Merge ~paelzer/ubuntu/+source/strongswan:cosmic-merge-5.6.2-2 into ubuntu/+source/strongswan:debian/sid

Proposed by Christian Ehrhardt 
Status: Merged
Merge reported by: Christian Ehrhardt 
Merged at revision: 160ffc1245f6373f9875244a91b7a9d8e78d0957
Proposed branch: ~paelzer/ubuntu/+source/strongswan:cosmic-merge-5.6.2-2
Merge into: ubuntu/+source/strongswan:debian/sid
Diff against target: 2059 lines (+1537/-90)
18 files modified
debian/changelog (+1155/-0)
debian/control (+122/-6)
debian/ipsec.secrets.proto (+0/-3)
debian/libcharon-extra-plugins.install (+64/-12)
debian/libcharon-standard-plugins.install (+19/-0)
debian/libstrongswan-extra-plugins.install (+58/-0)
debian/libstrongswan.install (+11/-6)
debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch (+11/-0)
debian/patches/series (+1/-0)
debian/rules (+50/-6)
debian/strongswan-starter.install (+4/-0)
debian/strongswan-starter.postinst (+0/-57)
debian/strongswan-tnc-base.install (+16/-0)
debian/strongswan-tnc-client.install (+5/-0)
debian/strongswan-tnc-ifmap.install (+3/-0)
debian/strongswan-tnc-pdp.install (+3/-0)
debian/strongswan-tnc-server.install (+10/-0)
debian/usr.sbin.charon-systemd (+5/-0)
Reviewer Review Type Date Requested Status
Andreas Hasenack Approve
Canonical Server Pending
git-ubuntu developers Pending
Review via email: mp+347026@code.launchpad.net
To post a comment you must log in.
Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

From my log in the Bug:
Done - base Merge
Done - add planned bug fixes
Done - autopkgtests on Bileto https://bileto.ubuntu.com/excuses/3272/cosmic.html
Done - test with QA-Regression tests (two VMs doing tunnels)
Done - Test apparmor Denials that we expected to be fixed

I also pushed the related tags:
 * [new tag] lp1773814/deconstruct/5.6.2-1ubuntu1 -> lp1773814/deconstruct/5.6.2-1ubuntu1
 * [new tag] lp1773814/new/debian -> lp1773814/new/debian
 * [new tag] lp1773814/old/ubuntu -> lp1773814/old/ubuntu
 * [new tag] lp1773814/logical/5.6.2-1ubuntu1 -> lp1773814/logical/5.6.2-1ubuntu1
 * [new tag] lp1773814/old/debian -> lp1773814/old/debian
 * [new tag] lp1773814/reconstruct/5.6.2-1ubuntu1 -> lp1773814/reconstruct/5.6.2-1ubuntu1

With Tests complete I think this is ready for review to be uploaded.

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :
Revision history for this message
Simon Déziel (sdeziel) wrote :

> With Tests complete I think this is ready for review to be uploaded.

I didn't test the result but I took a quick look at your MP and it LGTM, thanks!

Revision history for this message
Andreas Hasenack (ahasenack) wrote :

Shouldn't the logical, deconstruct and reconstruct tags be pointing at 5.6.2-1ubuntu*2* instead of 5.6.2-1ubuntu1? 1ubuntu2 is the current package in cosmic.

I realize I will probably not finish this review today, and since I'm off the rest of the week, feel free to grab other volunteers :)

review: Needs Information
160ffc1... by Christian Ehrhardt 

changelog: DROP: fix dependencies of strongswan-libcharon

Signed-off-by: Christian Ehrhardt <email address hidden>

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

Hmm it seems git Ubuntu merge start tricked me on that and I didn't realize when checking old tags.
But this is rather safe, as the change of 5.6.2-1ubuntu2 is one that is droppable after 18.04.
Thanks for spotting this Andreas, I pushed a new entry to the changelog to correctly mention its dropping.

Revision history for this message
Andreas Hasenack (ahasenack) wrote :

cosmic dist upgrade works, upgrade from bionic works

git ubuntu lint is unhappy because of the incorrect tagging, but we can overlook that for this merge.

+1

review: Approve
Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

Thanks for the checks, tags pushed and uploading.

