysql, --enable-load-tester,
1940+ --enable-radattr, --enable-tnc-pdp, and --enable-whitelist.
1941+ * debian/strongswan-ike.install: Moved eap-identity.so to -tnc-imcvs package.
1942+
1943+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 16:15:32 +0000
1944+
1945+strongswan (5.1.1-0ubuntu14) trusty; urgency=low
1946+
1947+ * debian/rules:
1948+ - CK_TIMEOUT_MULTIPLIER back down to 6.
1949+ - Disable unit tests on powerpc.
1950+
1951+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:39:48 +0000
1952+
1953+strongswan (5.1.1-0ubuntu13) trusty; urgency=low
1954+
1955+ * debian/rules: CK_TIMEOUT_MULTIPLIER to 10 as just powerppc is being stubborn.
1956+
1957+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:23:42 +0000
1958+
1959+strongswan (5.1.1-0ubuntu12) trusty; urgency=low
1960+
1961+ * debian/rules: Bring CK_TIMEOUT_MULTIPLIER up to 6 to fix powerppc and
1962+ armhf.
1963+
1964+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:03:40 +0000
1965+
1966+strongswan (5.1.1-0ubuntu11) trusty; urgency=low
1967+
1968+ * 02_increase-test_rsa_generate-timeout.patch: Removed - only fixed build on
1969+ one extra arch.
1970+ * debian/rules: Set CK_TIMEOUT_MULTIPLIER to 4.
1971+
1972+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 06:51:47 +0000
1973+
1974+strongswan (5.1.1-0ubuntu10) trusty; urgency=low
1975+
1976+ * debian/patches: Added patch 02_increase-test_rsa_generate-timeout.patch -
1977+ - Increases RSA key generate test timeout to 30 seconds so that it doesn't
1978+ fail on armhf, arm64, and powerppc.
1979+ * Contrary to what the last changelog entry says, we are still running
1980+ strongswan as root (with AppArmor protection).
1981+
1982+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 06:06:47 +0000
1983+
1984+strongswan (5.1.1-0ubuntu9) trusty; urgency=low
1985+
1986+ * debian/rules: Added to configure options:
1987+ - --enable-tnc-ifmap: enable TNC IF-MAP module.
1988+ - --enable-duplicheck: enable duplicheck plugin.
1989+ - --enable-imv-swid, --enable-imc-swid: Added.
1990+ - Run strongswan as it's own user.
1991+ * debian/strongswan-starter.install: Install duplicheck.
1992+ * debian/strongswan-tnc-imcvs.install: Install swidtags.
1993+
1994+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 19:33:27 +0000
1995+
1996+strongswan (5.1.1-0ubuntu8) trusty; urgency=low
1997+
1998+ * debian/rules: Added to configure options:
1999+ - --enable-unit-tests: check unit testing on build.
2000+ - --enable-unbound: for validating DNS lookups.
2001+ - --enable-dnscert: for DNSCERT peer authentication.
2002+ - --enable-ipseckey: for IPSEC key authentication.
2003+ - --enable-lookip: for LookIP functionality.
2004+ - --enable-coupling: certificate coupling functionality.
2005+ * debian/control: Added check, libldns-dev, libunbound-dev to
2006+ build-dependencies.
2007+ * debian/libstrongswan.install: Install new plugin .so's.
2008+ * debian/strongswan-starter.install: Added lookip.
2009+
2010+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:52:07 +0000
2011+
2012+strongswan (5.1.1-0ubuntu7) trusty; urgency=low
2013+
2014+ * strongswan-starter.install: Moved pt-tls-client to tnc-imcvs (to prevent
2015+ the former from depending on the latter).
2016+
2017+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:30:19 +0000
2018+
2019+strongswan (5.1.1-0ubuntu6) trusty; urgency=low
2020+
2021+ * debian/strongswan-starter.prerm: Stop strongswan service on package
2022+ removal (as opposed to using the old init.d script).
2023+
2024+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:22:10 +0000
2025+
2026+strongswan (5.1.1-0ubuntu5) trusty; urgency=low
2027+
2028+ * debian/rules:
2029+ - CONFIGUREARGS: Merged Debian and RPM options.
2030+ - Brings in TNC functionality.
2031+ * debian/control:
2032+ - Added build-dependency on libtspi-dev.
2033+ - Created strongswan-tnc-imcvs binary package for TNC components.
2034+ - Added strongswan-tnc-imcvs to libstrongswan's Suggests.
2035+ * debian/libstrongswan.install:
2036+ - Included newly built MD4 and SQLite libraries.
2037+ - Removed 'tnc' references (moved to TNC package).
2038+ * debian/strongswan-tnc-imcvs.install: Created - handle new TNC libraries and
2039+ binaries.
2040+ * debian/usr.lib.ipsec.charon: Allow access to TNC modules.
