Merge ~slyon/ubuntu/+source/strongswan:merge-lp2125990-resolute into ubuntu/+source/strongswan:debian/sid

Proposed by Lukas Märdian
Status: Merged
Approved by: git-ubuntu bot
Approved revision: not available
Merge reported by: Lukas Märdian
Merged at revision: 328a08f3926ae82768b04d8059789ec9561596f9
Proposed branch: ~slyon/ubuntu/+source/strongswan:merge-lp2125990-resolute
Merge into: ubuntu/+source/strongswan:debian/sid
Diff against target: 2817 lines (+2527/-4)
8 files modified
debian/changelog (+2043/-0)
debian/control (+7/-3)
debian/libcharon-extra-plugins.install (+6/-0)
debian/rules (+2/-0)
debian/tests/control (+6/-0)
debian/tests/host-to-host (+401/-0)
debian/tests/utils (+61/-0)
debian/usr.sbin.swanctl (+1/-1)
Reviewer Review Type Date Requested Status
git-ubuntu bot Approve
Jonas Jelten (community) Approve
Canonical Server Reporter Pending
Review via email: mp+496258@code.launchpad.net

Description of the change

PPA: https://launchpad.net/~slyon/+archive/ubuntu/merge-lp2125990-strongswan/+packages

DEP-8:
$ ppa tests ppa:slyon/merge-lp2125990-strongswan -r resolute

Range-diff:
$ git range-diff lp2125990/old/debian..lp2125990/logical/6.0.1-6ubuntu5 lp2125990/new/debian..merge-lp2125990-resolute

To post a comment you must log in.
Revision history for this message
Jonas Jelten (jj) wrote :

- host-to-host test fails with "Command not found"
- generated? test files are in the source package
- apart from that looks great!

Review Symbols:
+ = OK
! = Not OK
? = Question
N = Not applicable
S = Skipped

* Changelog:
  - [+] Changelog entry has correct version and targeted codename
  - [+] Correct formatting of changelog items
  - [+] Bug references correct
  - [+] Old content and logical tag match as expected (Package Merge)

* Release notes and Documentation
  - [N] Added, updated, or enqueued relevant documentation.
  - [N] Added, updated, or enqueued relevant release notes.

* Package Merge - indirect changes:
  - [+] No upstream changes that need adapting due to Ubuntu's design
  - [+] No further upstream version/changes to consider
  - [+] Debian changes are compatible with the Ubuntu implementation
  - [+] update-maintainer has been run

* Package Merge - old delta:
  - [+] Dropped changes are OK to be dropped
  - [+] Nothing else to drop
  - [+] Old delta was forwarded to upstream/Debian or marked as Ubuntu-only

* New delta in debian/*:
  - [N] New changes in debian/* are OK
  - [N] New delta was forwarded to Debian or marked as Ubuntu-only

* New patches:
  - [+] No new patches added
  - [S] Patches match those proposed/committed upstream
  - [S] Patches correctly included in debian/patches/series
  - [S] Patches have correct DEP-3 metadata
  - [S] Patches follow our style choices
  - [S] New code not from upstream was forwarded or marked as Ubuntu-only

* Git/maintenance:
  - [+] Commits are properly split (more important on -dev than on SRUs)

* Build/Test:
  - [+] Build is OK
  - [N] This is an SRU, the validation instructions are ok
  - [N] Testcases added or adapted (N/A if not strictly required or already present)
  - [!] autopkgtest against the PPA package passes (if possible, evidence was provided already)
  - [+] Based on PPA builds and the build-log, no new component mismatch expected
  - [+] Verified PPA package installs/uninstalls
  - [!] Verified PPA source package matches Merge Proposal source package
        Only in src-deb/testing/tests/*/*/hosts/*/etc/swanctl: rsa
        Only in src-deb/testing/tests/*/*/hosts/*/etc/swanctl: x509
        Only in src-deb/testing/tests/*/*/hosts/*/etc/swanctl: x509ca
  - [S] Verified function manually

review: Approve
Revision history for this message
git-ubuntu bot (git-ubuntu-bot) wrote :

Approvers: slyon, jj
Uploaders: slyon
MP auto-approved

review: Approve
Revision history for this message
Lukas Märdian (slyon) wrote :

I think the additional test files are fine: those are just showing up because they are in .gitignore, and still added to the git tree.