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/debian/changelog b/debian/changelog
2index 6dc4787..005f321 100644
3--- a/debian/changelog
4+++ b/debian/changelog
5@@ -1,3 +1,69 @@
6+strongswan (5.6.2-2ubuntu1) cosmic; urgency=medium
7+
8+ * Merge with Debian unstable, closes LP: #1773814 and LP: #1772705.
9+ Remaining changes:
10+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
11+ + Clean up d/strongswan-starter.postinst: Removed entire section on
12+ opportunistic encryption disabling - this was never in strongSwan and
13+ won't be see upstream issue #2160.
14+ + d/rules: Removed patching ipsec.conf on build (not using the
15+ debconf-managed config.)
16+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
17+ used for debconf-managed include of private key).
18+ + Mass enablement of extra plugins and features to allow a user to use
19+ strongswan for a variety of extra use cases without having to rebuild.
20+ - d/control: Add required additional build-deps
21+ - d/control: Mention addtionally enabled plugins
22+ - d/rules: Enable features at configure stage
23+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
24+ - d/libstrongswan.install: Add plugins (so, conf)
25+ + d/strongswan-starter.install: Install pool feature, which is useful since
26+ we have attr-sql plugin enabled as well using it.
27+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
28+ via this userspace implementation (please do note that this is still
29+ considered experimental by upstream).
30+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
31+ - d/control: List kernel-libipsec plugin at extra plugins description
32+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
33+ upstream recommends to not load kernel-libipsec by default.
34+ + Relocate tnc plugin
35+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
36+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
37+ + d/libstrongswan.install: Reorder conf and .so alphabetically
38+ + d/libstrongswan.install: Add kernel-netlink configuration files
39+ + Complete the disabling of libfast; This was partially accepted in Debian,
40+ it is no more packaging medcli and medsrv, but still builds and
41+ mentions it.
42+ - d/rules: Add --disable-fast to avoid build time and dependencies
43+ - d/control: Remove medcli, medsrv from package description
44+ + d/control: Mention mgf1 plugin which is in libstrongswan now
45+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
46+ libstrongswan-extra-plugins (no deps from default plugins).
47+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
48+ plugins for the most common use cases from extra-plugins into a new
49+ standard-plugins package. This will allow those use cases without pulling
50+ in too much more plugins (a bit like the tnc package). Recommend that
51+ package from strongswan-libcharon.
52+ * Dropped Changes (no more needed after 18.04)
53+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
54+ missed that, droppable after 18.04)
55+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
56+ libstrongswan as we dropped relocating ccm and test-vectors.
57+ (droppable >18.04).
58+ + d/control: add breaks/replace from libstrongswan to
59+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
60+ (droppable >18.04).
61+ + d/control: bump breaks/replaces for the move of the updown plugin
62+ (Missed Changelog entry on last merge)
63+ + d/control: fix dependencies of strongswan-libcharon due to the move
64+ the updown plugin (droppable >18.04).
65+ * Added Changes:
66+ + d/usr.sbin.charon-systemd: allow to contact mysql for sql and
67+ attr-sql plugins (LP: #1766240)
68+ + d/usr.sbin.charon-systemd: allow systemd notifications (LP: #1765652)
69+
70+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 29 May 2018 08:21:42 +0200
71+
72 strongswan (5.6.2-2) unstable; urgency=medium
73
74 * charon-nm: Fix building list of DNS/MDNS servers with libnm
75@@ -8,6 +74,74 @@ strongswan (5.6.2-2) unstable; urgency=medium
76
77 -- Yves-Alexis Perez <corsac@debian.org> Fri, 13 Apr 2018 13:46:04 +0200
78
79+strongswan (5.6.2-1ubuntu2) bionic; urgency=medium
80+
81+ * d/control: fix dependencies of strongswan-libcharon due to the move
82+ the updown plugin.
83+
84+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 20 Mar 2018 07:37:29 +0100
85+
86+strongswan (5.6.2-1ubuntu1) bionic; urgency=medium
87+
88+ * Merge with Debian unstable (LP: #1753018). Remaining changes:
89+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
90+ + Clean up d/strongswan-starter.postinst: Removed entire section on
91+ opportunistic encryption disabling - this was never in strongSwan and
92+ won't be see upstream issue #2160.
93+ + Ubuntu is not using the debconf triggered private key generation
94+ - d/rules: Removed patching ipsec.conf on build (not using the
95+ debconf-managed config.)
96+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
97+ used for debconf-managed include of private key).
98+ + Mass enablement of extra plugins and features to allow a user to use
99+ strongswan for a variety of extra use cases without having to rebuild.
100+ - d/control: Add required additional build-deps
101+ - d/control: Mention addtionally enabled plugins
102+ - d/rules: Enable features at configure stage
103+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
104+ - d/libstrongswan.install: Add plugins (so, conf)
105+ + d/strongswan-starter.install: Install pool feature, which is useful since
106+ we have attr-sql plugin enabled as well using it.
107+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
108+ via this userspace implementation (please do note that this is still
109+ considered experimental by upstream).
110+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
111+ - d/control: List kernel-libipsec plugin at extra plugins description
112+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
113+ upstream recommends to not load kernel-libipsec by default.
114+ + Relocate tnc plugin
115+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
116+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
117+ + d/libstrongswan.install: Reorder conf and .so alphabetically
118+ + d/libstrongswan.install: Add kernel-netlink configuration files
119+ + Complete the disabling of libfast; This was partially accepted in Debian,
120+ it is no more packaging medcli and medsrv, but still builds and
121+ mentions it.
122+ - d/rules: Add --disable-fast to avoid build time and dependencies
123+ - d/control: Remove medcli, medsrv from package description
124+ + d/control: Mention mgf1 plugin which is in libstrongswan now
125+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
126+ libstrongswan-extra-plugins (no deps from default plugins).
127+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
128+ missed that, droppable after 18.04)
129+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
130+ plugins for the most common use cases from extra-plugins into a new
131+ standard-plugins package. This will allow those use cases without pulling
132+ in too much more plugins (a bit like the tnc package). Recommend that
133+ package from strongswan-libcharon.
134+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
135+ libstrongswan as we dropped relocating ccm and test-vectors.
136+ (droppable >18.04).
137+ + d/control: add breaks/replace from libstrongswan to
138+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
139+ (droppable >18.04).
140+ * Added Changes:
141+ + d/control: bump breaks/replaces from strongswan-libcharon to strongswan-
142+ starter as we followed Debian to move the updown plugin but need to
143+ match Ubuntu versions (Droppable >18.04).
144+
145+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Fri, 16 Mar 2018 11:08:47 +0100
146+
147 strongswan (5.6.2-1) unstable; urgency=medium
148
149 * d/NEWS: add information about disabled algorithms (closes: #883072)
150@@ -30,6 +164,129 @@ strongswan (5.6.1-3) unstable; urgency=medium
151
152 -- Yves-Alexis Perez <corsac@debian.org> Sun, 17 Dec 2017 16:40:39 +0100
153
154+strongswan (5.6.1-2ubuntu4) bionic; urgency=medium
155+
156+ * SECURITY UPDATE: DoS via crafted RSASSA-PSS signature
157+ - debian/patches/CVE-2018-6459.patch: Properly handle MGF1 algorithm
158+ identifier without parameters in
159+ src/libstrongswan/credentials/keys/signature_params.c.
160+ - CVE-2018-6459
161+
162+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 07 Mar 2018 14:52:02 +0100
163+
164+strongswan (5.6.1-2ubuntu3) bionic; urgency=medium
165+
166+ * No-change rebuild against libcurl4
167+
168+ -- Steve Langasek <steve.langasek@ubuntu.com> Wed, 28 Feb 2018 08:52:09 +0000
169+
170+strongswan (5.6.1-2ubuntu2) bionic; urgency=high
171+
172+ * No change rebuild against openssl1.1.
173+
174+ -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 12 Feb 2018 16:00:24 +0000
175+
176+strongswan (5.6.1-2ubuntu1) bionic; urgency=medium
177+
178+ * Merge with Debian unstable (LP: #1717343).
179+ Also fixes and issue with multiple psk's (LP: #1734207). Remaining changes:
180+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
181+ + Clean up d/strongswan-starter.postinst: Removed entire section on
182+ opportunistic encryption disabling - this was never in strongSwan and
183+ won't be see upstream issue #2160.
184+ + Ubuntu is not using the debconf triggered private key generation
185+ - d/rules: Removed patching ipsec.conf on build (not using the
186+ debconf-managed config.)
187+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
188+ used for debconf-managed include of private key).
189+ + Mass enablement of extra plugins and features to allow a user to use
190+ strongswan for a variety of extra use cases without having to rebuild.
191+ - d/control: Add required additional build-deps
192+ - d/control: Mention addtionally enabled plugins
193+ - d/rules: Enable features at configure stage
194+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
195+ - d/libstrongswan.install: Add plugins (so, conf)
196+ + d/strongswan-starter.install: Install pool feature, which is useful since
197+ we have attr-sql plugin enabled as well using it.
198+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
199+ via this userspace implementation (please do note that this is still
200+ considered experimental by upstream).
201+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
202+ - d/control: List kernel-libipsec plugin at extra plugins description
203+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
204+ upstream recommends to not load kernel-libipsec by default.
205+ + Relocate tnc plugin
206+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
207+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
208+ + d/libstrongswan.install: Reorder conf and .so alphabetically
209+ + d/libstrongswan.install: Add kernel-netlink configuration files
210+ + Complete the disabling of libfast; This was partially accepted in Debian,
211+ it is no more packaging medcli and medsrv, but still builds and
212+ mentions it.
213+ - d/rules: Add --disable-fast to avoid build time and dependencies
214+ - d/control: Remove medcli, medsrv from package description
215+ + d/control: Mention mgf1 plugin which is in libstrongswan now
216+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
217+ libstrongswan-extra-plugins (no deps from default plugins).
218+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
219+ missed that, droppable after 18.04)
220+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
221+ plugins for the most common use cases from extra-plugins into a new
222+ standard-plugins package. This will allow those use cases without pulling
223+ in too much more plugins (a bit like the tnc package). Recommend that
224+ package from strongswan-libcharon.
225+ * Added changes:
226+ + d/strongswan-tnc-client.install (relocate tnc) swidtag creation changed
227+ in 5.6
228+ + d/strongswan-tnc-server.install (relocate tnc) pacman no more needed
229+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
230+ libstrongswan as we dropped relocating ccm and test-vectors.
231+ (droppable >18.04).
232+ - d/control: add breaks/replace from libstrongswan to
233+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
234+ (droppable >18.04).
235+ * Dropped changes:
236+ + Update init/service handling (debian default matches Ubuntu past now)
237+ Dropping this fixes (LP: #1734886)
238+ - d/rules: Change init/systemd program name to strongswan
239+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
240+ patching upstream
241+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
242+ linking to upstream
243+ + d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call
244+ (this is a never failing no-op for us, no need for Delta).
245+ + d/strongswan-starter.prerm: Stop strongswan service on package removal
246+ (ipsec now maps to strongswan service, so this works as-is).
247+ + Clean up d/strongswan-starter.postinst: rename service ipsec to
248+ strongswan (ipsec now maps to strongswan service, so this works as-is)
249+ + Clean up d/strongswan-starter.postinst: daemon enable/disable (the
250+ whole section is disabled, so no need for delta)
251+ + (is upstream) CVE-2017-11185 patches
252+ + (is upstream) FTBFS upstream fix for changed include files
253+ + (is upstream) debian/patches/increase-bliss-test-timeout.patch: Under
254+ QEMU/KVM autopkgtest the bliss test takes longer than the default
255+ + (in Debian) add now built (since 5.5.1) mgf1 plugin to
256+ libstrongswan-extra-plugins.
257+ + (in Debian) d/strongswan-starter.install: install stroke apparmor profile
258+ + (this was enabled as part of the former delta, squash changes to no-up)
259+ d/rules: Disable duplicheck.
260+ + (not needed) Relocate plugins test-vectors from extra-plugins to
261+ libstrongswan