2041+
2042+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 14:05:43 +0000
2043+
2044+strongswan (5.1.1-0ubuntu4) trusty; urgency=low
2045+
2046+ * debian/usr.lib.ipsec.charon: Added - AppArmor profile for charon.
2047+ * debian/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
2048+ * debian/control: strongswan-ike - Stop depending on ipsec-tools.
2049+
2050+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 05:35:17 +0000
2051+
2052+strongswan (5.1.1-0ubuntu3) trusty; urgency=low
2053+
2054+ * strongswan-starter.strongswan.upstart - Only start strongSwan when a
2055+ network connection is available.
2056+ * debian/control: Downgrade build-dep version of dpkg-dev from 1.16.2 to
2057+ 1.16.1 - to make precise backporting easier.
2058+
2059+ -- Jonathan Davies <jonathan.davies@canonical.com> Thu, 12 Dec 2013 10:43:15 +0000
2060+
2061+strongswan (5.1.1-0ubuntu2) trusty; urgency=low
2062+
2063+ * strongswan-starter.strongswan.upstart - Created Upstart job for
2064+ strongSwan.
2065+ * debian/rules: Set dh_installinit to install above file.
2066+ * debian/strongswan-starter.postinit:
2067+ - Removed section about runlevel changes, it's almost 2014.
2068+ - Adapted service restart section for Upstart.
2069+ - Remove old symlinks to init.d files is necessary.
2070+ * debian/strongswan-starter.dirs: Don't touch /etc/init.d.
2071+
2072+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 11 Dec 2013 23:10:28 +0000
2073+
2074+strongswan (5.1.1-0ubuntu1) trusty; urgency=low
2075+
2076+ * New upstream release.
2077+ * Removed: debian/patches/CVE-2013-6075, CVE-2013-6076.patch - upsteamed.
2078+ * debian/control: Updated Standards-Version to 3.9.5 and applied
2079+ XSBC-Original-Maintainer policy.
2080+ * strongswan-starter.install:
2081+ - pki tool is now in /usr/bin.
2082+ - Install pt-tls-client.
2083+ - Install manpages (LP: #1206263).
2084+
2085+ -- Jonathan Davies <jpds@ubuntu.com> Sun, 01 Dec 2013 17:43:59 +0000
2086+
2087 strongswan (5.1.0-3) unstable; urgency=high
2088
2089 * urgency=high for the security fixes.
2090diff --git a/debian/control b/debian/control
2091index 0f1c483..fcbc1fd 100644
2092--- a/debian/control
2093+++ b/debian/control
2094@@ -1,7 +1,8 @@
2095 Source: strongswan
2096 Section: net
2097 Priority: optional
2098-Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org>
2099+Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
2100+XSBC-Original-Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org>
2101 Uploaders: Yves-Alexis Perez <corsac@debian.org>
2102 Standards-Version: 4.6.2
2103 Vcs-Browser: https://salsa.debian.org/debian/strongswan
2104@@ -136,6 +137,7 @@ Description: strongSwan utility and crypto library (extra plugins)
2105 - gcrypt (Crypto backend based on libgcrypt, provides
2106 RSA/DH/ciphers/hashers/rng)
2107 - ldap (LDAP fetching plugin based on libldap)
2108+ - ntru (key exchanged based on post-quantum computer NTRU)
2109 - padlock (VIA padlock crypto backend, provides AES128/SHA1)
2110 - pkcs11 (PKCS#11 smartcard backend)
2111 - rdrand (High quality / high performance random source using the Intel
2112@@ -203,6 +205,9 @@ Description: strongSwan charon library (extra plugins)
2113 - unity (Cisco Unity extensions for IKEv1)
2114 - xauth-eap (XAuth backend that uses EAP methods to verify passwords)
2115 - xauth-pam (XAuth backend that uses PAM modules to verify passwords)
2116+ - eap-dynamic (EAP proxy plugin that dynamically selects an EAP method
2117+ requested/supported by the client (since 5.0.1))
2118+ - eap-peap (EAP-PEAP protocol handler, wraps other EAP methods securely)
2119
2120 Package: strongswan-starter
2121 Architecture: any
2122@@ -210,9 +215,9 @@ Pre-Depends: ${misc:Pre-Depends}
2123 Depends: adduser,
2124 libstrongswan (= ${binary:Version}),