When comparing to the orig.tar.bz2 file, I do only see changes in .git/ and debian/ – as expected:
$ git diff --no-index ../strongswan-6.0.4/ . |diffstat

The failing test needs to be investigated. I'm upgrading to the latest 6.0.4 to see if this makes any difference..

Revision history for this message
Lukas Märdian (slyon) wrote :

The interesting part of the test failure seems to be this:

1386s Creating host containers
1386s Launching container moon with release resolute
1402s Waiting for container moon to be ready ..Connection to 10.6.149.96 22 port [tcp/ssh] succeeded!
1402s 2025-11-25 15:27:41,994 - util.py[WARNING]: Failed loading yaml blob. Yaml load allows (<class 'dict'>,) root types, but got str instead
1403s cloud-init status --wait failed on container moon

from debian/tests/utils:wait_container_ready

It's receiving a YAML string instead of a dict :-/

Revision history for this message
Jonas Jelten (jj) wrote :

That looks like bug 2131809, which should be fixed in resolute?

Revision history for this message
Lukas Märdian (slyon) wrote :

Indeed, very much so! Also, it seems like a re-run of the DEP-8 test is passing. Still I see failures locally, but those might be unrelated local config issues.

I rebased on 6.0.4 to get the latest security updates and triggered another PPA build. I'd assume those tests to be green, once ready, and I'll upload after 6.0.4 DEP-8 is confirmed.

Revision history for this message
Lukas Märdian (slyon) wrote :

DEP-8 on 6.0.4 is now green, I'm uploading.

$ ppa tests ppa:slyon/merge-lp2125990-strongswan
[...]
* Results:
  - strongswan: resolute/strongswan/6.0.4-1ubuntu1~ppa1 [amd64]
    + ✅ strongswan on resolute for amd64 @ 20.01.26 10:41:58 Log️ 🗒️
  - strongswan: resolute/strongswan/6.0.4-1ubuntu1~ppa1 [arm64]
    + ✅ strongswan on resolute for arm64 @ 20.01.26 10:42:05 Log️ 🗒️
  - strongswan: resolute/strongswan/6.0.4-1ubuntu1~ppa1 [armhf]
    + ✅ strongswan on resolute for armhf @ 20.01.26 10:35:24 Log️ 🗒️
  - strongswan: resolute/strongswan/6.0.4-1ubuntu1~ppa1 [ppc64el]
    + ✅ strongswan on resolute for ppc64el @ 20.01.26 10:40:17 Log️ 🗒️
  - strongswan: resolute/strongswan/6.0.4-1ubuntu1~ppa1 [s390x]
    + Pending ...