262+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
263+ - d/libstrongswan.install: Add plugins/confiles
264+ - d/control: move package descriptions and add required breaks/replaces
265+ + (not needed) Relocate plugins ccm from extra-plugins to libstrongswan
266+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
267+ - d/libstrongswan.install: Add plugins/confiles
268+ - d/control: move package descriptions and add required breaks/replaces
269+ + (while using it requires special kernel, it does not hurt to be
270+ available in the package) Remove ha plugin
271+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
272+ - d/rules: Do not enable ha plugin
273+ - d/control: Drop listing the ha plugin in the package description
274+
275+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 29 Nov 2017 15:55:18 +0100
276+
277 strongswan (5.6.1-2) unstable; urgency=medium
278
279 * move counters plugin from -starter to -libcharon. closes: #882431
280@@ -116,6 +373,213 @@ strongswan (5.5.2-1) experimental; urgency=medium
281
282 -- Yves-Alexis Perez <corsac@debian.org> Fri, 19 May 2017 11:32:00 +0200
283
284+strongswan (5.5.1-4ubuntu3) bionic; urgency=medium
285+
286+ * Fix Artful FTBFS due to newer glibc (LP: #1724859)
287+ - d/p/utils-Include-stdint.h.patch: upstream fix for changed include
288+ files.
289+
290+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 19 Oct 2017 15:18:52 +0200
291+
292+strongswan (5.5.1-4ubuntu2) artful; urgency=medium
293+
294+ * SECURITY UPDATE: Fix RSA signature verification
295+ - debian/patches/CVE-2017-11185.patch: does some
296+ verifications in order to avoid null-point dereference
297+ in src/libstrongswan/gmp/gmp_rsa_public_key.c
298+ - CVE-2017-11185
299+
300+ -- Leonidas S. Barbosa <leo.barbosa@canonical.com> Tue, 15 Aug 2017 14:49:49 -0300
301+
302+strongswan (5.5.1-4ubuntu1) artful; urgency=medium
303+
304+ * Merge from Debian to pick up latest security changes (CVE-2017-9022,
305+ CVE-2017-9023).
306+ * Remaining Changes:
307+ + Update init/service handling
308+ - d/rules: Change init/systemd program name to strongswan
309+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
310+ patching upstream
311+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
312+ linking to upstream
313+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
314+ - d/strongswan-starter.prerm: Stop strongswan service on package
315+ removal (as opposed to using the old init.d script).
316+ + Clean up d/strongswan-starter.postinst:
317+ - Removed section about runlevel changes
318+ - Adapted service restart section for Upstart (kept to be Trusty
319+ backportable).
320+ - Remove old symlinks to init.d files is necessary.
321+ - Removed further out-dated code
322+ - Removed entire section on opportunistic encryption - this was never in
323+ strongSwan.
324+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
325+ + Mass enablement of extra plugins and features to allow a user to use
326+ strongswan for a variety of use cases without having to rebuild.
327+ - d/control: Add required additional build-deps
328+ - d/rules: Enable features at configure stage
329+ - d/control: Mention addtionally enabled plugins
330+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
331+ - d/libstrongswan.install: Add plugins (so, conf)
332+ + d/rules: Disable duplicheck as per
333+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
334+ + Remove ha plugin (requires special kernel)
335+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
336+ - d/rules: Do not enable ha plugin
337+ - d/control: Drop listing the ha plugin in the package description
338+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
339+ via this userspace implementation (please do note that this is still
340+ considered experimental by upstream).
341+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
342+ - d/control: List kernel-libipsec plugin at extra plugins description
343+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
344+ upstream recommends to not load kernel-libipsec by default.
345+ + Relocate tnc plugin
346+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
347+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
348+ + d/strongswan-starter.install: Install pool feature, that useful due to
349+ having attr-sql plugin that is enabled now.
350+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
351+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
352+ - d/libstrongswan.install: Add plugins/confiles
353+ - d/control: move package descriptions and add required breaks/replaces
354+ + d/libstrongswan.install: Reorder conf and .so alphabetically
355+ + d/libstrongswan.install: Add kernel-netlink configuration files
356+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
357+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
358+ autopkgtest the bliss test takes longer than the default (Upstream in
359+ 5.5.2 via issue 2204)
360+ + Complete the disabling of libfast; This was partially accepted in Debian,
361+ it is no more packaging medcli and medsrv, but still builds and
362+ mentions it.
363+ - d/rules: Add --disable-fast to avoid build time and dependencies
364+ - d/control: Remove medcli, medsrv from package description
365+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
366+ "only" to extra-plugins Mgf1 is not listed as default plugin at
367+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
368+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
369+ libstrongswan-extra-plugins.
370+ + Add missing mention of md4 plugin in d/control
371+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
372+ missed that)
373+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
374+ plugins for the most common use cases from extra-plugins into a new
375+ standard-plugins package. This will allow those use cases without pulling
376+ in too much more plugins (a bit like the tnc package). Recommend that
377+ package from strongswan-libcharon.
378+
379+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 31 May 2017 15:57:54 +0200
380+
381+strongswan (5.5.1-3ubuntu1) artful; urgency=medium
382+
383+ * Merge from Debian to pick up latest changes. Among others this includes:
384+ - a lot of the Delta we upstreamed to Debian (more discussions are ongoing
385+ but likely have to wait until Debian stretch was released)
386+ - enabling mediation support (LP: #1657413)
387+ * Remaining Changes:
388+ + Update init/service handling
389+ - d/rules: Change init/systemd program name to strongswan
390+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
391+ patching upstream
392+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
393+ linking to upstream
394+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
395+ - d/strongswan-starter.prerm: Stop strongswan service on package
396+ removal (as opposed to using the old init.d script).
397+ + Clean up d/strongswan-starter.postinst:
398+ - Removed section about runlevel changes
399+ - Adapted service restart section for Upstart (kept to be Trusty
400+ backportable).
401+ - Remove old symlinks to init.d files is necessary.
402+ - Removed further out-dated code
403+ - Removed entire section on opportunistic encryption - this was never in
404+ strongSwan.
405+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
406+ + Mass enablement of extra plugins and features to allow a user to use
407+ strongswan for a variety of use cases without having to rebuild.
408+ - d/control: Add required additional build-deps
409+ - d/rules: Enable features at configure stage
410+ - d/control: Mention addtionally enabled plugins
411+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
412+ - d/libstrongswan.install: Add plugins (so, conf)
413+ + d/rules: Disable duplicheck as per
414+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
415+ + Remove ha plugin (requires special kernel)
416+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
417+ - d/rules: Do not enable ha plugin
418+ - d/control: Drop listing the ha plugin in the package description
419+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
420+ via this userspace implementation (please do note that this is still
421+ considered experimental by upstream).
422+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
423+ - d/control: List kernel-libipsec plugin at extra plugins description
424+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
425+ upstream recommends to not load kernel-libipsec by default.
426+ + Relocate tnc plugin
427+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
428+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
429+ + d/strongswan-starter.install: Install pool feature, that useful due to
430+ having attr-sql plugin that is enabled now.
431+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
432+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
433+ - d/libstrongswan.install: Add plugins/confiles
434+ - d/control: move package descriptions and add required breaks/replaces
435+ + d/libstrongswan.install: Reorder conf and .so alphabetically
436+ + d/libstrongswan.install: Add kernel-netlink configuration files
437+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
438+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
439+ autopkgtest the bliss test takes longer than the default (Upstream in
440+ 5.5.2 via issue 2204)
441+ + Complete the disabling of libfast; This was partially accepted in Debian,
442+ it is no more packaging medcli and medsrv, but still builds and
443+ mentions it.
444+ - d/rules: Add --disable-fast to avoid build time and dependencies
445+ - d/control: Remove medcli, medsrv from package description
446+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
447+ "only" to extra-plugins Mgf1 is not listed as default plugin at
448+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
449+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
450+ libstrongswan-extra-plugins.
451+ + Add missing mention of md4 plugin in d/control
452+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
453+ missed that)
454+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
455+ plugins for the most common use cases from extra-plugins into a new
456+ standard-plugins package. This will allow those use cases without pulling
457+ in too much more plugins (a bit like the tnc package). Recommend that
458+ package from strongswan-libcharon.
459+ * Dropped Changes:
460+ + Add and install apparmor profiles (in Debian)
461+ - d/rules: Install AppArmor profiles
462+ - d/control: Add dh-apparmor build-dep
463+ - d/usr.lib.ipsec.{charon, lookip, stroke}: Add latest AppArmor profiles
464+ for charon, lookip and stroke
465+ - d/libcharon-extra-plugins.install: Install profile for lookip
466+ - d/strongswan-charon.install: Install profile for charon
467+ - d/strongswan-starter.install: Install profile for stroke
468+ - Fix strongswan ipsec status issue with apparmor
469+ - Fix Dep8 tests for the now extra strongswan-pki package for pki
470+ - Fix Dep8 tests for the now extra strongswan-scepclient package
471+ + d/rules: Sorted and only one enable option per configure line (in
472+ Debian)
473+ + Add updated logcheck rules (in Debian)
474+ - debian/libstrongswan.strongswan.logcheck.*: Remove outdated files
475+ - debian/strongswan.logcheck: Add updated logcheck rules
476+ + Add updated DEP8 tests (in Debian)
477+ - d/tests/*: Add DEP8 tests
478+ - d/control: Enable autotestpkg
479+ + d/rules: do not strip for library integrity checking (After Discussion
480+ with Debian this isn't acceptable there, but at the same time it turned
481+ out the real use-case of this never uses this lib but instead third
482+ party checks of checksums for e.g. FIPS cert; so drop the Delta)
483+ - Use override_dh_strip to to avoid overwriting user build flags.
484+ - Add missing mention of libchecksum integrity test in d/control
485+ + d/rules: Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths
486+ in tests to avoid issues in low entropy environments. (Debian has
487+ disabled !x86 tests for the same reason, one solution is enough)
488+
489+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 04 May 2017 14:06:23 +0200
490+
491 strongswan (5.5.1-3) unstable; urgency=medium
492
493 [ Christian Ehrhardt ]
494@@ -149,6 +613,136 @@ strongswan (5.5.1-2) unstable; urgency=medium
495
496 -- Yves-Alexis Perez <corsac@debian.org> Wed, 07 Dec 2016 08:34:52 +0100
497
498+strongswan (5.5.1-1ubuntu2) zesty; urgency=medium
499+
500+ * Update Maintainers which was missed while merging 5.5.1-1.
501+
502+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 19 Dec 2016 16:02:40 +0100
503+
504+strongswan (5.5.1-1ubuntu1) zesty; urgency=medium
505+
506+ * Merge from Debian (complex delta, discussions and broken out changes can be
507+ found in the merge proposal linked from the merge bug LP: #1631198)
508+ * Remaining Changes:
509+ + d/rules: Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity
510+ checking.
511+ + d/rules: Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths
512+ in tests to avoid issues in low entropy environments.
513+ + Update init/service handling
514+ - d/rules: Change init/systemd program name to strongswan
515+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
516+ patching upstream
517+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
518+ linking to upstream
519+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
520+ - d/strongswan-starter.prerm: Stop strongswan service on package
521+ removal (as opposed to using the old init.d script).
522+ + Clean up d/strongswan-starter.postinst:
523+ - Removed section about runlevel changes
524+ - Adapted service restart section for Upstart (kept to be Trusty
525+ backportable).
526+ - Remove old symlinks to init.d files is necessary.
527+ - Removed further out-dated code