2125 sysvinit-utils (>= 3.05-3),
2126+ strongswan-charon,
2127 ${misc:Depends},
2128 ${shlibs:Depends}
2129-Recommends: strongswan-charon
2130 Conflicts: openswan
2131 Description: strongSwan daemon starter and configuration file parser
2132 The strongSwan VPN suite uses the native IPsec stack in the standard
2133@@ -251,9 +256,9 @@ Architecture: any
2134 Pre-Depends: debconf | debconf-2.0
2135 Depends: iproute2 [linux-any] | iproute [linux-any],
2136 libstrongswan (= ${binary:Version}),
2137- strongswan-starter,
2138 ${misc:Depends},
2139 ${shlibs:Depends}
2140+Recommends: strongswan-starter,
2141 Provides: ike-server
2142 Description: strongSwan Internet Key Exchange daemon
2143 The strongSwan VPN suite uses the native IPsec stack in the standard
2144diff --git a/debian/libcharon-extra-plugins.install b/debian/libcharon-extra-plugins.install
2145index 94fbabd..91ca716 100644
2146--- a/debian/libcharon-extra-plugins.install
2147+++ b/debian/libcharon-extra-plugins.install
2148@@ -2,9 +2,11 @@
2149 usr/lib/ipsec/plugins/libstrongswan-addrblock.so
2150 usr/lib/ipsec/plugins/libstrongswan-certexpire.so
2151 usr/lib/ipsec/plugins/libstrongswan-eap-aka.so
2152+usr/lib/ipsec/plugins/libstrongswan-eap-dynamic.so
2153 usr/lib/ipsec/plugins/libstrongswan-eap-gtc.so
2154 usr/lib/ipsec/plugins/libstrongswan-eap-identity.so
2155 usr/lib/ipsec/plugins/libstrongswan-eap-md5.so
2156+usr/lib/ipsec/plugins/libstrongswan-eap-peap.so
2157 usr/lib/ipsec/plugins/libstrongswan-eap-radius.so
2158 usr/lib/ipsec/plugins/libstrongswan-eap-tls.so
2159 usr/lib/ipsec/plugins/libstrongswan-eap-tnc.so
2160@@ -25,9 +27,11 @@ usr/lib/ipsec/plugins/libstrongswan-xauth-pam.so
2161 usr/share/strongswan/templates/config/plugins/addrblock.conf
2162 usr/share/strongswan/templates/config/plugins/certexpire.conf
2163 usr/share/strongswan/templates/config/plugins/eap-aka.conf
2164+usr/share/strongswan/templates/config/plugins/eap-dynamic.conf
2165 usr/share/strongswan/templates/config/plugins/eap-gtc.conf
2166 usr/share/strongswan/templates/config/plugins/eap-identity.conf
2167 usr/share/strongswan/templates/config/plugins/eap-md5.conf
2168+usr/share/strongswan/templates/config/plugins/eap-peap.conf
2169 usr/share/strongswan/templates/config/plugins/eap-radius.conf
2170 usr/share/strongswan/templates/config/plugins/eap-tls.conf
2171 usr/share/strongswan/templates/config/plugins/eap-tnc.conf
2172@@ -49,9 +53,11 @@ etc/strongswan.d/tnc.conf
2173 etc/strongswan.d/charon/addrblock.conf
2174 etc/strongswan.d/charon/certexpire.conf
2175 etc/strongswan.d/charon/eap-aka.conf
2176+etc/strongswan.d/charon/eap-dynamic.conf
2177 etc/strongswan.d/charon/eap-gtc.conf
2178 etc/strongswan.d/charon/eap-identity.conf
2179 etc/strongswan.d/charon/eap-md5.conf
2180+etc/strongswan.d/charon/eap-peap.conf
2181 etc/strongswan.d/charon/eap-radius.conf
2182 etc/strongswan.d/charon/eap-tls.conf
2183 etc/strongswan.d/charon/eap-tnc.conf
2184diff --git a/debian/libcharon-extra-plugins.maintscript b/debian/libcharon-extra-plugins.maintscript
2185new file mode 100644
2186index 0000000..f6e7a3a
2187--- /dev/null
2188+++ b/debian/libcharon-extra-plugins.maintscript
2189@@ -0,0 +1,8 @@
2190+rm_conffile /etc/strongswan.d/charon/eap-aka-3gpp2.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2191+rm_conffile /etc/strongswan.d/charon/eap-sim-file.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2192+rm_conffile /etc/strongswan.d/charon/eap-sim-pcsc.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2193+rm_conffile /etc/strongswan.d/charon/eap-sim.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2194+rm_conffile /etc/strongswan.d/charon/eap-simaka-pseudonym.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2195+rm_conffile /etc/strongswan.d/charon/eap-simaka-reauth.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2196+rm_conffile /etc/strongswan.d/charon/eap-simaka-sql.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2197+rm_conffile /etc/strongswan.d/charon/xauth-noauth.conf 5.8.4-1ubuntu2~ libcharon-extra-plugins