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/debian/changelog b/debian/changelog
2index 08a0691..563f2cc 100644
3--- a/debian/changelog
4+++ b/debian/changelog
5@@ -1,3 +1,33 @@
6+strongswan (6.0.4-1ubuntu1) resolute; urgency=medium
7+
8+ * Merge with Debian unstable (LP: #2125990). Remaining changes:
9+ - d/control: strongswan-starter hard-depends on strongswan-charon,
10+ therefore bump the dependency from Recommends to Depends. At the same
11+ time avoid a circular dependency by dropping
12+ strongswan-charon->strongswan-starter from Depends to Recommends as the
13+ binaries can work without the services but not vice versa.
14+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
15+ + d/control: update libcharon-extra-plugins description.
16+ + d/libcharon-extra-plugins.install: install .so and conf files.
17+ + d/rules: add plugins to the configuration arguments.
18+ - d/t/{control,host-to-host,utils}: new host-to-host test (LP #1999525)
19+ - d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl (LP #1999935)
20+ * Dropped changes:
21+ - Cherry-pick upstream commits to fix FTBFS with GCC-15 C23.
22+ [applied in 6.0.2]
23+ + debian/patches/gcc15-compat/*
24+ - d/t/host-to-host: disable DNSSEC via negative trust anchor for lxd domain
25+ (LP #2119652)
26+ [not needed anymore, as DNSSEC allow-downgrade was dropped by default]
27+ - SECURITY UPDATE: Buffer Overflow When Handling EAP-MSCHAPv2 Failure.
28+ Requests
29+ [applied in 6.0.3]
30+ + debian/patches/CVE-2025-62291.patch: fix length check for Failure
31+ Request packets on the client in
32+ src/libcharon/plugins/eap_mschapv2/eap_mschapv2.c.
33+
34+ -- Lukas Märdian <slyon@ubuntu.com> Tue, 20 Jan 2026 09:58:16 +0100
35+
36 strongswan (6.0.4-1) unstable; urgency=medium
37
38 * New upstream version 6.0.4 (Closes: #1122971)
39@@ -22,6 +52,61 @@ strongswan (6.0.2-1) unstable; urgency=medium
40
41 -- Yves-Alexis Perez <corsac@debian.org> Fri, 22 Aug 2025 10:45:05 +0200
42
43+strongswan (6.0.1-6ubuntu5) resolute; urgency=medium
44+
45+ * SECURITY UPDATE: Buffer Overflow When Handling EAP-MSCHAPv2 Failure
46+ Requests
47+ - debian/patches/CVE-2025-62291.patch: fix length check for Failure
48+ Request packets on the client in
49+ src/libcharon/plugins/eap_mschapv2/eap_mschapv2.c.
50+ - CVE-2025-62291
51+
52+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 21 Oct 2025 10:11:00 -0400
53+
54+strongswan (6.0.1-6ubuntu4) questing; urgency=medium
55+
56+ * d/t/host-to-host: configure negative trust anchor for lxd domain
57+ Do this instead of disabling DNSSEC per-interface (LP: #2119652)
58+
59+ -- Nick Rosbrook <enr0n@ubuntu.com> Thu, 21 Aug 2025 12:46:41 -0400
60+
61+strongswan (6.0.1-6ubuntu3) questing; urgency=medium
62+
63+ * d/t/host-to-host: disable DNSSEC in container during test (LP: #2119652)
64+
65+ -- Nick Rosbrook <enr0n@ubuntu.com> Tue, 19 Aug 2025 10:26:51 -0400
66+
67+strongswan (6.0.1-6ubuntu2) questing; urgency=medium
68+
69+ * Cherry-pick upstream commits to fix FTBFS with GCC-15 C23.
70+ - debian/patches/gcc15-compat/*
71+
72+ -- Lukas Märdian <slyon@ubuntu.com> Thu, 31 Jul 2025 09:47:21 +0200
73+
74+strongswan (6.0.1-6ubuntu1) questing; urgency=medium
75+
76+ * Merge with Debian unstable (LP: #2110449). Remaining changes:
77+ - d/control: strongswan-starter hard-depends on strongswan-charon,
78+ therefore bump the dependency from Recommends to Depends. At the same
79+ time avoid a circular dependency by dropping
80+ strongswan-charon->strongswan-starter from Depends to Recommends as the
81+ binaries can work without the services but not vice versa.
82+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
83+ + d/control: update libcharon-extra-plugins description.
84+ + d/libcharon-extra-plugins.install: install .so and conf files.
85+ + d/rules: add plugins to the configuration arguments.
86+ - d/t/{control,host-to-host,utils}: new host-to-host test
87+ (LP #1999525)
88+ - d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl
89+ (LP #1999935)
90+ * Drop changes:
91+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
92+ [ deprecated & dropped upstream as of 6.0.0 ]
93+ - Remove conf files of plugins removed from libcharon-extra-plugins
94+ [ Not relevant anymore after > 1 LTS cyle ]
95+
96+ -- Lukas Märdian <slyon@ubuntu.com> Thu, 24 Jul 2025 15:43:37 +0200
97+
98 strongswan (6.0.1-6) unstable; urgency=medium
99
100 * d/control: keep strongswan-charon and strongswan-starter as acceptable
101@@ -102,6 +187,59 @@ strongswan (6.0.0-1) unstable; urgency=medium
102
103 -- Yves-Alexis Perez <corsac@debian.org> Fri, 21 Feb 2025 14:09:27 +0100
104
105+strongswan (5.9.13-2ubuntu5) questing; urgency=medium
106+
107+ * No-change rebuild for libxml2 soname change.
108+