528+ - Removed entire section on opportunistic encryption - this was never in
529+ strongSwan.
530+ + Add and install apparmor profiles
531+ - d/rules: Install AppArmor profiles
532+ - d/control: Add dh-apparmor build-dep
533+ - d/usr.lib.ipsec.{charon, lookip, stroke}: Add latest AppArmor profiles
534+ for charon, lookip and stroke
535+ - d/libcharon-extra-plugins.install: Install profile for lookip
536+ - d/strongswan-charon.install: Install profile for charon
537+ - d/strongswan-starter.install: Install profile for stroke
538+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
539+ + d/rules: Sorted and only one enable option per configure line
540+ + Mass enablement of extra plugins and features to allow a user to use
541+ strongswan for a variety of use cases without having to rebuild.
542+ - d/control: Add required additional build-deps
543+ - d/rules: Enable features at configure stage
544+ - d/control: Mention addtionally enabled plugins
545+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
546+ - d/libstrongswan.install: Add plugins (so, conf)
547+ + d/rules: Disable duplicheck as per
548+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
549+ + Remove ha plugin (requires special kernel)
550+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
551+ - d/rules: Do not enable ha plugin
552+ - d/control: Drop listing the ha plugin in the package description
553+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
554+ via this userspace implementation (please do note that this is still
555+ considered experimental by upstream).
556+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
557+ - d/control: List kernel-libipsec plugin at extra plugins description
558+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
559+ upstream recommends to not load kernel-libipsec by default.
560+ + Relocate tnc plugin
561+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
562+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
563+ + d/strongswan-starter.install: Install pool feature, that useful due to
564+ having attr-sql plugin that is enabled now.
565+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
566+ - d/libstrongswan-extra-plugins.install: Remove plugins
567+ - d/libstrongswan.install: Add plugins
568+ + d/libstrongswan.install: Reorder conf and .so alphabetically
569+ + d/libstrongswan.install: Add kernel-netlink configuration files
570+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
571+ + Add updated logcheck rules
572+ - debian/libstrongswan.strongswan.logcheck.*: Remove outdated files
573+ - debian/strongswan.logcheck: Add updated logcheck rules
574+ + Add updated DEP8 tests
575+ - d/tests/*: Add DEP8 tests
576+ - d/control: Enable autotestpkg
577+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
578+ autopkgtest the bliss test takes longer than the default
579+ + Complete the disabling of libfast
580+ - Note: This was partially accepted in Debian, it is no more
581+ packaging medcli and medsrv, but still builds and mentions it
582+ - d/rules: Add --disable-fast to avoid build time and dependencies
583+ - d/control: Remove medcli, medsrv from package description
584+ * Dropped Changes:
585+ + Adding build-dep to iptables-dev (no change, was only in Changelog)
586+ + Dropping of build deps libfcgi-dev, clearsilver-dev (in Debian)
587+ + Adding strongswan-plugin-* virtual packages for dist-upgrade (no
588+ upgrade path left needing them)
589+ + Most of "disabling libfast" (Debian dropped it from package content)
590+ + Transition for ipsec service (no upgrade path left)
591+ + Reverted part of the cleanup to d/strongswan-starter.postinst as using
592+ service should rather use invoke-rc.d (so it is a partial revert of our
593+ delta)
594+ + Transition handling (breaks/replaces) from per-plugin packages to the
595+ three grouped plugin packages (no upgrade path left)
596+ + debian/strongswan-starter.dirs: Don't touch /etc/init.d. (while "correct"
597+ it is effectively a no-op still, so not worth the delta)
598+ + Lower dpkg-dev to 1.16.1 from 1.16.2 to enable backporting to Precise
599+ (no more needed)
600+ + d/rules: Remove configure option --enable-unit-test (unit tests run by
601+ default)
602+ * Added Changes:
603+ + Fix strongswan ipsec status issue with apparmor (LP: #1587886)
604+ + d/control, d/libstrongswan.install, d/libstrongswan-extra-plugins: Fixup
605+ the relocation of the ccm plugin which missed to move the conffiles.
606+ + Complete move of test-vectors (was missing in d/control)
607+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
608+ "only" to extra-plugins Mgf1 is not listed as default plugin at
609+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
610+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
611+ libstrongswan-extra-plugins.
612+ + Add missing mention of md4 plugin in d/control
613+ + Add missing mention of libchecksum integrity test in d/control
614+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
615+ missed that)
616+ + Use override_dh_strip to to fix library integrity checking instead of
617+ DEB_BUILD_OPTION to avoid overwriting user build flags.
618+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
619+ plugins for the most common use cases from extra-plugins into a new
620+ standard-plugins package. This will allow those use cases without pulling
621+ in too much more plugins (a bit like the tnc package). Recommend that
622+ package from strongswan-libcharon (LP: #1640826).
623+ + Fix Dep8 tests for the now extra strongswan-pki package for pki
624+ + Fix Dep8 tests for the now extra strongswan-scepclient package
625+
626+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 07 Nov 2016 16:16:41 +0100
627+
628 strongswan (5.5.1-1) unstable; urgency=medium
629
630 * New upstream bugfix release.
631@@ -265,6 +859,177 @@ strongswan (5.3.5-2) unstable; urgency=medium
632
633 -- Yves-Alexis Perez <corsac@debian.org> Mon, 14 Mar 2016 23:53:34 +0100
634
635+strongswan (5.3.5-1ubuntu4) yakkety; urgency=medium
636+
637+ * Build-depend on libjson-c-dev instead of libjson0-dev.
638+ * Rebuild against libjson-c3.
639+
640+ -- Graham Inggs <ginggs@ubuntu.com> Fri, 29 Apr 2016 19:04:22 +0200
641+
642+strongswan (5.3.5-1ubuntu3) xenial; urgency=medium
643+
644+ * Rebuild against libmysqlclient20.
645+
646+ -- Robie Basak <robie.basak@ubuntu.com> Tue, 05 Apr 2016 13:02:48 +0000
647+
648+strongswan (5.3.5-1ubuntu2) xenial; urgency=medium
649+
650+ * debian/tests/plugins: rdrand may or may not be loaded, depending on the
651+ cpu features.
652+
653+ -- Iain Lane <iain@orangesquash.org.uk> Mon, 22 Feb 2016 17:13:01 +0000
654+
655+strongswan (5.3.5-1ubuntu1) xenial; urgency=medium
656+
657+ * debian/{rules,control,libstrongswan-extra-plugins.install}
658+ Enable bliss plugin
659+ * debian/{rules,control,libstrongswan-extra-plugins.install}
660+ Enable chapoly plugin
661+ * debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch
662+ Upstream suggests to not load this plugin by default as it has
663+ some limitations.
664+ https://wiki.strongswan.org/projects/strongswan/wiki/Kernel-libipsec
665+ * debian/patches/increase-bliss-test-timeout.patch
666+ Under QEMU/KVM for autopkgtest bliss test takes a bit longer then default
667+ * Update Apparmor profiles
668+ - usr.lib.ipsec.charon
669+ - add capability audit_write for xauth-pam (LP: #1470277)
670+ - add capability dac_override (needed by agent plugin)
671+ - allow priv dropping (LP: #1333655)
672+ - allow caching CRLs (LP: #1505222)
673+ - allow rw access to /dev/net/tun for kernel-libipsec (LP: #1309594)
674+ - usr.lib.ipsec.stroke
675+ - allow priv dropping (LP: #1333655)
676+ - add local include
677+ - usr.lib.ipsec.lookip
678+ - add local include
679+ * Merge from Debian, which includes fixes for all previous CVEs
680+ Fixes (LP: #1330504, #1451091, #1448870, #1470277)
681+ Remaining changes:
682+ * debian/control
683+ - Lower dpkg-dev to 1.16.1 from 1.16.2 to enable backporting to Precise
684+ - Update Maintainer for Ubuntu
685+ - Add build-deps
686+ - dh-apparmor
687+ - iptables-dev
688+ - libjson0-dev
689+ - libldns-dev
690+ - libmysqlclient-dev
691+ - libpcsclite-dev
692+ - libsoup2.4-dev
693+ - libtspi-dev
694+ - libunbound-dev
695+ - Drop build-deps
696+ - libfcgi-dev
697+ - clearsilver-dev
698+ - Create virtual packages for all strongswan-plugin-* for dist-upgrade
699+ - Set XS-Testsuite: autopkgtest
700+ * debian/rules:
701+ - Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity checking.
702+ - Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths in
703+ tests.
704+ - Change init/systemd program name to strongswan
705+ - Install AppArmor profiles
706+ - Removed pieces on 'patching ipsec.conf' on build.
707+ - Enablement of features per Ubuntu current config suggested from
708+ upstream recommendation
709+ - Unpack and sort enabled features to one-per-line
710+ - Disable duplicheck as per
711+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
712+ - Disable libfast (--disable-fast):
713+ Requires dropping medsrv, medcli plugins which depend on libfast
714+ - Add configure options
715+ --with-tss=trousers
716+ - Remove configure options:
717+ --enable-ha (requires special kernel)
718+ --enable-unit-test (unit tests run by default)
719+ - Drop logcheck install
720+ * debian/tests/*
721+ - Add DEP8 test for strongswan service and plugins
722+ * debian/strongswan-starter.strongswan.service
723+ - Add new systemd file instead of patching upstream
724+ * debian/strongswan-starter.links
725+ - removed, use Ubuntu systemd file instead of linking to upstream
726+ * debian/usr.lib.ipsec.{charon, lookip, stroke}
727+ - added AppArmor profiles for charon, lookip and stroke
728+ * debian/libcharon-extra-plugins.install
729+ - Add plugins
730+ - kernel-libipsec.{so, lib, conf, apparmor}
731+ - Remove plugins
732+ - libstrongswan-ha.so
733+ - Relocate plugins
734+ - libstrongswan-tnc-tnccs.so (strongswan-tnc-base.install)
735+ * debian/libstrongswan-extra-plugins.install
736+ - Add plugins (so, lib, conf)
737+ - acert
738+ - attr-sql
739+ - coupling
740+ - dnscert
741+ - fips-prf
742+ - gmp
743+ - ipseckey
744+ - load-tester
745+ - mysql
746+ - ntru
747+ - radattr
748+ - soup
749+ - sqlite
750+ - sql
751+ - systime-fix
752+ - unbound
753+ - whitelist
754+ - Relocate plugins (so, lib, conf)
755+ - ccm (libstrongswan.install)
756+ - test-vectors (libstrongswan.install)
757+ * debian/libstrongswan.install
758+ - Sort sections
759+ - Add plugins (so, lib, conf)
760+ - libchecksum
761+ - ccm
762+ - eap-identity
763+ - md4
764+ - test-vectors
765+ * debian/strongswan-charon.install
766+ - Add AppArmor profile for charon
767+ * debian/strongswan-starter.install
768+ - Add tools, manpages, conf
769+ - openac
770+ - pool
771+ - _updown_espmark
772+ - Add AppArmor profile for stroke
773+ * debian/strongswan-tnc-base.install
774+ - Add new subpackage for TNC
775+ - remove non-existent (dropped in 5.2.1) libpts library files
776+ * debian/strongswan-tnc-client.install
777+ - Add new subpackage for TNC
778+ * debian/strongswan-tnc-ifmap.install
779+ - Add new subpackage for TNC
780+ * debian/strongswan-tnc-pdp.install
781+ - Add new subpackage for TNC
782+ * debian/strongswan-tnc-server.install
783+ - Add new subpackage for TNC
784+ * debian/strongswan-starter.postinit:
785+ - Removed section about runlevel changes, it's almost 2014.
786+ - Adapted service restart section for Upstart.
787+ - Remove old symlinks to init.d files is necessary.
788+ * debian/strongswan-starter.dirs: Don't touch /etc/init.d.
789+ * debian/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
790+ * debian/strongswan-starter.prerm: Stop strongswan service on package
791+ removal (as opposed to using the old init.d script).
792+ * debian/libstrongswan.strongswan.logcheck combined into debian/strongswan.logcheck
793+ - logcheck patterns updated to be helpful
794+ * debian/strongswan-starter.postinst: Removed further out-dated code and
795+ entire section on opportunistic encryption - this was never in strongSwan.
796+ * debian/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
797+ Drop changes:
798+ * debian/control
799+ - Per-plugin package breakup: Reducing packaging delta from Debian
800+ - Don't build dhcp, farp subpackages: Reduce packging delta from Debian
801+ * debian/watch: Already exists in Debian merge
802+ * debian/upstream/signing-key.asc: Upstream has newer version.
803+
804+ -- Ryan Harper <ryan.harper@canonical.com> Fri, 12 Feb 2016 11:24:53 -0600
805+
806 strongswan (5.3.5-1) unstable; urgency=medium
807
808 * New upstream bugfix release.
809@@ -537,6 +1302,210 @@ strongswan (5.1.2-1) unstable; urgency=medium
810
811 -- Yves-Alexis Perez <corsac@debian.org> Wed, 12 Mar 2014 11:22:38 +0100
812
813+strongswan (5.1.2-0ubuntu8) xenial; urgency=medium
814+
815+ * Import FTBFS for s390x from Debian 5.1.2-3 upload. (LP: #1521240)
816+
817+ -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 30 Nov 2015 15:46:06 +0000
818+
819+strongswan (5.1.2-0ubuntu7) xenial; urgency=medium
820+
821+ * SECURITY UPDATE: authentication bypass in eap-mschapv2 plugin
822+ - debian/patches/CVE-2015-8023.patch: only succeed authentication if
823+ MSK was established in
824+ src/libcharon/plugins/eap_mschapv2/eap_mschapv2.c.
825+ - CVE-2015-8023
826+ * debian/patches/disable_ntru_test.patch: disable test causing FTBFS
827+ until regression is properly investigated.
828+
829+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 19 Nov 2015 14:00:17 -0500
830+
831+strongswan (5.1.2-0ubuntu6) wily; urgency=medium
832+
833+ * SECURITY UPDATE: user credential disclosure to rogue servers
834+ - debian/patches/CVE-2015-4171.patch: enforce remote authentication
835+ config before proceeding with own authentication in
836+ src/libcharon/sa/ikev2/tasks/ike_auth.c.
837+ - CVE-2015-4171