2198diff --git a/debian/libstrongswan-extra-plugins.install b/debian/libstrongswan-extra-plugins.install
2199index 2846e21..8f71239 100644
2200--- a/debian/libstrongswan-extra-plugins.install
2201+++ b/debian/libstrongswan-extra-plugins.install
2202@@ -9,6 +9,7 @@ usr/lib/ipsec/plugins/libstrongswan-curl.so
2203 usr/lib/ipsec/plugins/libstrongswan-curve25519.so
2204 usr/lib/ipsec/plugins/libstrongswan-gcrypt.so
2205 usr/lib/ipsec/plugins/libstrongswan-ldap.so
2206+usr/lib/ipsec/plugins/libstrongswan-ntru.so
2207 usr/lib/ipsec/plugins/libstrongswan-pkcs11.so
2208 usr/lib/ipsec/plugins/libstrongswan-test-vectors.so
2209 usr/lib/ipsec/plugins/libstrongswan-tpm.so
2210@@ -21,6 +22,7 @@ usr/share/strongswan/templates/config/plugins/curl.conf
2211 usr/share/strongswan/templates/config/plugins/curve25519.conf
2212 usr/share/strongswan/templates/config/plugins/gcrypt.conf
2213 usr/share/strongswan/templates/config/plugins/ldap.conf
2214+usr/share/strongswan/templates/config/plugins/ntru.conf
2215 usr/share/strongswan/templates/config/plugins/pkcs11.conf
2216 usr/share/strongswan/templates/config/plugins/test-vectors.conf
2217 usr/share/strongswan/templates/config/plugins/tpm.conf
2218@@ -32,6 +34,7 @@ etc/strongswan.d/charon/curl.conf
2219 etc/strongswan.d/charon/curve25519.conf
2220 etc/strongswan.d/charon/gcrypt.conf
2221 etc/strongswan.d/charon/ldap.conf
2222+etc/strongswan.d/charon/ntru.conf
2223 etc/strongswan.d/charon/pkcs11.conf
2224 etc/strongswan.d/charon/test-vectors.conf
2225 etc/strongswan.d/charon/tpm.conf
2226diff --git a/debian/rules b/debian/rules
2227index 14c7ca7..155946a 100755
2228--- a/debian/rules
2229+++ b/debian/rules
2230@@ -15,9 +15,11 @@ CONFIGUREARGS := --libdir=/usr/lib --libexecdir=/usr/lib \
2231 --enable-curl \
2232 --enable-eap-aka \
2233 --enable-eap-gtc \
2234+ --enable-eap-dynamic \
2235 --enable-eap-identity \
2236 --enable-eap-md5 \
2237 --enable-eap-mschapv2 \
2238+ --enable-eap-peap \
2239 --enable-eap-radius \
2240 --enable-eap-tls \
2241 --enable-eap-tnc \
2242@@ -32,6 +34,7 @@ CONFIGUREARGS := --libdir=/usr/lib --libexecdir=/usr/lib \
2243 --enable-led \
2244 --enable-lookip \
2245 --enable-mediation \
2246+ --enable-ntru \
2247 --enable-openssl \
2248 --enable-pkcs11 \
2249 --enable-test-vectors \
2250diff --git a/debian/tests/control b/debian/tests/control
2251index 997a870..3675f33 100644
2252--- a/debian/tests/control
2253+++ b/debian/tests/control
2254@@ -5,3 +5,9 @@ Restrictions: needs-root isolation-container allow-stderr
2255 Tests: daemon plugins
2256 Depends: strongswan-starter, libstrongswan-standard-plugins, libstrongswan-extra-plugins, libcharon-extra-plugins
2257 Restrictions: needs-root isolation-machine allow-stderr
2258+
2259+Tests: host-to-host
2260+Depends: strongswan-swanctl, strongswan-pki, libstrongswan-extra-plugins,
2261+ charon-systemd, lsb-release, snapd, dctrl-tools, libtss2-tcti-tabrmd0,
2262+ bind9-dnsutils
2263+Restrictions: needs-root isolation-machine allow-stderr skippable
2264diff --git a/debian/tests/host-to-host b/debian/tests/host-to-host
2265new file mode 100755
2266index 0000000..3a76da0
2267--- /dev/null
2268+++ b/debian/tests/host-to-host
2269@@ -0,0 +1,401 @@
2270+#!/bin/bash
2271+
2272+# host to host setup from https://docs.strongswan.org/docs/5.9/config/quickstart.html
2273+
2274+set -e
2275+set -o pipefail
2276+
2277+# exit early if not on Ubuntu
2278+if [ "$(lsb_release --short --id)" != "Ubuntu" ]; then
2279+ echo "This test only runs on Ubuntu, skipping."