109+ -- Matthias Klose <doko@ubuntu.com> Tue, 20 May 2025 12:22:36 +0200
110+
111+strongswan (5.9.13-2ubuntu4) noble; urgency=medium
112+
113+ * No-change rebuild for CVE-2024-3094
114+
115+ -- William Grant <wgrant@ubuntu.com> Mon, 01 Apr 2024 15:55:30 +1100
116+
117+strongswan (5.9.13-2ubuntu3) noble; urgency=medium
118+
119+ * No-change rebuild against libcurl4t64
120+
121+ -- Steve Langasek <steve.langasek@ubuntu.com> Sat, 16 Mar 2024 07:03:41 +0000
122+
123+strongswan (5.9.13-2ubuntu2) noble; urgency=medium
124+
125+ * No-change rebuild against libssl3t64
126+
127+ -- Steve Langasek <steve.langasek@ubuntu.com> Mon, 04 Mar 2024 21:28:04 +0000
128+
129+strongswan (5.9.13-2ubuntu1) noble; urgency=medium
130+
131+ * Merge with Debian unstable (LP: #2050099). Remaining changes:
132+ - d/control: strongswan-starter hard-depends on strongswan-charon,
133+ therefore bump the dependency from Recommends to Depends. At the same
134+ time avoid a circular dependency by dropping
135+ strongswan-charon->strongswan-starter from Depends to Recommends as the
136+ binaries can work without the services but not vice versa.
137+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
138+ + d/control: mention plugins in package description
139+ + d/rules: enable ntru at build time
140+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
141+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
142+ + d/control: update libcharon-extra-plugins description.
143+ + d/libcharon-extra-plugins.install: install .so and conf files.
144+ + d/rules: add plugins to the configuration arguments.
145+ - Remove conf files of plugins removed from libcharon-extra-plugins
146+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
147+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
148+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
149+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
150+ properly.
151+ - d/t/{control,host-to-host,utils}: new host-to-host test
152+ (LP #1999525)
153+ - d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl
154+ (LP #1999935)
155+
156+ -- Andreas Hasenack <andreas@canonical.com> Mon, 22 Jan 2024 11:48:33 -0300
157+
158 strongswan (5.9.13-2) unstable; urgency=medium
159
160 * d/control: drop build-dep on systemd (Closes: #1060509)
161@@ -114,6 +252,42 @@ strongswan (5.9.13-1) unstable; urgency=medium
162
163 -- Yves-Alexis Perez <corsac@debian.org> Thu, 11 Jan 2024 17:09:17 +0100
164
165+strongswan (5.9.12-1ubuntu1) noble; urgency=medium
166+
167+ * Merge with Debian unstable (LP: #2040430). Remaining changes:
168+ - d/control: strongswan-starter hard-depends on strongswan-charon,
169+ therefore bump the dependency from Recommends to Depends. At the same
170+ time avoid a circular dependency by dropping
171+ strongswan-charon->strongswan-starter from Depends to Recommends as the
172+ binaries can work without the services but not vice versa.
173+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
174+ + d/control: mention plugins in package description
175+ + d/rules: enable ntru at build time
176+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
177+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
178+ + d/control: update libcharon-extra-plugins description.
179+ + d/libcharon-extra-plugins.install: install .so and conf files.
180+ + d/rules: add plugins to the configuration arguments.
181+ - Remove conf files of plugins removed from libcharon-extra-plugins
182+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
183+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
184+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
185+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
186+ properly.
187+ - d/t/{control,host-to-host,utils}: new host-to-host test
188+ (LP #1999525)
189+ - d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl
190+ (LP #1999935)
191+ * Dropped:
192+ - SECURITY UPDATE: Buffer Overflow When Handling DH Public Values
193+ + debian/patches/CVE-2023-41913.patch: Validate DH public key to fix
194+ potential buffer overflow in
195+ src/charon-tkm/src/tkm/tkm_diffie_hellman.c.
196+ + CVE-2023-41913
197+ [Fixed upstream in 5.9.12]
198+
199+ -- Andreas Hasenack <andreas@canonical.com> Thu, 04 Jan 2024 10:25:23 -0300
200+
201 strongswan (5.9.12-1) unstable; urgency=medium
202
203 * New upstream version 5.9.12
204@@ -130,6 +304,52 @@ strongswan (5.9.11-2) unstable; urgency=medium
205
206 -- Yves-Alexis Perez <corsac@debian.org> Mon, 13 Nov 2023 20:22:47 +0100
207
208+strongswan (5.9.11-1ubuntu2) noble; urgency=medium
209+
210+ * SECURITY UPDATE: Buffer Overflow When Handling DH Public Values
211+ - debian/patches/CVE-2023-41913.patch: Validate DH public key to fix
212+ potential buffer overflow in
213+ src/charon-tkm/src/tkm/tkm_diffie_hellman.c.