838+ * debian/rules: don't FTBFS from unused service file
839+
840+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 08 Jun 2015 12:50:38 -0400
841+
842+strongswan (5.1.2-0ubuntu5) vivid; urgency=medium
843+
844+ * Add a systemd unit corresponding to strongswan-starter.strongswan.upstart.
845+
846+ -- Martin Pitt <martin.pitt@ubuntu.com> Fri, 16 Jan 2015 08:27:54 +0100
847+
848+strongswan (5.1.2-0ubuntu4) vivid; urgency=medium
849+
850+ * SECURITY UPDATE: denial of service via DH group 1025
851+ - debian/patches/CVE-2014-9221.patch: define MODP_CUSTOM outside of
852+ IKE DH range in src/libstrongswan/crypto/diffie_hellman.c,
853+ src/libstrongswan/crypto/diffie_hellman.h.
854+ - CVE-2014-9221
855+
856+ -- Tyler Hicks <tyhicks@canonical.com> Mon, 05 Jan 2015 08:25:29 -0500
857+
858+strongswan (5.1.2-0ubuntu3) utopic; urgency=low
859+
860+ * Added "libgcrypt20-dev | libgcrypt11-dev" to build dependencies to fix
861+ build.
862+
863+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 15 Oct 2014 16:49:18 +0000
864+
865+strongswan (5.1.2-0ubuntu2) trusty; urgency=medium
866+
867+ * SECURITY UPDATE: remote authentication bypass
868+ - debian/patches/CVE-2014-2338.patch: reject CREATE_CHILD_SA exchange
869+ on unestablished IKE_SAs in src/libcharon/sa/ikev2/task_manager_v2.c.
870+ - CVE-2014-2338
871+
872+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 14 Apr 2014 11:24:34 -0400
873+
874+strongswan (5.1.2-0ubuntu1) trusty; urgency=low
875+
876+ * New upstream release.
877+
878+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 01 Mar 2014 08:53:17 +0000
879+
880+strongswan (5.1.2~rc2-0ubuntu2) trusty; urgency=low
881+
882+ * debian/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
883+ * debian/usr.lib.ipsec.charon: Allow read access to /run/charon.
884+
885+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 19 Feb 2014 13:07:16 +0000
886+
887+strongswan (5.1.2~rc2-0ubuntu1) trusty; urgency=low
888+
889+ * New upstream release candidate.
890+
891+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 19 Feb 2014 12:59:21 +0000
892+
893+strongswan (5.1.2~rc1-0ubuntu4) trusty; urgency=medium
894+
895+ * debian/strongswan-tnc-*.install: Fixed files so libraries go into correct
896+ packages.
897+ * debian/usr.lib.ipsec.stroke: Allow access to strongswan.d directories.
898+
899+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 17 Feb 2014 18:12:38 +0000
900+
901+strongswan (5.1.2~rc1-0ubuntu3) trusty; urgency=low
902+
903+ * debian/rules: Exclude rdrand.conf in dh_install's --fail-missing.
904+
905+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:46:46 +0000
906+
907+strongswan (5.1.2~rc1-0ubuntu2) trusty; urgency=low
908+
909+ * debian/libstrongswan.install: Moved rdrand plugin configuration to rules
910+ as it's only useful on amd64.
911+ * debian/watch: Added opts=pgpsigurlmangle option.
912+ * debian/upstream/signing-key.asc: Added key: 0xB34DBA77.
913+
914+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:32:10 +0000
915+
916+strongswan (5.1.2~rc1-0ubuntu1) trusty; urgency=medium
917+
918+ * New upstream release candidate.
919+ * debian/*.install - include new configuration files for plugins in
920+ appropiate packages.
921+
922+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:03:14 +0000
923+
924+strongswan (5.1.2~dr3+git20130120-0ubuntu3) trusty; urgency=low
925+
926+ * debian/control:
927+ - Added Breaks/Replaces for all library files which have been moved
928+ about (LP: #1278176).
929+ - Removed build-dependency on check and added one on dh-apparmor.
930+ * debian/strongswan-starter.postinst: Removed further out-dated code and
931+ entire section on opportunistic encryption - this was never in strongSwan.
932+ * debian/rules: Removed pieces on 'patching ipsec.conf' on build.
933+
934+ -- Jonathan Davies <jonathan.davies@canonical.com> Sun, 09 Feb 2014 23:53:23 +0000
935+
936+strongswan (5.1.2~dr3+git20130120-0ubuntu2) trusty; urgency=low
937+
938+ * debian/control: Fixed references to plugin-fips-prf.
939+
940+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 22 Jan 2014 11:22:14 +0000
941+
942+strongswan (5.1.2~dr3+git20130120-0ubuntu1) trusty; urgency=low
943+
944+ * Upstream Git snapshot for build fixes with regards to entropy.
945+ * debian/rules:
946+ - Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity checking.
947+ - Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths in
948+ tests.
949+
950+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 20 Jan 2014 19:00:59 +0000
951+
952+strongswan (5.1.2~dr3-0ubuntu1) trusty; urgency=low
953+
954+ * New upstream developer release.
955+ * Made changes to packaging per upstream suggestions.
956+ - Dropped medcli and medsrv packages - not recommended by upstream at this
957+ time.
958+ - Dropped ha plugin - needs special kernel.
959+ - Improved all package descriptions in general.
960+ - Drop build-dep on clearsilver-dev and libfcgi-dev - no longer needed.
961+ - Removed debian/*logcheck* files - not relevant to strongSwan.
962+ - Split dhcp and farp packages into sub-packages.
963+ - Build kernel-libipsec, ntru, systime-fix, and xauth-noauth plugins.
964+ - Changes to TNC-related packages.
965+ * Created AppArmor profiles for lookip and stroke.
966+
967+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 15 Jan 2014 22:52:53 +0000
968+
969+strongswan (5.1.2~dr2+git20130106-0ubuntu2) trusty; urgency=low
970+
971+ * libstrongswan.install: Removed lingering unit-tester.so reference.
972+
973+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 06 Jan 2014 20:29:59 +0000
974+
975+strongswan (5.1.2~dr2+git20130106-0ubuntu1) trusty; urgency=low
976+
977+ * Git snapshot of commit 94e10f15e51ead788d9947e966878ebfdc95b7ce.
978+ Incorporates upstream fixes for:
979+ - Integrity testing.
980+ - Unit test failures on little endian systems.
981+ * Dropped debian/patches/02_test_asn1_fix_32bit_time_test.patch - fixed
982+ upstream.
983+ * debian/rules:
984+ - Stop using CK_TIMEOUT_MULTIPLIER.
985+ - Stop enabling the test suite only on non-powerpc arches (it runs
986+ anyway).
987+
988+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 06 Jan 2014 20:17:20 +0000
989+
990+strongswan (5.1.2~dr2-0ubuntu3) trusty; urgency=low
991+
992+ * debian/control: Reinstate missing comma in dependencies.
993+
994+ -- Jonathan Davies <jonathan.davies@canonical.com> Fri, 03 Jan 2014 05:39:13 +0000
995+
996+strongswan (5.1.2~dr2-0ubuntu2) trusty; urgency=low
997+
998+ * Added debian/patches/02_test_asn1_fix_32bit_time_test.patch - fixes issue
999+ where test for >2038 tests on 32-bit platforms is broken.
1000+ - Reported upstream: https://wiki.strongswan.org/issues/477
1001+ * debian/control: Added strongswan-plugin-ntru to strongswan-ike Suggests.
1002+
1003+ -- Jonathan Davies <jonathan.davies@canonical.com> Fri, 03 Jan 2014 05:02:32 +0000
1004+
1005+strongswan (5.1.2~dr2-0ubuntu1) trusty; urgency=low
1006+
1007+ * New upstream developer release.
1008+ * debian/rules: Configure with: --enable-af-alg, --enable-ntru, --enable-soup,
1009+ and --enable-unity.
1010+ * debian/control:
1011+ - New plugin packages created for the above
1012+ - Split fips-prf into its own package.
1013+ - Added build-dependency on libsoup2.4-dev.
1014+
1015+ -- Jonathan Davies <jonathan.davies@canonical.com> Thu, 02 Jan 2014 17:37:33 +0000
1016+
1017 strongswan (5.1.1-3) unstable; urgency=low
1018
1019 * Upload to unstable.
1020@@ -628,6 +1597,192 @@ strongswan (5.1.1-1) unstable; urgency=low
1021
1022 -- Yves-Alexis Perez <corsac@debian.org> Fri, 24 Jan 2014 21:22:32 +0100
1023
1024+strongswan (5.1.1-0ubuntu17) trusty; urgency=low
1025+
1026+ * debian/control:
1027+ - Make strongswan-ike depend on iproute2.
1028+ - Added xauth plugin dependency on strongswan-plugin-eap-gtc.
1029+ - Created strongswan-libfast package.
1030+
1031+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 01 Jan 2014 17:04:45 +0000
1032+
1033+strongswan (5.1.1-0ubuntu16) trusty; urgency=low
1034+
1035+ * debian/control:
1036+ - Further splitting of plugins into subpackages (such as all EAP plugins
1037+ to their own packages).
1038+ - Added libpcsclite-dev to build-dependencies.
1039+ * debian/rules:
1040+ - Sort configure options in alphabetical order.
1041+ - Added configure option of --enable-eap-aka-3gpp2, --enable-eap-dynamic,
1042+ --enable-eap-sim-file, --enable-eap-sim-pcsc,
1043+ --enable-eap-simaka-pseudonym, --enable-eap-simaka-reauth and
1044+ --enable-eap-simaka-sql.
1045+ - Don't exclude medsrv from install.
1046+ * Moved eap-identity.so to libstrongswan package as it's used by all the
1047+ other EAP plugins.
1048+
1049+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 21:25:50 +0000
1050+
1051+strongswan (5.1.1-0ubuntu15) trusty; urgency=low
1052+
1053+ * debian/control:
1054+ - Split plugins from libstrongswan package into modular subpackages.
1055+ - Added libmysqlclient-dev to build-dependencies.
1056+ - strongswan-ike: Set to depend on either strongswan-plugins-openssl or
1057+ strongswan-plugins-gcrypt.
1058+ - strongswan-ike: All other plugins added to Suggests.
1059+ - Created two new TNC packages: strongswan-tnc-ifmap and
1060+ strongswan-tnc-pdp and added to tnc-imcvs Suggests.
1061+ * debian/rules: Added to CONFIGUREARGS: --enable-certexpire,
1062+ --enable-error-notify, --enable-mysql, --enable-load-tester,
1063+ --enable-radattr, --enable-tnc-pdp, and --enable-whitelist.
1064+ * debian/strongswan-ike.install: Moved eap-identity.so to -tnc-imcvs package.
1065+
1066+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 16:15:32 +0000
1067+
1068+strongswan (5.1.1-0ubuntu14) trusty; urgency=low
1069+
1070+ * debian/rules:
1071+ - CK_TIMEOUT_MULTIPLIER back down to 6.
1072+ - Disable unit tests on powerpc.
1073+
1074+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:39:48 +0000
1075+
1076+strongswan (5.1.1-0ubuntu13) trusty; urgency=low
1077+
1078+ * debian/rules: CK_TIMEOUT_MULTIPLIER to 10 as just powerppc is being stubborn.
1079+
1080+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:23:42 +0000
1081+
1082+strongswan (5.1.1-0ubuntu12) trusty; urgency=low
1083+
1084+ * debian/rules: Bring CK_TIMEOUT_MULTIPLIER up to 6 to fix powerppc and
1085+ armhf.
1086+
1087+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:03:40 +0000
1088+
1089+strongswan (5.1.1-0ubuntu11) trusty; urgency=low
1090+
1091+ * 02_increase-test_rsa_generate-timeout.patch: Removed - only fixed build on
1092+ one extra arch.
1093+ * debian/rules: Set CK_TIMEOUT_MULTIPLIER to 4.
1094+
1095+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 06:51:47 +0000
1096+
1097+strongswan (5.1.1-0ubuntu10) trusty; urgency=low
1098+
1099+ * debian/patches: Added patch 02_increase-test_rsa_generate-timeout.patch -
1100+ - Increases RSA key generate test timeout to 30 seconds so that it doesn't
1101+ fail on armhf, arm64, and powerppc.
1102+ * Contrary to what the last changelog entry says, we are still running
1103+ strongswan as root (with AppArmor protection).
1104+
1105+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 06:06:47 +0000
1106+
1107+strongswan (5.1.1-0ubuntu9) trusty; urgency=low
1108+
1109+ * debian/rules: Added to configure options:
1110+ - --enable-tnc-ifmap: enable TNC IF-MAP module.
1111+ - --enable-duplicheck: enable duplicheck plugin.
1112+ - --enable-imv-swid, --enable-imc-swid: Added.
1113+ - Run strongswan as it's own user.
1114+ * debian/strongswan-starter.install: Install duplicheck.
1115+ * debian/strongswan-tnc-imcvs.install: Install swidtags.
1116+
1117+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 19:33:27 +0000
1118+
1119+strongswan (5.1.1-0ubuntu8) trusty; urgency=low
1120+
1121+ * debian/rules: Added to configure options:
1122+ - --enable-unit-tests: check unit testing on build.
1123+ - --enable-unbound: for validating DNS lookups.
1124+ - --enable-dnscert: for DNSCERT peer authentication.
1125+ - --enable-ipseckey: for IPSEC key authentication.
1126+ - --enable-lookip: for LookIP functionality.
1127+ - --enable-coupling: certificate coupling functionality.
1128+ * debian/control: Added check, libldns-dev, libunbound-dev to
1129+ build-dependencies.
1130+ * debian/libstrongswan.install: Install new plugin .so's.
1131+ * debian/strongswan-starter.install: Added lookip.
1132+
1133+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:52:07 +0000
1134+
1135+strongswan (5.1.1-0ubuntu7) trusty; urgency=low
1136+
1137+ * strongswan-starter.install: Moved pt-tls-client to tnc-imcvs (to prevent
1138+ the former from depending on the latter).
1139+
1140+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:30:19 +0000
1141+
1142+strongswan (5.1.1-0ubuntu6) trusty; urgency=low
1143+
1144+ * debian/strongswan-starter.prerm: Stop strongswan service on package
1145+ removal (as opposed to using the old init.d script).
1146+
1147+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:22:10 +0000
1148+
1149+strongswan (5.1.1-0ubuntu5) trusty; urgency=low
1150+
1151+ * debian/rules:
1152+ - CONFIGUREARGS: Merged Debian and RPM options.
1153+ - Brings in TNC functionality.
1154+ * debian/control:
1155+ - Added build-dependency on libtspi-dev.
1156+ - Created strongswan-tnc-imcvs binary package for TNC components.
1157+ - Added strongswan-tnc-imcvs to libstrongswan's Suggests.
1158+ * debian/libstrongswan.install:
1159+ - Included newly built MD4 and SQLite libraries.
1160+ - Removed 'tnc' references (moved to TNC package).
1161+ * debian/strongswan-tnc-imcvs.install: Created - handle new TNC libraries and
1162+ binaries.
1163+ * debian/usr.lib.ipsec.charon: Allow access to TNC modules.
1164+
1165+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 14:05:43 +0000
1166+
1167+strongswan (5.1.1-0ubuntu4) trusty; urgency=low
1168+
1169+ * debian/usr.lib.ipsec.charon: Added - AppArmor profile for charon.