2280+ exit 77
2281+fi
2282+
2283+cleanup() {
2284+ if [ $? -ne 0 ]; then
2285+ set +e
2286+ echo "Something failed, gathering debug info"
2287+ echo
2288+ echo "Installed strongswan packages:"
2289+ dpkg -l | grep -E "(strongswan|charon)"
2290+ echo
2291+ echo "loaded kernel modules:"
2292+ lsmod
2293+ echo
2294+ echo "journal logs from host:"
2295+ journalctl --no-pager -u strongswan.service || :
2296+ echo
2297+ echo "LXD details:"
2298+ lxc network list
2299+ lxc list
2300+ echo
2301+ for container in $(lxc list -f compact -c ns | grep -F RUNNING | awk '{print $1}'); do
2302+ echo "journal logs from container ${container}"
2303+ lxc exec "${container}" -- journalctl -u strongswan.service --no-pager || :
2304+ echo
2305+ echo "strongswan data from container ${container}"
2306+ for cmd in stats list-certs list-conns list-pols list-sas; do
2307+ echo "${cmd}:"
2308+ lxc exec "${container}" -- swanctl --${cmd} || :
2309+ echo
2310+ done
2311+ done
2312+ fi
2313+ set +e
2314+ rm -rf "${WORKDIR}"
2315+ for container in "${PEERS[@]}"; do
2316+ lxc delete --force "${container}" > /dev/null 2>&1 || :
2317+ done
2318+}
2319+
2320+trap cleanup EXIT
2321+
2322+WORKDIR=$(mktemp -d)
2323+PEERS=("moon" "sun")
2324+declare -A REMOTE
2325+REMOTE["moon"]="sun"
2326+REMOTE["sun"]="moon"
2327+PUBKEY_ALGO="ed25519"
2328+TESTNAME=$(basename "${0}")
2329+
2330+# ca
2331+CA_KEY_FILE="${WORKDIR}/strongswanKey.pem"
2332+REQ_FILE="${WORKDIR}/req.pem" # can be reused for multiple reqs
2333+CA_CERT_FILE="${WORKDIR}/strongswanCert.pem"
2334+
2335+source debian/tests/utils
2336+
2337+check_pol() {
2338+ #root@moon:~# swanctl --list-pols
2339+ #moon-sun/moon-sun, TUNNEL
2340+ # local: 10.38.71.14/32
2341+ # remote: 10.38.71.194/32
2342+ local me="${1}"
2343+ local pol="${2}"
2344+ local -i failures=0
2345+ local tunnel
2346+ local ip
2347+ local policy_ip
2348+
2349+ echo "Checking policy for:"
2350+ echo -n " we have a tunnel: "
2351+ if echo "${pol}" | head -n 1 | grep -qF TUNNEL; then
2352+ echo "OK"
2353+ else
2354+ echo "FAIL"
2355+ failures=$((failures+1))
2356+ fi
2357+
2358+ # moon-sun/moon-sun, TUNNEL -> tunnel = moon-sun
2359+ tunnel=$(echo "${pol}" | head -n 1 | cut -d , -f 1)
2360+ echo -n " tunnel matches local-remote: "
2361+ if echo "${tunnel}" | grep -qE "^${me}-${REMOTE[${me}]}/${me}-${REMOTE[${me}]}"; then
2362+ echo "OK"
2363+ else
2364+ echo "FAIL (tunnel=${tunnel})"
2365+ failures=$((failures+1))
2366+ fi
2367+
2368+ echo -n " local IP matches local peer: "
2369+ ip=$(lxc exec "${me}" -- dig +short "${me}.lxd")/32
2370+ policy_ip=$(echo "${pol}" | sed -n -r "s,^[[:blank:]]+local:[[:blank:]]+([0-9.]+/32),\1,p")
2371+ if [ "${ip}" = "${policy_ip}" ]; then
2372+ echo "OK"
2373+ else
2374+ echo "FAIL: local ip ${ip} != policy local ip ${policy_ip}"
2375+ failures=$((failures+1))
2376+ fi
2377+
2378+ echo -n " remote IP matches remote peer: "
2379+ ip=$(lxc exec "${me}" -- dig +short "${REMOTE[${me}]}.lxd")/32
2380+ policy_ip=$(echo "${pol}" | sed -n -r "s,^[[:blank:]]+remote:[[:blank:]]+([0-9.]+/32),\1,p")
2381+ if [ "${ip}" = "${policy_ip}" ]; then
2382+ echo "OK"
2383+ else
2384+ echo "FAIL: local ip ${ip} != policy local ip ${policy_ip}"
2385+ failures=$((failures+1))
2386+ fi
2387+
2388+ return ${failures}
2389+}
2390+
2391+check_sa() {
2392+ local -i failures=0
2393+ local me="${1}"
2394+ local sa="${2}"
2395+ local name=""
2396+ local sa_ip
2397+
2398+ # SAs look like this:
2399+ # moon-sun: #1, ESTABLISHED, IKEv2, f1bdc688a5078946_i* bf6e1559c5a87ab9_r
2400+ # local 'C=CH, O=strongswan, CN=moon.strongswan.org' @ 10.84.128.22[4500]
2401+ # remote 'C=CH, O=strongswan, CN=sun.strongswan.org' @ 10.84.128.191[4500]
2402+ # AES_CBC-128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519
2403+ # established 11s ago, rekeying in 14147s
2404+ # moon-sun: #2, reqid 1, INSTALLED, TUNNEL, ESP:AES_GCM_16-128
2405+ # installed 11s ago, rekeying in 3285s, expires in 3949s
2406+ # in c3bcdf8d, 168 bytes, 2 packets, 0s ago
2407+ # out caf49378, 168 bytes, 2 packets, 0s ago
2408+ # local 10.84.128.22/32
2409+ # remote 10.84.128.191/32
2410+
2411+ echo "Checking SA for:"
2412+
2413+ echo -n " established SA: "
2414+ if echo "${sa}" | grep -qE "^[[:alnum:]]+-[[:alnum:]]+:.*ESTABLISHED"; then
2415+ echo "OK"
2416+ else
2417+ echo "FAIL"
2418+ failures=$((failures+1))
2419+ fi
2420+
2421+ # parse the connection name from the first line: $local-$remote: #1,....