214+ - CVE-2023-41913
215+
216+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 07 Nov 2023 11:43:00 +0200
217+
218+strongswan (5.9.11-1ubuntu1) mantic; urgency=medium
219+
220+ * Merge with Debian unstable (LP: #2018113). Remaining changes:
221+ - d/control: strongswan-starter hard-depends on strongswan-charon,
222+ therefore bump the dependency from Recommends to Depends. At the same
223+ time avoid a circular dependency by dropping
224+ strongswan-charon->strongswan-starter from Depends to Recommends as the
225+ binaries can work without the services but not vice versa.
226+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
227+ + d/control: mention plugins in package description
228+ + d/rules: enable ntru at build time
229+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
230+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
231+ + d/control: update libcharon-extra-plugins description.
232+ + d/libcharon-extra-plugins.install: install .so and conf files.
233+ + d/rules: add plugins to the configuration arguments.
234+ - Remove conf files of plugins removed from libcharon-extra-plugins
235+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
236+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
237+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
238+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
239+ properly.
240+ - d/t/{control,host-to-host,utils}: new host-to-host test
241+ (LP #1999525)
242+ - d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl
243+ (LP #1999935)
244+ * Dropped:
245+ - SECURITY UPDATE: Incorrectly Accepted Untrusted Public Key With
246+ Incorrect Refcount
247+ + debian/patches/CVE-2023-26463.patch: fix authentication bypass and
248+ expired pointer dereference in src/libtls/tls_server.c.
249+ + CVE-2023-26463
250+ [Fixed upstream in 5.9.10]
251+
252+ -- Andreas Hasenack <andreas@canonical.com> Fri, 23 Jun 2023 14:05:18 -0300
253+
254 strongswan (5.9.11-1) unstable; urgency=medium
255
256 * New upstream version 5.9.10
257@@ -149,6 +369,66 @@ strongswan (5.9.8-4) unstable; urgency=medium
258
259 -- Yves-Alexis Perez <corsac@debian.org> Sun, 26 Feb 2023 09:40:09 +0100
260
261+strongswan (5.9.8-3ubuntu4) lunar; urgency=medium
262+
263+ * d/t/utils: also give `cloud-init status --wait` the same amount of
264+ ${limit} seconds to complete, and bump limit to 5min. The logs show
265+ the container started up fine, with an IP.
266+
267+ -- Andreas Hasenack <andreas@canonical.com> Mon, 06 Mar 2023 11:00:58 -0300
268+
269+strongswan (5.9.8-3ubuntu3) lunar; urgency=medium
270+
271+ * SECURITY UPDATE: Incorrectly Accepted Untrusted Public Key With
272+ Incorrect Refcount
273+ - debian/patches/CVE-2023-26463.patch: fix authentication bypass and
274+ expired pointer dereference in src/libtls/tls_server.c.
275+ - CVE-2023-26463
276+
277+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 02 Mar 2023 12:58:47 -0500
278+
279+strongswan (5.9.8-3ubuntu2) lunar; urgency=medium
280+
281+ * d/usr.sbin.swanctl: allow "m" flag for /usr/sbin/swanctl
282+ (LP: #1999935)
283+
284+ -- Andreas Hasenack <andreas@canonical.com> Fri, 16 Dec 2022 16:07:51 -0300
285+
286+strongswan (5.9.8-3ubuntu1) lunar; urgency=medium
287+
288+ * Merge with Debian unstable (LP: #1993449). Remaining changes:
289+ - d/control: strongswan-starter hard-depends on strongswan-charon,
290+ therefore bump the dependency from Recommends to Depends. At the same
291+ time avoid a circular dependency by dropping
292+ strongswan-charon->strongswan-starter from Depends to Recommends as the
293+ binaries can work without the services but not vice versa.
294+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
295+ + d/control: mention plugins in package description
296+ + d/rules: enable ntru at build time
297+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
298+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
299+ + d/control: update libcharon-extra-plugins description.
300+ + d/libcharon-extra-plugins.install: install .so and conf files.
301+ + d/rules: add plugins to the configuration arguments.
302+ - Remove conf files of plugins removed from libcharon-extra-plugins
303+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
304+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
305+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
306+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
307+ properly.
308+ * Dropped:
309+ - SECURITY UPDATE: Using Untrusted URIs for Revocation Checking
310+ + debian/patches/CVE-2022-40617.patch: do online revocation checks only
311+ after basic trust chain validation in
312+ src/libstrongswan/credentials/credential_manager.c.
313+ + CVE-2022-40617
314+ [Included upstream in 5.9.8]
315+ * Added:
316+ - d/t/{control,host-to-host,utils}: new host-to-host test