1170+ * debian/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1171+ * debian/control: strongswan-ike - Stop depending on ipsec-tools.
1172+
1173+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 05:35:17 +0000
1174+
1175+strongswan (5.1.1-0ubuntu3) trusty; urgency=low
1176+
1177+ * strongswan-starter.strongswan.upstart - Only start strongSwan when a
1178+ network connection is available.
1179+ * debian/control: Downgrade build-dep version of dpkg-dev from 1.16.2 to
1180+ 1.16.1 - to make precise backporting easier.
1181+
1182+ -- Jonathan Davies <jonathan.davies@canonical.com> Thu, 12 Dec 2013 10:43:15 +0000
1183+
1184+strongswan (5.1.1-0ubuntu2) trusty; urgency=low
1185+
1186+ * strongswan-starter.strongswan.upstart - Created Upstart job for
1187+ strongSwan.
1188+ * debian/rules: Set dh_installinit to install above file.
1189+ * debian/strongswan-starter.postinit:
1190+ - Removed section about runlevel changes, it's almost 2014.
1191+ - Adapted service restart section for Upstart.
1192+ - Remove old symlinks to init.d files is necessary.
1193+ * debian/strongswan-starter.dirs: Don't touch /etc/init.d.
1194+
1195+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 11 Dec 2013 23:10:28 +0000
1196+
1197+strongswan (5.1.1-0ubuntu1) trusty; urgency=low
1198+
1199+ * New upstream release.
1200+ * Removed: debian/patches/CVE-2013-6075, CVE-2013-6076.patch - upsteamed.
1201+ * debian/control: Updated Standards-Version to 3.9.5 and applied
1202+ XSBC-Original-Maintainer policy.
1203+ * strongswan-starter.install:
1204+ - pki tool is now in /usr/bin.
1205+ - Install pt-tls-client.
1206+ - Install manpages (LP: #1206263).
1207+
1208+ -- Jonathan Davies <jpds@ubuntu.com> Sun, 01 Dec 2013 17:43:59 +0000
1209+
1210 strongswan (5.1.0-3) unstable; urgency=high
1211
1212 * urgency=high for the security fixes.
1213diff --git a/debian/control b/debian/control
1214index 4f12140..5792e50 100644
1215--- a/debian/control
1216+++ b/debian/control
1217@@ -1,7 +1,8 @@
1218 Source: strongswan
1219 Section: net
1220 Priority: optional
1221-Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org>
1222+Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
1223+XSBC-Original-Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org>
1224 Uploaders: Rene Mayrhofer <rmayr@debian.org>,
1225 Yves-Alexis Perez <corsac@debian.org>
1226 Standards-Version: 4.1.2
1227@@ -19,14 +20,21 @@ Build-Depends: bison,
1228 libcurl4-openssl-dev | libcurl3-dev | libcurl2-dev,
1229 libgcrypt20-dev | libgcrypt11-dev,
1230 libgmp3-dev,
1231+ libjson-c-dev,
1232 libkrb5-dev,
1233 libldap2-dev,
1234+ libldns-dev,
1235+ libmysqlclient-dev,
1236 libnm-dev [linux-any],
1237 libpam0g-dev,
1238+ libpcsclite-dev,
1239+ libsoup2.4-dev,
1240 libsqlite3-dev,
1241 libssl-dev (>= 0.9.8),
1242 libsystemd-dev [linux-any],
1243 libtool,
1244+ libtspi-dev,
1245+ libunbound-dev,
1246 libxml2-dev,
1247 pkg-config,
1248 po-debconf,
1249@@ -68,7 +76,9 @@ Description: strongSwan utility and crypto library
1250 - fips-prf (PRF specified by FIPS, used by EAP-SIM/AKA algorithms)
1251 - gmp (RSA/DH crypto backend based on libgmp)
1252 - hmac (HMAC wrapper using various hashers)
1253+ - md4 (MD4 hasher software implementation)
1254 - md5 (MD5 hasher software implementation)
1255+ - mgf1 (Mask Generation Functions based on the SHA-1, SHA-256 and SHA-512)
1256 - nonce (Default nonce generation plugin)
1257 - pem (PEM encoding/decoding routines)
1258 - pgp (PGP encoding/decoding routines)
1259@@ -131,22 +141,57 @@ Description: strongSwan utility and crypto library (extra plugins)
1260 cryptographic library.
1261 .
1262 Included plugins are:
1263+ - acert (Support of X.509 attribute certificates (since 5.1.3))
1264 - af-alg [linux] (AF_ALG Linux crypto API interface, provides
1265 ciphers/hashers/hmac/xcbc)
1266+ - attr-sql (provide IKE attributes read from a database to peers)
1267+ - bliss (Bimodal Lattice Signature Scheme (BLISS) post-quantum computer
1268+ signature scheme)
1269 - ccm (CCM cipher mode wrapper)
1270+ - chapoly (ChaCha20/Poly1305 AEAD implementation)
1271 - cmac (CMAC cipher mode wrapper)
1272 - ctr (CTR cipher mode wrapper)
1273+ - coupling (Permanent peer certificate coupling)
1274 - curl (libcurl based HTTP/FTP fetcher)
1275 - curve25519 (support for Diffie-Hellman group 31 using Curve25519 and
1276 support for the Ed25519 digital signature algorithm for IKEv2)
1277+ - dnscert (authentication via CERT RRs protected by DNSSEC)
1278 - gcrypt (Crypto backend based on libgcrypt, provides
1279 RSA/DH/ciphers/hashers/rng)
1280+ - ipseckey (authentication via IPSECKEY RRs protected by DNSSEC)
1281 - ldap (LDAP fetching plugin based on libldap)
1282+ - load-tester (perform IKE load tests against self or gateway)
1283+ - mysql (database backend)
1284+ - ntru (key exchanged based on post-quantum computer NTRU)
1285+ - nttfft (Number Theoretic Transform via the FFT algorithm)
1286 - padlock (VIA padlock crypto backend, provides AES128/SHA1)
1287 - pkcs11 (PKCS#11 smartcard backend)
1288+ - radattr (inject and process custom RADIUS attributes as IKEv2 client)
1289+ - sql (SQL configuration and creds engine)
1290+ - sqlite (SQLite database backend)
1291+ - soup (libsoup based HTTP fetcher)
1292+ - tpmtss (TPM 1.2 and TPM 2.0 Trusted Platform Modules)
1293 - rdrand (High quality / high performance random source using the Intel
1294 rdrand instruction found on Ivy Bridge processors)
1295 - test-vectors (Set of test vectors for various algorithms)
1296+ - unbound (DNSSEC enabled resolver using libunbound)
1297+ - whitelist (peer verification against a whitelist)
1298+
1299+Package: libcharon-standard-plugins
1300+Architecture: any
1301+Depends: libstrongswan (= ${binary:Version}),
1302+ ${misc:Depends},
1303+ ${shlibs:Depends}
1304+Breaks: libcharon-extra-plugins (<< 5.5.1-1ubuntu1~)
1305+Replaces: libcharon-extra-plugins (<< 5.5.1-1ubuntu1~)
1306+Description: strongSwan charon library (standard plugins)
1307+ The strongSwan VPN suite uses the native IPsec stack in the standard
1308+ Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
1309+ .
1310+ This package provides standard plugins for the charon library:
1311+ - eap-mschapv2 (EAP-MSCHAPv2 protocol handler using passwords/NT hashes)
1312+ - xauth-generic (Generic XAuth backend that provides passwords from
1313+ ipsec.secrets and other credential sets)
1314
1315 Package: libcharon-extra-plugins
1316 Architecture: any
1317@@ -162,13 +207,13 @@ Description: strongSwan charon library (extra plugins)
1318 This package provides extra plugins for the charon library:
1319 - addrblock (Narrow traffic selectors to RFC 3779 address blocks in X.509
1320 certificates)
1321+ - dhcp (Forwarding of DHCP requests for virtual IPs to DHCP server)
1322 - certexpire (Export expiration dates of used certificates)
1323 - eap-aka (Generic EAP-AKA protocol handler using different backends)
1324 - eap-gtc (EAP-GTC protocol handler authenticating with XAuth backends)
1325 - eap-identity (EAP-Identity identity exchange algorithm, to use with other
1326 EAP protocols)
1327 - eap-md5 (EAP-MD5 protocol handler using passwords)
1328- - eap-mschapv2 (EAP-MSCHAPv2 protocol handler using passwords/NT hashes)
1329 - eap-radius (EAP server proxy plugin forwarding EAP conversations to a
1330 RADIUS server)
1331 - eap-tls (EAP-TLS protocol handler, to authenticate with certificates in
1332@@ -176,17 +221,25 @@ Description: strongSwan charon library (extra plugins)
1333 - eap-tnc (EAP-TNC protocol handler, Trusted Network Connect in a TLS tunnel)
1334 - eap-ttls (EAP-TTLS protocol handler, wraps other EAP methods securely)
1335 - error-notify (Notification about errors via UNIX socket)
1336+ - farp (fake ARP responses for requests to virtual IP address)
1337 - ha (High-Availability clustering)
1338+ - kernel-libipsec (Userspace IPsec Backend with TUN devices)
1339 - led (Let Linux LED subsystem LEDs blink on IKE activity)
1340 - lookip (Virtual IP lookup facility using a UNIX socket)
1341- - medcli (Web interface based mediation client interface)
1342- - medsrv (Web interface based mediation server interface)
1343 - tnc (Trusted Network Connect)
1344 - unity (Cisco Unity extensions for IKEv1)
1345 - xauth-eap (XAuth backend that uses EAP methods to verify passwords)
1346- - xauth-generic (Generic XAuth backend that provides passwords from
1347- ipsec.secrets and other credential sets)
1348 - xauth-pam (XAuth backend that uses PAM modules to verify passwords)
1349+ - eap-aka-3gpp2 (EAP-AKA backend implementing standard 3GPP2 algorithm in software)
1350+ - eap-dynamic (EAP proxy plugin that dynamically selects an EAP method requested/supported by the client (since 5.0.1))
1351+ - eap-peap (EAP-PEAP protocol handler, wraps other EAP methods securely)
1352+ - eap-sim (Generic EAP-SIM protocol handler using different backends)
1353+ - eap-sim-file (EAP-SIM backend reading triplets from a file)
1354+ - eap-sim-pcsc (EAP-SIM backend based on a PC/SC smartcard reader)
1355+ - eap-simaka-pseudonym (EAP-SIM/AKA in-memory pseudonym identity database)
1356+ - eap-simaka-reauth (EAP-SIM/AKA in-memory reauthentication identity database)
1357+ - eap-simaka-sql (EAP-SIM/AKA backend reading triplets/quintuplets from a SQL database)
1358+ - xauth-noauth (XAuth backend that does not do any authentication (since 5.0.3))
1359
1360 Package: strongswan-starter
1361 Architecture: any
1362@@ -212,6 +265,7 @@ Depends: libstrongswan (= ${binary:Version}),
1363 ${shlibs:Depends}
1364 Breaks: strongswan-starter (<= 5.6.1-2)
1365 Replaces: strongswan-starter (<= 5.6.1-2)
1366+Recommends: libcharon-standard-plugins
1367 Suggests: libcharon-extra-plugins
1368 Description: strongSwan charon library
1369 The strongSwan VPN suite uses the native IPsec stack in the standard
1370@@ -255,6 +309,68 @@ Description: strongSwan plugin to interact with NetworkManager
1371 in conjunction with the network-manager-strongswan package, providing
1372 a simple graphical frontend to configure IPsec based VPNs.
1373
1374+Package: strongswan-tnc-ifmap
1375+Architecture: any
1376+Depends: ${shlibs:Depends}, ${misc:Depends}, libstrongswan (= ${binary:Version})
1377+Description: strongSwan plugin for Trusted Network Connect's (TNC) IF-MAP client
1378+ The strongSwan VPN suite uses the native IPsec stack in the standard
1379+ Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
1380+ .
1381+ This package provides Trusted Network Connect's (TNC) IF-MAP 2.0 client.
1382+
1383+Package: strongswan-tnc-base
1384+Architecture: any
1385+Depends: ${shlibs:Depends}, ${misc:Depends}, libstrongswan (= ${binary:Version})
1386+Suggests: strongswan-tnc-ifmap, strongswan-tnc-pdp
1387+Description: strongSwan Trusted Network Connect's (TNC) - base files
1388+ The strongSwan VPN suite uses the native IPsec stack in the standard
1389+ Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
1390+ .
1391+ This package provides the base files for strongSwan's Trusted Network
1392+ Connect's (TNC) functionality.
1393+ .
1394+ strongSwan's IMC/IMV dynamic libraries can be used by any third party TNC
1395+ client/server implementation possessing a standard IF-IMC/IMV interface.
1396+
1397+Package: strongswan-tnc-client
1398+Architecture: any
1399+Depends: ${shlibs:Depends}, ${misc:Depends},
1400+ libstrongswan (= ${binary:Version}), strongswan-tnc-base (= ${binary:Version})
1401+Suggests: libcharon-extra-plugins
1402+Description: strongSwan Trusted Network Connect's (TNC) - client files
1403+ The strongSwan VPN suite uses the native IPsec stack in the standard
1404+ Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
1405+ .
1406+ This package provides the client functionality for strongSwan's Trusted Network
1407+ Connect's (TNC) features.
1408+ .
1409+ It includes the OS, scanner, test, SWID, and attestation IMCs.
1410+
1411+Package: strongswan-tnc-server
1412+Architecture: any
1413+Depends: ${shlibs:Depends}, ${misc:Depends},
1414+ libstrongswan (= ${binary:Version}),
1415+ strongswan-tnc-base (= ${binary:Version}),
1416+ libstrongswan-extra-plugins (= ${binary:Version})
1417+Description: strongSwan Trusted Network Connect's (TNC) - server files
1418+ The strongSwan VPN suite uses the native IPsec stack in the standard
1419+ Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
1420+ .
1421+ This package provides the server functionality for strongSwan's Trusted Network
1422+ Connect's (TNC) features.
1423+
1424+Package: strongswan-tnc-pdp
1425+Architecture: any
1426+Depends: ${shlibs:Depends}, ${misc:Depends},
1427+ libstrongswan (= ${binary:Version}),
1428+ strongswan-tnc-server (= ${binary:Version})
1429+Description: strongSwan plugin for Trusted Network Connect's (TNC) PDP
1430+ The strongSwan VPN suite uses the native IPsec stack in the standard
1431+ Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
1432+ .
1433+ This package provides Trusted Network Connect's (TNC) Policy Decision Point
1434+ (PDP) with RADIUS server interface.
1435+
1436 Package: charon-cmd
1437 Architecture: any
1438 Depends: libstrongswan (= ${binary:Version}),
1439diff --git a/debian/ipsec.secrets.proto b/debian/ipsec.secrets.proto
1440index dfa6dde..309e3fc 100644
1441--- a/debian/ipsec.secrets.proto
1442+++ b/debian/ipsec.secrets.proto
1443@@ -3,6 +3,3 @@
1444 # RSA private key for this host, authenticating it to any other host
1445 # which knows the public part.
1446
1447-# this file is managed with debconf and will contain the automatically created private key
1448-include /var/lib/strongswan/ipsec.secrets.inc
1449-
1450diff --git a/debian/libcharon-extra-plugins.install b/debian/libcharon-extra-plugins.install
1451index 1b0cbca..cb539ec 100644
1452--- a/debian/libcharon-extra-plugins.install
1453+++ b/debian/libcharon-extra-plugins.install
1454@@ -1,50 +1,102 @@
1455 # libcharon plugins
1456 usr/lib/ipsec/plugins/libstrongswan-addrblock.so