2422+ name=$(echo "${sa}" | head -n 1 | sed -r "s/^([[:alnum:]]+)-[[:alnum:]]+:.*/\1/")
2423+ echo -n " local DN matches CN=${name}.strongswan.org: "
2424+ if echo "${sa}" | grep -qE "^[[:blank:]]*local.*CN=${name}\.strongswan\.org"; then
2425+ echo "OK"
2426+ else
2427+ echo "FAIL"
2428+ failures=$((failures+1))
2429+ fi
2430+
2431+ # parse the connection name from the first line: $local-$remote: #1,....
2432+ name=$(echo "${sa}" | head -n 1 | sed -r "s/^[[:alnum:]]+-([[:alnum:]]+):.*/\1/")
2433+ echo -n " remote DN matches CN=${name}.strongswan.org: "
2434+ if echo "${sa}" | grep -qE "^[[:blank:]]*remote.*CN=${name}\.strongswan\.org"; then
2435+ echo "OK"
2436+ else
2437+ echo "FAIL"
2438+ failures=$((failures+1))
2439+ fi
2440+
2441+ echo -n " local IP matches local peer: "
2442+ ip=$(lxc exec "${me}" -- dig +short "${me}.lxd")/32
2443+ sa_ip=$(echo "${sa}" | sed -n -r "s,^[[:blank:]]+local[[:blank:]]+([0-9.]+/32),\1,p")
2444+ if [ "${ip}" = "${sa_ip}" ]; then
2445+ echo "OK"
2446+ else
2447+ echo "FAIL: local ip ${ip} != SA local ip ${sa_ip}"
2448+ failures=$((failures+1))
2449+ fi
2450+
2451+ echo -n " remote IP matches remote peer: "
2452+ ip=$(lxc exec "${me}" -- dig +short "${REMOTE[${me}]}.lxd")/32
2453+ sa_ip=$(echo "${sa}" | sed -n -r "s,^[[:blank:]]+remote[[:blank:]]+([0-9.]+/32),\1,p")
2454+ if [ "${ip}" = "${sa_ip}" ]; then
2455+ echo "OK"
2456+ else
2457+ echo "FAIL: remote ip ${ip} != SA remote ip ${sa_ip}"
2458+ failures=$((failures+1))
2459+ fi
2460+
2461+ # TODO: check for cipher, if it matches the algo used in the pubkey
2462+ # TODO: check for traffic, should not be zero
2463+
2464+ return ${failures}
2465+}
2466+
2467+_setup_peer() {
2468+ local peer="${1}"
2469+ local algo="${2}"
2470+ local key_file="${WORKDIR}/${peer}Key.pem"
2471+ local cert_file="${WORKDIR}/${peer}Cert.pem"
2472+
2473+ pki --gen --type "${algo}" --outform pem > "${key_file}"
2474+
2475+ pki --req --type priv --in "${key_file}" \
2476+ --dn "C=CH, O=strongswan, CN=${peer}.strongswan.org" \
2477+ --san "${peer}.strongswan.org" --outform pem > "${REQ_FILE}"
2478+
2479+ pki --issue --cacert "${CA_CERT_FILE}" --cakey "${CA_KEY_FILE}" \
2480+ --type pkcs10 --in "${REQ_FILE}" --serial 01 --lifetime 5 \
2481+ --outform pem --flag serverAuth > "${cert_file}"
2482+}
2483+
2484+_setup_lxd() {
2485+ lxd init --auto
2486+ network=$(lxc network list --format=compact | grep -E "bridge.*YES.*CREATED" | awk '{print $1}')
2487+ lxc network set "${network:-lxdbr0}" ipv6.address=none
2488+ if [ -n "${http_proxy}" ]; then
2489+ lxc config set core.proxy_http "${http_proxy}"
2490+ fi
2491+ if [ -n "${https_proxy}" ]; then
2492+ lxc config set core.proxy_https "${https_proxy}"
2493+ fi
2494+ if [ -n "${noproxy}" ]; then
2495+ lxc config set core.proxy_ignore_hosts "${noproxy}"
2496+ fi
2497+}
2498+
2499+_setup_host_containers() {
2500+ local release
2501+ local ip
2502+ local -i result=0
2503+ local -a deps
2504+
2505+ release=$(lsb_release -cs)
2506+ readarray -t deps < <(get_test_dependencies "${TESTNAME}" snapd dctrl-tools)
2507+
2508+ for container in "${PEERS[@]}"; do
2509+ echo "Launching container ${container} with release ${release}"
2510+ lxc launch "ubuntu-daily:${release}" "${container}" -c security.nesting=true -q
2511+ echo -en "Waiting for container ${container} to be ready "
2512+ wait_container_ready "${container}"
2513+
2514+ echo "Copying over /etc/apt to container ${container}"
2515+ lxc exec "${container}" -- rm -rf /etc/apt
2516+ lxc exec "${container}" -- mkdir -p /etc/apt
2517+ tar -cC /etc/apt . | lxc exec "${container}" -- tar -xC /etc/apt
2518+
2519+ echo "Installing deps in container ${container} (${deps[*]})"
2520+ output=$(lxc exec "${container}" -- apt-get update -q) || {
2521+ result=$?
2522+ echo "apt-get update failed in container ${container}"
2523+ echo "${output}"
2524+ return ${result}
2525+ }
2526+ output=$(lxc exec "${container}" --env DEBIAN_FRONTEND=noninteractive -- apt-get dist-upgrade -q -y) || {
2527+ result=$?
2528+ echo "apt-get dist-upgrade failed in container ${container}"
2529+ echo "${output}"
2530+ return ${result}
2531+ }
2532+ output=$(lxc exec "${container}" --env DEBIAN_FRONTEND=noninteractive -- apt-get install -q -y "${deps[@]}") || {
2533+ result=$?
2534+ echo "apt-get install ${deps[*]} failed in container ${container}"
2535+ echo "${output}"
2536+ return ${result}
2537+ }
2538+ echo "Done for container ${container}"
2539+ done
2540+}
2541+
2542+_setup_host_containers_certs() {
2543+ for container in "${PEERS[@]}"; do
2544+ echo "Copying ${CA_CERT_FILE} to container ${container}"
2545+ lxc file push "${CA_CERT_FILE}" "${container}/etc/swanctl/x509ca/"
2546+
2547+ echo "Copying ${container} cert and key"
2548+ lxc file push "${WORKDIR}/${container}Key.pem" "${container}/etc/swanctl/private/"
2549+ lxc file push "${WORKDIR}/${container}Cert.pem" "${container}/etc/swanctl/x509/"
2550+ done
2551+}
2552+
2553+_setup_host_containers_strongswan() {
2554+ local config
2555+
2556+ config=$(mktemp)
2557+
2558+ for peer in "${PEERS[@]}"; do
2559+ conn_name="${peer}-${REMOTE[${peer}]}"
2560+ cat > "${config}" <<EOF
2561+connections {
2562+ ${conn_name} {
2563+ remote_addrs = ${REMOTE[${peer}]}.lxd
2564+ local {
2565+ auth=pubkey
2566+ certs = ${peer}Cert.pem
2567+ }
2568+ remote {
2569+ auth = pubkey
2570+ id = "C=CH, O=strongswan, CN=${REMOTE[${peer}]}.strongswan.org"
2571+ }
2572+ children {
2573+ ${conn_name} {
2574+ start_action = trap
2575+ }
2576+ }
2577+ }
2578+}
2579+EOF
2580+ lxc file push "${config}" "${peer}/etc/swanctl/conf.d/${conn_name}.conf"
2581+ echo "Loading creds in container ${peer}"
2582+ lxc exec "${peer}" -- swanctl --load-creds
2583+ echo "Loading connections in container ${peer}"
2584+ lxc exec "${peer}" -- swanctl --load-conns
2585+ done
2586+}
2587+
2588+setup() {
2589+ local algo=${1:-ed25519}
2590+ echo "Creating a CA"
2591+ echo
2592+ echo "Generating private key for CA"
2593+ pki --gen --type "${algo}" --outform pem > "${CA_KEY_FILE}"
2594+
2595+ echo "Generating self-signed certificate for CA"
2596+ pki \
2597+ --self --ca --lifetime 10 --in "${CA_KEY_FILE}" \
2598+ --dn "C=CH, O=strongSwan, CN=strongSwan Root CA" \
2599+ --outform pem > "${CA_CERT_FILE}"
2600+ echo "Here is the CA cert:"
2601+ pki --print --in "${CA_CERT_FILE}"
2602+
2603+ for peer in "${PEERS[@]}"; do
2604+ echo "Generating key and certificate for peer ${peer}"
2605+ _setup_peer "${peer}" "${algo}"
2606+ done
2607+
2608+ echo "Setting up host LXD"
2609+ _setup_lxd
2610+
2611+ echo "Creating host containers"
2612+ _setup_host_containers
2613+
2614+ echo "Copy certificates to containers"
2615+ _setup_host_containers_certs
2616+
2617+ echo "Configuring strongswan in containers"
2618+ _setup_host_containers_strongswan
2619+}
2620+
2621+test_ping() {
2622+ for peer in "${PEERS[@]}"; do
2623+ echo "Generating traffic from ${peer} to ${REMOTE[${peer}]}"
2624+ # first ping to establish the tunnel always fails
2625+ lxc exec "${peer}" -- ping -c 2 -W 3 "${REMOTE[${peer}]}.lxd" > /dev/null 2>&1 || :
2626+ # this one must work
2627+ lxc exec "${peer}" -- ping -c 4 -W 3 "${REMOTE[${peer}]}.lxd"