1457 usr/lib/ipsec/plugins/libstrongswan-certexpire.so
1458-usr/lib/ipsec/plugins/libstrongswan-eap*.so
1459+usr/lib/ipsec/plugins/libstrongswan-eap-aka-3gpp2.so
1460+usr/lib/ipsec/plugins/libstrongswan-eap-aka.so
1461+usr/lib/ipsec/plugins/libstrongswan-eap-dynamic.so
1462+usr/lib/ipsec/plugins/libstrongswan-eap-gtc.so
1463+usr/lib/ipsec/plugins/libstrongswan-eap-identity.so
1464+usr/lib/ipsec/plugins/libstrongswan-eap-md5.so
1465+usr/lib/ipsec/plugins/libstrongswan-eap-peap.so
1466+usr/lib/ipsec/plugins/libstrongswan-eap-radius.so
1467+usr/lib/ipsec/plugins/libstrongswan-eap-sim-file.so
1468+usr/lib/ipsec/plugins/libstrongswan-eap-sim-pcsc.so
1469+usr/lib/ipsec/plugins/libstrongswan-eap-sim.so
1470+usr/lib/ipsec/plugins/libstrongswan-eap-simaka-pseudonym.so
1471+usr/lib/ipsec/plugins/libstrongswan-eap-simaka-reauth.so
1472+usr/lib/ipsec/plugins/libstrongswan-eap-simaka-sql.so
1473+usr/lib/ipsec/plugins/libstrongswan-eap-tls.so
1474+usr/lib/ipsec/plugins/libstrongswan-eap-tnc.so
1475+usr/lib/ipsec/plugins/libstrongswan-eap-ttls.so
1476 usr/lib/ipsec/plugins/libstrongswan-error-notify.so
1477 usr/lib/ipsec/plugins/libstrongswan-ha.so
1478+usr/lib/ipsec/plugins/libstrongswan-kernel-libipsec.so
1479 usr/lib/ipsec/plugins/libstrongswan-led.so
1480 usr/lib/ipsec/plugins/libstrongswan-lookip.so
1481 #usr/lib/ipsec/plugins/libstrongswan-medsrv.so
1482 #usr/lib/ipsec/plugins/libstrongswan-medcli.so
1483-usr/lib/ipsec/plugins/libstrongswan-tnc-tnccs.so
1484 usr/lib/ipsec/plugins/libstrongswan-unity.so
1485-usr/lib/ipsec/plugins/libstrongswan-xauth-*.so
1486+usr/lib/ipsec/plugins/libstrongswan-xauth-eap.so
1487+usr/lib/ipsec/plugins/libstrongswan-xauth-noauth.so
1488+usr/lib/ipsec/plugins/libstrongswan-xauth-pam.so
1489 # standard configuration files
1490 usr/share/strongswan/templates/config/plugins/addrblock.conf
1491 usr/share/strongswan/templates/config/plugins/certexpire.conf
1492-usr/share/strongswan/templates/config/plugins/eap-*.conf
1493+usr/share/strongswan/templates/config/plugins/eap-aka-3gpp2.conf
1494+usr/share/strongswan/templates/config/plugins/eap-aka.conf
1495+usr/share/strongswan/templates/config/plugins/eap-dynamic.conf
1496+usr/share/strongswan/templates/config/plugins/eap-gtc.conf
1497+usr/share/strongswan/templates/config/plugins/eap-identity.conf
1498+usr/share/strongswan/templates/config/plugins/eap-md5.conf
1499+usr/share/strongswan/templates/config/plugins/eap-peap.conf
1500+usr/share/strongswan/templates/config/plugins/eap-radius.conf
1501+usr/share/strongswan/templates/config/plugins/eap-sim-file.conf
1502+usr/share/strongswan/templates/config/plugins/eap-sim-pcsc.conf
1503+usr/share/strongswan/templates/config/plugins/eap-sim.conf
1504+usr/share/strongswan/templates/config/plugins/eap-simaka-pseudonym.conf
1505+usr/share/strongswan/templates/config/plugins/eap-simaka-reauth.conf
1506+usr/share/strongswan/templates/config/plugins/eap-simaka-sql.conf
1507+usr/share/strongswan/templates/config/plugins/eap-tls.conf
1508+usr/share/strongswan/templates/config/plugins/eap-tnc.conf
1509+usr/share/strongswan/templates/config/plugins/eap-ttls.conf
1510 usr/share/strongswan/templates/config/plugins/error-notify.conf
1511 usr/share/strongswan/templates/config/plugins/ha.conf
1512+usr/share/strongswan/templates/config/plugins/kernel-libipsec.conf
1513 usr/share/strongswan/templates/config/plugins/led.conf
1514 usr/share/strongswan/templates/config/plugins/lookip.conf
1515 #usr/share/strongswan/templates/config/plugins/medsrv.conf
1516 #usr/share/strongswan/templates/config/plugins/medcli.conf
1517-usr/share/strongswan/templates/config/plugins/tnc-tnccs.conf
1518 usr/share/strongswan/templates/config/plugins/unity.conf
1519-usr/share/strongswan/templates/config/plugins/xauth-*.conf
1520-usr/share/strongswan/templates/config/strongswan.d/tnc.conf
1521-etc/strongswan.d/tnc.conf
1522+usr/share/strongswan/templates/config/plugins/xauth-eap.conf
1523+usr/share/strongswan/templates/config/plugins/xauth-noauth.conf
1524+usr/share/strongswan/templates/config/plugins/xauth-pam.conf
1525 etc/strongswan.d/charon/addrblock.conf
1526 etc/strongswan.d/charon/certexpire.conf
1527-etc/strongswan.d/charon/eap-*.conf
1528+etc/strongswan.d/charon/eap-aka-3gpp2.conf
1529+etc/strongswan.d/charon/eap-aka.conf
1530+etc/strongswan.d/charon/eap-dynamic.conf
1531+etc/strongswan.d/charon/eap-gtc.conf
1532+etc/strongswan.d/charon/eap-identity.conf
1533+etc/strongswan.d/charon/eap-md5.conf
1534+etc/strongswan.d/charon/eap-peap.conf
1535+etc/strongswan.d/charon/eap-radius.conf
1536+etc/strongswan.d/charon/eap-sim-file.conf
1537+etc/strongswan.d/charon/eap-sim-pcsc.conf
1538+etc/strongswan.d/charon/eap-sim.conf
1539+etc/strongswan.d/charon/eap-simaka-pseudonym.conf
1540+etc/strongswan.d/charon/eap-simaka-reauth.conf
1541+etc/strongswan.d/charon/eap-simaka-sql.conf
1542+etc/strongswan.d/charon/eap-tls.conf
1543+etc/strongswan.d/charon/eap-tnc.conf
1544+etc/strongswan.d/charon/eap-ttls.conf
1545 etc/strongswan.d/charon/error-notify.conf
1546 etc/strongswan.d/charon/ha.conf
1547+etc/strongswan.d/charon/kernel-libipsec.conf
1548 etc/strongswan.d/charon/led.conf
1549 etc/strongswan.d/charon/lookip.conf
1550 #etc/strongswan.d/charon/medsrv.conf
1551 #etc/strongswan.d/charon/medcli.conf
1552-etc/strongswan.d/charon/tnc-tnccs.conf
1553 etc/strongswan.d/charon/unity.conf
1554-etc/strongswan.d/charon/xauth-*.conf
1555+etc/strongswan.d/charon/xauth-eap.conf
1556+etc/strongswan.d/charon/xauth-noauth.conf
1557+etc/strongswan.d/charon/xauth-pam.conf
1558 debian/usr.lib.ipsec.lookip /etc/apparmor.d/
1559 # support libs
1560 #usr/lib/ipsec/libfast.so*
1561+usr/lib/ipsec/libipsec.so*
1562 usr/lib/ipsec/libpttls.so*
1563 usr/lib/ipsec/libradius.so*
1564 usr/lib/ipsec/libsimaka.so*
1565-usr/lib/ipsec/libtnccs.so*
1566 usr/lib/ipsec/libtls.so*
1567 # binaries
1568 usr/bin/pt-tls-client
1569diff --git a/debian/libcharon-standard-plugins.install b/debian/libcharon-standard-plugins.install
1570new file mode 100644
1571index 0000000..25e580c
1572--- /dev/null
1573+++ b/debian/libcharon-standard-plugins.install
1574@@ -0,0 +1,19 @@
1575+# most commonly used libcharon plugins
1576+# 1) eap-mschapv2 is required on the client side to connect to VPN
1577+# concentrators configured for Windows 7+ and modern OSX/iOS using IKEv2.
1578+# In such scenario, the VPN concentrator identifies itself with a public
1579+# key and asks the client to authenticate with MSCHAPv2.
1580+# 2) xauth-generic is required on the client side to connect to VPN
1581+# concentrators configured for Android and older OSX/iOS using IKEv1 and
1582+# XAUTH. In such scenario, the VPN concentrator identifies itself with a
1583+# public key or a shared secret and asks the client to authenticate with a
1584+# XAUTH password.
1585+# plugins
1586+usr/lib/ipsec/plugins/libstrongswan-eap-mschapv2.so
1587+usr/lib/ipsec/plugins/libstrongswan-xauth-generic.so
1588+# config templates
1589+usr/share/strongswan/templates/config/plugins/eap-mschapv2.conf
1590+usr/share/strongswan/templates/config/plugins/xauth-generic.conf
1591+# configuration files
1592+etc/strongswan.d/charon/eap-mschapv2.conf
1593+etc/strongswan.d/charon/xauth-generic.conf
1594diff --git a/debian/libstrongswan-extra-plugins.install b/debian/libstrongswan-extra-plugins.install
1595index cfa5978..4cd01d4 100644
1596--- a/debian/libstrongswan-extra-plugins.install
1597+++ b/debian/libstrongswan-extra-plugins.install
1598@@ -1,37 +1,95 @@
1599 # Tool for TPM PCR extension
1600 usr/bin/tpm_extendpcr
1601 # libstrongswan plugins
1602+usr/lib/ipsec/plugins/libstrongswan-acert.so
1603+usr/lib/ipsec/plugins/libstrongswan-attr-sql.so
1604+usr/lib/ipsec/plugins/libstrongswan-bliss.so
1605 usr/lib/ipsec/plugins/libstrongswan-ccm.so
1606+usr/lib/ipsec/plugins/libstrongswan-chapoly.so
1607 usr/lib/ipsec/plugins/libstrongswan-cmac.so
1608+usr/lib/ipsec/plugins/libstrongswan-coupling.so
1609 usr/lib/ipsec/plugins/libstrongswan-ctr.so
1610 usr/lib/ipsec/plugins/libstrongswan-curl.so
1611 usr/lib/ipsec/plugins/libstrongswan-curve25519.so
1612+usr/lib/ipsec/plugins/libstrongswan-dnscert.so
1613 usr/lib/ipsec/plugins/libstrongswan-gcrypt.so
1614+usr/lib/ipsec/plugins/libstrongswan-ipseckey.so
1615 usr/lib/ipsec/plugins/libstrongswan-ldap.so
1616+usr/lib/ipsec/plugins/libstrongswan-load-tester.so
1617+usr/lib/ipsec/plugins/libstrongswan-mysql.so
1618+usr/lib/ipsec/plugins/libstrongswan-ntru.so
1619 usr/lib/ipsec/plugins/libstrongswan-pkcs11.so
1620+usr/lib/ipsec/plugins/libstrongswan-radattr.so
1621+usr/lib/ipsec/plugins/libstrongswan-soup.so
1622+usr/lib/ipsec/plugins/libstrongswan-sqlite.so
1623+usr/lib/ipsec/plugins/libstrongswan-sql.so
1624+usr/lib/ipsec/plugins/libstrongswan-systime-fix.so
1625 usr/lib/ipsec/plugins/libstrongswan-test-vectors.so
1626 usr/lib/ipsec/plugins/libstrongswan-tpm.so
1627+usr/lib/ipsec/plugins/libstrongswan-unbound.so
1628+usr/lib/ipsec/plugins/libstrongswan-whitelist.so
1629 # default configuration files
1630+usr/share/strongswan/templates/config/plugins/acert.conf
1631+usr/share/strongswan/templates/config/plugins/attr-sql.conf
1632+usr/share/strongswan/templates/config/plugins/bliss.conf
1633 usr/share/strongswan/templates/config/plugins/ccm.conf
1634+usr/share/strongswan/templates/config/plugins/chapoly.conf
1635 usr/share/strongswan/templates/config/plugins/cmac.conf
1636+usr/share/strongswan/templates/config/plugins/coupling.conf
1637 usr/share/strongswan/templates/config/plugins/ctr.conf
1638 usr/share/strongswan/templates/config/plugins/curl.conf
1639 usr/share/strongswan/templates/config/plugins/curve25519.conf
1640+usr/share/strongswan/templates/config/plugins/dnscert.conf
1641 usr/share/strongswan/templates/config/plugins/gcrypt.conf
1642+usr/share/strongswan/templates/config/plugins/ipseckey.conf
1643 usr/share/strongswan/templates/config/plugins/ldap.conf
1644+usr/share/strongswan/templates/config/plugins/load-tester.conf
1645+usr/share/strongswan/templates/config/plugins/mysql.conf
1646+usr/share/strongswan/templates/config/plugins/ntru.conf
1647 usr/share/strongswan/templates/config/plugins/pkcs11.conf
1648+usr/share/strongswan/templates/config/plugins/radattr.conf
1649+usr/share/strongswan/templates/config/plugins/soup.conf
1650+usr/share/strongswan/templates/config/plugins/sql.conf
1651+usr/share/strongswan/templates/config/plugins/sqlite.conf
1652+usr/share/strongswan/templates/config/plugins/systime-fix.conf
1653 usr/share/strongswan/templates/config/plugins/test-vectors.conf
1654 usr/share/strongswan/templates/config/plugins/tpm.conf
1655+usr/share/strongswan/templates/config/plugins/unbound.conf
1656+usr/share/strongswan/templates/config/plugins/whitelist.conf
1657+usr/share/strongswan/templates/database/sql/mysql.sql
1658+usr/share/strongswan/templates/database/sql/sqlite.sql
1659+etc/strongswan.d/charon/acert.conf
1660+etc/strongswan.d/charon/attr-sql.conf
1661+etc/strongswan.d/charon/bliss.conf
1662 etc/strongswan.d/charon/ccm.conf
1663+etc/strongswan.d/charon/chapoly.conf
1664 etc/strongswan.d/charon/cmac.conf
1665+etc/strongswan.d/charon/coupling.conf
1666 etc/strongswan.d/charon/ctr.conf
1667 etc/strongswan.d/charon/curl.conf
1668 etc/strongswan.d/charon/curve25519.conf
1669+etc/strongswan.d/charon/dnscert.conf
1670 etc/strongswan.d/charon/gcrypt.conf
1671+etc/strongswan.d/charon/ipseckey.conf
1672 etc/strongswan.d/charon/ldap.conf
1673+etc/strongswan.d/charon/load-tester.conf
1674+etc/strongswan.d/charon/mysql.conf
1675+etc/strongswan.d/charon/ntru.conf
1676 etc/strongswan.d/charon/pkcs11.conf
1677+etc/strongswan.d/charon/radattr.conf
1678+etc/strongswan.d/charon/soup.conf
1679+etc/strongswan.d/charon/sql.conf
1680+etc/strongswan.d/charon/sqlite.conf
1681+etc/strongswan.d/charon/systime-fix.conf
1682 etc/strongswan.d/charon/test-vectors.conf
1683 etc/strongswan.d/charon/tpm.conf
1684 # TPM libs
1685 usr/lib/ipsec/libtpmtss.so.*
1686 usr/lib/ipsec/libtpmtss.so
1687+etc/strongswan.d/charon/unbound.conf
1688+etc/strongswan.d/charon/whitelist.conf
1689+usr/lib/ipsec/load-tester
1690+usr/lib/ipsec/whitelist
1691+# support libs
1692+usr/lib/ipsec/libtpmtss.so*
1693+usr/lib/ipsec/libnttfft.so*
1694diff --git a/debian/libstrongswan.install b/debian/libstrongswan.install
1695index 072ff7e..5d458bb 100644
1696--- a/debian/libstrongswan.install
1697+++ b/debian/libstrongswan.install
1698@@ -6,15 +6,16 @@ usr/lib/ipsec/plugins/libstrongswan-dnskey.so
1699 usr/lib/ipsec/plugins/libstrongswan-fips-prf.so
1700 usr/lib/ipsec/plugins/libstrongswan-gmp.so
1701 usr/lib/ipsec/plugins/libstrongswan-hmac.so
1702+usr/lib/ipsec/plugins/libstrongswan-md4.so
1703 usr/lib/ipsec/plugins/libstrongswan-md5.so
1704 usr/lib/ipsec/plugins/libstrongswan-mgf1.so
1705 usr/lib/ipsec/plugins/libstrongswan-nonce.so
1706-usr/lib/ipsec/plugins/libstrongswan-pgp.so
1707 usr/lib/ipsec/plugins/libstrongswan-pem.so
1708+usr/lib/ipsec/plugins/libstrongswan-pgp.so
1709 usr/lib/ipsec/plugins/libstrongswan-pkcs1.so
1710+usr/lib/ipsec/plugins/libstrongswan-pkcs12.so
1711 usr/lib/ipsec/plugins/libstrongswan-pkcs7.so
1712 usr/lib/ipsec/plugins/libstrongswan-pkcs8.so
1713-usr/lib/ipsec/plugins/libstrongswan-pkcs12.so
1714 usr/lib/ipsec/plugins/libstrongswan-pubkey.so
1715 usr/lib/ipsec/plugins/libstrongswan-random.so
1716 usr/lib/ipsec/plugins/libstrongswan-rc2.so
1717@@ -31,15 +32,17 @@ usr/share/strongswan/templates/config/plugins/dnskey.conf
1718 usr/share/strongswan/templates/config/plugins/fips-prf.conf
1719 usr/share/strongswan/templates/config/plugins/gmp.conf
1720 usr/share/strongswan/templates/config/plugins/hmac.conf
1721+usr/share/strongswan/templates/config/plugins/kernel-netlink.conf
1722+usr/share/strongswan/templates/config/plugins/md4.conf
1723 usr/share/strongswan/templates/config/plugins/md5.conf
1724 usr/share/strongswan/templates/config/plugins/mgf1.conf