2628+ echo
2629+ done
2630+}
2631+
2632+test_sa() {
2633+ for peer in "${PEERS[@]}"; do
2634+ sa=$(lxc exec "${peer}" -- swanctl --list-sas)
2635+ echo "This is the ${peer} SA:"
2636+ if [ -z "${sa}" ]; then
2637+ echo "FAILED: SA is empty (swanctl --list-sas)"
2638+ return 1
2639+ fi
2640+ echo "${sa}"
2641+ echo
2642+ check_sa "${peer}" "${sa}"
2643+ echo
2644+ done
2645+}
2646+
2647+test_pol() {
2648+ for peer in "${PEERS[@]}"; do
2649+ pol=$(lxc exec "${peer}" -- swanctl --list-pols)
2650+ echo "This is the ${peer} policy:"
2651+ if [ -z "${pol}" ]; then
2652+ echo "FAILED: pol is empty (swanctl --list-pols)"
2653+ return 1
2654+ fi
2655+ echo "${pol}"
2656+ echo
2657+ check_pol "${peer}" "${pol}"
2658+ echo
2659+ done
2660+}
2661+
2662+
2663+# the lxd deb package last existed in focal, so we install the snap
2664+snap list lxd > /dev/null 2>&1 || snap install lxd
2665+
2666+setup "${PUBKEY_ALGO}"
2667+
2668+test_ping
2669+test_sa
2670+test_pol
2671diff --git a/debian/tests/utils b/debian/tests/utils
2672new file mode 100644
2673index 0000000..e8a8584
2674--- /dev/null
2675+++ b/debian/tests/utils
2676@@ -0,0 +1,61 @@
2677+wait_container_ready() {
2678+ local container="${1}"
2679+ local -i limit=300 # seconds
2680+ local -i i=0
2681+ while /bin/true; do
2682+ ip=$(lxc list "${container}" -c 4 --format=compact | tail -1 | awk '{print $1}')
2683+ if [ -n "${ip}" ]; then
2684+ break
2685+ fi
2686+ i=$((i+1))
2687+ if [ ${i} -ge ${limit} ]; then
2688+ return 1
2689+ fi
2690+ sleep 1s
2691+ echo -n "."
2692+ done
2693+ while ! nc -z "${ip}" 22; do
2694+ echo -n "."
2695+ i=$((i+1))
2696+ if [ ${i} -ge ${limit} ]; then
2697+ return 1
2698+ fi
2699+ sleep 1s
2700+ done
2701+ # cloud-init might still be doing things...
2702+ # this call blocks, so wrap it in its own little timeout
2703+ # Give it ${limit} seconds too
2704+ output=$(lxc exec "${container}" -- timeout --verbose ${limit} cloud-init status --wait) || {
2705+ result=$?
2706+ echo "cloud-init status --wait failed on container ${container}"
2707+ echo "${output}"
2708+ return ${result}
2709+ }
2710+ echo
2711+}
2712+
2713+get_test_dependencies() {
2714+ local test_name="${1}"
2715+ shift
2716+ local exclusions="$*"
2717+ # Get test dependencies which we need to install in the containers
2718+ # we will create:
2719+ # -s: show Depends field
2720+ # -n: omit field name in output
2721+ # -X: do an exact match, instead of substring
2722+ # -F Tests: apply regexp to Tests field
2723+ depends=$(grep-dctrl -s Depends -n -F Tests -X "${test_name}" debian/tests/control | tr -d ,)
2724+ [ -n "${depends}" ] || {
2725+ echo "Failed to obtain list of dependencies for this test"
2726+ return 1
2727+ }
2728+ # remove exclusions, if any
2729+ for p in ${depends}; do
2730+ if echo "${exclusions}" | grep -qwF "${p}"; then
2731+ continue
2732+ else
2733+ echo "${p}"
2734+ fi
2735+ done
2736+}
2737+
2738diff --git a/debian/usr.sbin.swanctl b/debian/usr.sbin.swanctl
2739index 455c7cb..54c2b06 100644
2740--- a/debian/usr.sbin.swanctl
2741+++ b/debian/usr.sbin.swanctl
2742@@ -22,7 +22,7 @@
2743 /run/charon.vici rw,
2744
2745 # Allow reading own binary
2746- /usr/sbin/swanctl r,
2747+ /usr/sbin/swanctl rm,
2748
2749 # for af-alg plugin
2750 network alg seqpacket,

Subscribers

People subscribed via source and target branches