1725 usr/share/strongswan/templates/config/plugins/nonce.conf
1726-usr/share/strongswan/templates/config/plugins/pgp.conf
1727 usr/share/strongswan/templates/config/plugins/pem.conf
1728+usr/share/strongswan/templates/config/plugins/pgp.conf
1729 usr/share/strongswan/templates/config/plugins/pkcs1.conf
1730+usr/share/strongswan/templates/config/plugins/pkcs12.conf
1731 usr/share/strongswan/templates/config/plugins/pkcs7.conf
1732 usr/share/strongswan/templates/config/plugins/pkcs8.conf
1733-usr/share/strongswan/templates/config/plugins/pkcs12.conf
1734 usr/share/strongswan/templates/config/plugins/pubkey.conf
1735 usr/share/strongswan/templates/config/plugins/random.conf
1736 usr/share/strongswan/templates/config/plugins/rc2.conf
1737@@ -55,15 +58,17 @@ etc/strongswan.d/charon/dnskey.conf
1738 etc/strongswan.d/charon/fips-prf.conf
1739 etc/strongswan.d/charon/gmp.conf
1740 etc/strongswan.d/charon/hmac.conf
1741+etc/strongswan.d/charon/kernel-netlink.conf
1742+etc/strongswan.d/charon/md4.conf
1743 etc/strongswan.d/charon/md5.conf
1744 etc/strongswan.d/charon/mgf1.conf
1745 etc/strongswan.d/charon/nonce.conf
1746-etc/strongswan.d/charon/pgp.conf
1747 etc/strongswan.d/charon/pem.conf
1748+etc/strongswan.d/charon/pgp.conf
1749+etc/strongswan.d/charon/pkcs12.conf
1750 etc/strongswan.d/charon/pkcs1.conf
1751 etc/strongswan.d/charon/pkcs7.conf
1752 etc/strongswan.d/charon/pkcs8.conf
1753-etc/strongswan.d/charon/pkcs12.conf
1754 etc/strongswan.d/charon/pubkey.conf
1755 etc/strongswan.d/charon/random.conf
1756 etc/strongswan.d/charon/rc2.conf
1757diff --git a/debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch b/debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch
1758new file mode 100644
1759index 0000000..004b50b
1760--- /dev/null
1761+++ b/debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch
1762@@ -0,0 +1,11 @@
1763+--- a/conf/plugins/kernel-libipsec.conf
1764++++ b/conf/plugins/kernel-libipsec.conf
1765+@@ -5,7 +5,7 @@
1766+
1767+ # Whether to load the plugin. Can also be an integer to increase the
1768+ # priority of this plugin.
1769+- load = yes
1770++ load = no
1771+
1772+ }
1773+
1774diff --git a/debian/patches/series b/debian/patches/series
1775index ecc6257..59b4eaf 100644
1776--- a/debian/patches/series
1777+++ b/debian/patches/series
1778@@ -3,3 +3,4 @@
1779 03_systemd-service.patch
1780 04_disable-libtls-tests.patch
1781 05_charon-nm-Fix-building-list-of-DNS-MDNS-servers-with.patch
1782+dont-load-kernel-libipsec-plugin-by-default.patch
1783diff --git a/debian/rules b/debian/rules
1784index d1dbf8a..d3450c7 100755
1785--- a/debian/rules
1786+++ b/debian/rules
1787@@ -4,20 +4,36 @@ export DEB_LDFLAGS_MAINT_APPEND=-Wl,--as-needed -Wl,-O1
1788 export DEB_BUILD_MAINT_OPTIONS=hardening=+all
1789
1790 CONFIGUREARGS := --libdir=/usr/lib --libexecdir=/usr/lib \
1791+ --with-tss=trousers \
1792+ --enable-acert \
1793 --enable-addrblock \
1794 --enable-agent \
1795 --enable-bypass-lan \
1796+ --enable-attr-sql \
1797+ --enable-bliss \
1798 --enable-ccm \
1799 --enable-certexpire \
1800+ --enable-chapoly \
1801 --enable-cmd \
1802+ --enable-coupling \
1803 --enable-ctr \
1804 --enable-curl \
1805+ --enable-dnscert \
1806 --enable-eap-aka \
1807+ --enable-eap-aka-3gpp2 \
1808+ --enable-eap-dynamic \
1809 --enable-eap-gtc \
1810 --enable-eap-identity \
1811 --enable-eap-md5 \
1812 --enable-eap-mschapv2 \
1813+ --enable-eap-peap \
1814 --enable-eap-radius \
1815+ --enable-eap-sim \
1816+ --enable-eap-simaka-pseudonym \
1817+ --enable-eap-simaka-reauth \
1818+ --enable-eap-simaka-sql \
1819+ --enable-eap-sim-file \
1820+ --enable-eap-sim-pcsc \
1821 --enable-eap-tls \
1822 --enable-eap-tnc \
1823 --enable-eap-ttls \
1824@@ -25,18 +41,52 @@ CONFIGUREARGS := --libdir=/usr/lib --libexecdir=/usr/lib \
1825 --enable-gcm \
1826 --enable-gcrypt \
1827 --enable-ha \
1828+ --enable-imc-attestation \
1829+ --enable-imc-os \
1830+ --enable-imc-scanner \
1831+ --enable-imc-swid \
1832+ --enable-imc-test \
1833+ --enable-imv-attestation \
1834+ --enable-imv-os \
1835+ --enable-imv-scanner \
1836+ --enable-imv-swid \
1837+ --enable-imv-test \
1838+ --enable-ipseckey \
1839+ --enable-kernel-libipsec \
1840 --enable-ldap \
1841 --enable-led \
1842+ --enable-load-tester \
1843 --enable-lookip \
1844 --enable-mediation \
1845+ --enable-md4 \
1846+ --enable-mysql \
1847+ --enable-ntru \
1848 --enable-openssl \
1849 --enable-pkcs11 \
1850+ --enable-radattr \
1851+ --enable-soup \
1852+ --enable-sql \
1853+ --enable-sqlite \
1854+ --enable-systime-fix \
1855 --enable-test-vectors \
1856 --enable-tpm \
1857+ --enable-tnccs-11 \
1858+ --enable-tnccs-20 \
1859+ --enable-tnccs-dynamic \
1860+ --enable-tnc-ifmap \
1861+ --enable-tnc-imc \
1862+ --enable-tnc-imv \
1863+ --enable-tnc-pdp \
1864+ --enable-unbound \
1865+ --enable-unit-tests \
1866 --enable-unity \
1867+ --enable-whitelist \
1868 --enable-xauth-eap \
1869+ --enable-xauth-generic \
1870+ --enable-xauth-noauth \
1871 --enable-xauth-pam \
1872 --disable-blowfish \
1873+ --disable-fast \
1874 --disable-des # BSD-Young license
1875 #--with-user=strongswan --with-group=nogroup
1876 # --enable-kernel-pfkey --enable-kernel-klips \
1877@@ -190,12 +240,6 @@ endif
1878
1879 # add additional files not covered by upstream makefile...
1880 install --mode=0600 $(CURDIR)/debian/ipsec.secrets.proto $(CURDIR)/debian/strongswan-starter/etc/ipsec.secrets
1881- # also "patch" ipsec.conf to include the debconf-managed file
1882- echo >> $(CURDIR)/debian/strongswan-starter/etc/ipsec.conf
1883- echo "include /var/lib/strongswan/ipsec.conf.inc" >> $(CURDIR)/debian/strongswan-starter/etc/ipsec.conf
1884- # and to enable both IKEv1 and IKEv2 by default
1885- sed -r 's/^[ \t]+# *charonstart=(yes|no) */\tcharonstart=yes/' < $(CURDIR)/debian/strongswan-starter/etc/ipsec.conf > $(CURDIR)/debian/strongswan-starter/etc/ipsec.conf.tmp
1886- mv $(CURDIR)/debian/strongswan-starter/etc/ipsec.conf.tmp $(CURDIR)/debian/strongswan-starter/etc/ipsec.conf
1887
1888 # set permissions on ipsec.secrets and private key directories
1889 chmod 600 $(CURDIR)/debian/strongswan-starter/etc/ipsec.secrets
1890diff --git a/debian/strongswan-starter.install b/debian/strongswan-starter.install
1891index 9a4c0d1..b5250dc 100644
1892--- a/debian/strongswan-starter.install
1893+++ b/debian/strongswan-starter.install
1894@@ -16,3 +16,7 @@ usr/lib/ipsec/plugins/libstrongswan-stroke.so
1895 usr/share/strongswan/templates/config/plugins/stroke.conf
1896 etc/strongswan.d/charon/stroke.conf
1897 debian/usr.lib.ipsec.stroke /etc/apparmor.d/
1898+#pool
1899+usr/lib/ipsec/pool
1900+usr/share/strongswan/templates/config/strongswan.d/pool.conf
1901+etc/strongswan.d/pool.conf
1902diff --git a/debian/strongswan-starter.postinst b/debian/strongswan-starter.postinst
1903index 9e4d7b1..9b7c734 100644
1904--- a/debian/strongswan-starter.postinst
1905+++ b/debian/strongswan-starter.postinst
1906@@ -220,63 +220,6 @@ case "$1" in
1907 db_set strongswan/install_x509_certificate false
1908 fi
1909
1910- # lets see if we are already using dependency based booting or the correct runlevel parameters
1911- if ! ( [ "`find /etc/init.d/ -name '.depend.*'`" ] || [ "$runlevels" = "0K841K842S163S164S165S166K84" ] ); then
1912- db_fset strongswan/runlevel_changes seen false
1913- db_input high strongswan/runlevel_changes || true
1914- db_go
1915-
1916- # if the admin did not change the runlevels which got installed by older packages we can modify them
1917- if [ "$runlevels" = "0K346K34SS41" ] || [ "$runlevels" = "0K301K302S153S154S155S156K30" ] || [ "$runlevels" = "0K191K192S213S214S215S216K19" ]; then
1918- update-rc.d -f ipsec remove
1919- fi
1920-
1921- update-rc.d ipsec defaults 16 84 > /dev/null
1922- fi
1923-
1924- db_get strongswan/enable-oe
1925- if [ "$RET" != "true" ]; then
1926- echo -n "Disabling opportunistic encryption (OE) in config file ... "
1927- if [ -e $CONF_FILE ] && egrep -q "include /etc/ipsec.d/examples/no_oe.conf$" $CONF_FILE; then
1928- # also update to new-style config
1929- sed 's/.*include \/etc\/ipsec.d\/examples\/no_oe.conf/#include \/etc\/ipsec.d\/examples\/oe.conf/' < $CONF_FILE > $CONF_FILE.tmp
1930- mv $CONF_FILE.tmp $CONF_FILE
1931- echo -n "converted old config line to new format"
1932- fi
1933- if [ -e $CONF_FILE ] && egrep -q "^include /etc/ipsec.d/examples/oe.conf$" $CONF_FILE; then
1934- sed 's/include \/etc\/ipsec.d\/examples\/oe.conf/#include \/etc\/ipsec.d\/examples\/oe.conf/' < $CONF_FILE > $CONF_FILE.tmp
1935- mv $CONF_FILE.tmp $CONF_FILE
1936- echo "done"
1937- elif [ ! -e $CONF_FILE ]; then
1938- echo "#include /etc/ipsec.d/examples/oe.conf" > $CONF_FILE
1939- else
1940- echo "already disabled"
1941- fi
1942- else
1943- echo -n "Enabling opportunistic encryption (OE) in config file ... "
1944- if [ -e $CONF_FILE ] && egrep -q "include /etc/ipsec.d/examples/no_oe.conf$" $CONF_FILE; then
1945- # also update to new-style config
1946- sed 's/.*include \/etc\/ipsec.d\/examples\/no_oe.conf/include \/etc\/ipsec.d\/examples\/oe.conf/' < $CONF_FILE > $CONF_FILE.tmp
1947- mv $CONF_FILE.tmp $CONF_FILE
1948- echo -n "converted old config line to new format"
1949- fi
1950- if [ -e $CONF_FILE ] && egrep -q "^include /etc/ipsec.d/examples/oe.conf$" $CONF_FILE; then
1951- echo "already enabled"
1952- elif [ -e $CONF_FILE ] && egrep -q "^#.*include /etc/ipsec.d/examples/oe.conf$" $CONF_FILE; then
1953- sed 's/#.*include \/etc\/ipsec.d\/examples\/oe.conf/include \/etc\/ipsec.d\/examples\/oe.conf/' < $CONF_FILE > $CONF_FILE.tmp
1954- mv $CONF_FILE.tmp $CONF_FILE
1955- echo "done"
1956- elif [ ! -e $CONF_FILE ]; then
1957- echo "include /etc/ipsec.d/examples/oe.conf" > $CONF_FILE
1958- else
1959- cat <<EOF >> $CONF_FILE
1960-#Enable Opportunistic Encryption
1961-include /etc/ipsec.d/examples/oe.conf
1962-EOF
1963- echo "done"
1964- fi
1965- fi
1966-
1967 # disabled for now, until we can solve the don't-edit-conffiles issue
1968 #db_get strongswan/ikev1
1969 #if [ "$RET" != "true" ]; then
1970diff --git a/debian/strongswan-tnc-base.install b/debian/strongswan-tnc-base.install
1971new file mode 100644
1972index 0000000..a9e3f32
1973--- /dev/null
1974+++ b/debian/strongswan-tnc-base.install
1975@@ -0,0 +1,16 @@
1976+etc/strongswan.d/charon/tnccs-11.conf
1977+etc/strongswan.d/charon/tnccs-20.conf
1978+etc/strongswan.d/charon/tnccs-dynamic.conf
1979+etc/strongswan.d/charon/tnc-tnccs.conf
1980+etc/strongswan.d/imcv.conf
1981+etc/strongswan.d/tnc.conf
1982+usr/lib/ipsec/libimcv.*
1983+usr/lib/ipsec/libtnccs.so*
1984+usr/lib/ipsec/plugins/libstrongswan-tnccs-*.so
1985+usr/lib/ipsec/plugins/libstrongswan-tnc-tnccs.so
1986+usr/share/strongswan/templates/config/plugins/tnccs-11.conf
1987+usr/share/strongswan/templates/config/plugins/tnccs-20.conf
1988+usr/share/strongswan/templates/config/plugins/tnccs-dynamic.conf
1989+usr/share/strongswan/templates/config/plugins/tnc-tnccs.conf
1990+usr/share/strongswan/templates/config/strongswan.d/imcv.conf
1991+usr/share/strongswan/templates/config/strongswan.d/tnc.conf
1992diff --git a/debian/strongswan-tnc-client.install b/debian/strongswan-tnc-client.install
1993new file mode 100644
1994index 0000000..88449c6
1995--- /dev/null
1996+++ b/debian/strongswan-tnc-client.install
1997@@ -0,0 +1,5 @@
1998+etc/strongswan.d/charon/tnc-imc.conf
1999+usr/lib/ipsec/imcvs/imc-*.so
2000+usr/lib/ipsec/plugins/libstrongswan-tnc-imc.so
2001+usr/share/strongswan/swidtag/strongswan.org__strongSwan-*.swidtag
2002+usr/share/strongswan/templates/config/plugins/tnc-imc.conf
2003diff --git a/debian/strongswan-tnc-ifmap.install b/debian/strongswan-tnc-ifmap.install
2004new file mode 100644
2005index 0000000..3c8083b
2006--- /dev/null
2007+++ b/debian/strongswan-tnc-ifmap.install
2008@@ -0,0 +1,3 @@
2009+etc/strongswan.d/charon/tnc-ifmap.conf
2010+usr/lib/ipsec/plugins/libstrongswan-tnc-ifmap.so
2011+usr/share/strongswan/templates/config/plugins/tnc-ifmap.conf
2012diff --git a/debian/strongswan-tnc-pdp.install b/debian/strongswan-tnc-pdp.install
2013new file mode 100644
2014index 0000000..2534386
2015--- /dev/null
2016+++ b/debian/strongswan-tnc-pdp.install
2017@@ -0,0 +1,3 @@
2018+etc/strongswan.d/charon/tnc-pdp.conf
2019+usr/lib/ipsec/plugins/libstrongswan-tnc-pdp.so
2020+usr/share/strongswan/templates/config/plugins/tnc-pdp.conf
2021diff --git a/debian/strongswan-tnc-server.install b/debian/strongswan-tnc-server.install
2022new file mode 100644
2023index 0000000..da633f6
2024--- /dev/null
2025+++ b/debian/strongswan-tnc-server.install
2026@@ -0,0 +1,10 @@
2027+etc/strongswan.d/attest.conf
2028+etc/strongswan.d/charon/tnc-imv.conf
2029+usr/lib/ipsec/attest
2030+usr/lib/ipsec/imcvs/imv-*.so
2031+usr/lib/ipsec/_imv_policy
2032+usr/lib/ipsec/imv_policy_manager
2033+usr/lib/ipsec/plugins/libstrongswan-tnc-imv.so
2034+usr/share/strongswan/templates/config/plugins/tnc-imv.conf
2035+usr/share/strongswan/templates/config/strongswan.d/attest.conf
2036+usr/share/strongswan/templates/database/imv/*.sql
2037diff --git a/debian/usr.sbin.charon-systemd b/debian/usr.sbin.charon-systemd
2038index e1769f2..b3daa46 100644
2039--- a/debian/usr.sbin.charon-systemd
2040+++ b/debian/usr.sbin.charon-systemd
2041@@ -19,6 +19,7 @@
2042 #include <abstractions/authentication>
2043 #include <abstractions/openssl>
2044 #include <abstractions/p11-kit>
2045+ #include <abstractions/mysql>
2046
2047 capability ipc_lock,
2048 capability net_admin,
2049@@ -71,6 +72,10 @@
2050
2051 /var/lib/strongswan/* r,
2052
2053+ # There is no systemd abstraction in base yet (https://gitlab.com/apparmor/apparmor/issues/5)
2054+ # until there is one, we need this for systemd notifications (LP: #1765652)
2055+ /{,var/}run/systemd/notify w,
2056+
2057 # Site-specific additions and overrides. See local/README for details.
2058 #include <local/usr.sbin.charon-systemd>
2059 }

Subscribers

People subscribed via source and target branches