317+ (LP: #1999525)
318+
319+ -- Andreas Hasenack <andreas@canonical.com> Tue, 13 Dec 2022 11:04:24 -0300
320+
321 strongswan (5.9.8-3) unstable; urgency=medium
322
323 * d/tests: also drop _copyright test since the util is gone as well
324@@ -177,6 +457,46 @@ strongswan (5.9.8-1) unstable; urgency=medium
325
326 -- Yves-Alexis Perez <corsac@debian.org> Wed, 05 Oct 2022 15:25:18 +0200
327
328+strongswan (5.9.6-1ubuntu2) kinetic; urgency=medium
329+
330+ * SECURITY UPDATE: Using Untrusted URIs for Revocation Checking
331+ - debian/patches/CVE-2022-40617.patch: do online revocation checks only
332+ after basic trust chain validation in
333+ src/libstrongswan/credentials/credential_manager.c.
334+ - CVE-2022-40617
335+
336+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 05 Oct 2022 08:11:03 -0400
337+
338+strongswan (5.9.6-1ubuntu1) kinetic; urgency=medium
339+
340+ * Merge with Debian unstable (LP: #1971328). Remaining changes:
341+ - d/control: strongswan-starter hard-depends on strongswan-charon,
342+ therefore bump the dependency from Recommends to Depends. At the same
343+ time avoid a circular dependency by dropping
344+ strongswan-charon->strongswan-starter from Depends to Recommends as the
345+ binaries can work without the services but not vice versa.
346+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
347+ + d/control: mention plugins in package description
348+ + d/rules: enable ntru at build time
349+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
350+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP #1878887)
351+ + d/control: update libcharon-extra-plugins description.
352+ + d/libcharon-extra-plugins.install: install .so and conf files.
353+ + d/rules: add plugins to the configuration arguments.
354+ - Remove conf files of plugins removed from libcharon-extra-plugins
355+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
356+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
357+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
358+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
359+ properly.
360+ * Dropped:
361+ - d/p/lp1964977-fix-ipsec-pki-segfault.patch: Fix "ipsec pki"
362+ segmentation fault; don't access OpenSSL objects inside atexit()
363+ handlers. (LP #1964977)
364+ [included by upstream in version 5.9.6]
365+
366+ -- Lucas Kanashiro <kanashiro@ubuntu.com> Fri, 10 Jun 2022 15:03:17 -0300
367+
368 strongswan (5.9.6-1) unstable; urgency=medium
369
370 * New upstream version 5.9.6
371@@ -185,6 +505,42 @@ strongswan (5.9.6-1) unstable; urgency=medium
372
373 -- Yves-Alexis Perez <corsac@debian.org> Sat, 07 May 2022 20:19:18 +0200
374
375+strongswan (5.9.5-2ubuntu2) jammy; urgency=medium
376+
377+ * d/p/lp1964977-fix-ipsec-pki-segfault.patch: Fix "ipsec pki"
378+ segmentation fault; don't access OpenSSL objects inside atexit()
379+ handlers. (LP: #1964977)
380+
381+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Fri, 18 Mar 2022 14:24:34 -0400
382+
383+strongswan (5.9.5-2ubuntu1) jammy; urgency=medium
384+
385+ * Merge with Debian unstable. Remaining changes:
386+ - d/control: strongswan-starter hard-depends on strongswan-charon,
387+ therefore bump the dependency from Recommends to Depends. At the same
388+ time avoid a circular dependency by dropping
389+ strongswan-charon->strongswan-starter from Depends to Recommends as the
390+ binaries can work without the services but not vice versa.
391+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
392+ + d/control: mention plugins in package description
393+ + d/rules: enable ntru at build time
394+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
395+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887)
396+ + d/control: update libcharon-extra-plugins description.
397+ + d/libcharon-extra-plugins.install: install .so and conf files.
398+ + d/rules: add plugins to the configuration arguments.
399+ - Remove conf files of plugins removed from libcharon-extra-plugins
400+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
401+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
402+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
403+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
404+ properly.
405+ * Dropped patches included in new version:
406+ - debian/patches/CVE-2021-45079.patch
407+ - debian/patches/load-legacy-provider-in-openssl3.patch
408+
409+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 03 Feb 2022 10:49:49 -0500
410+
411 strongswan (5.9.5-2) unstable; urgency=medium
412
413 * actually fix lintian overrides
414@@ -200,6 +556,60 @@ strongswan (5.9.5-1) unstable; urgency=medium
415
416 -- Yves-Alexis Perez <corsac@debian.org> Wed, 26 Jan 2022 14:38:54 +0100
417
418+strongswan (5.9.4-1ubuntu4) jammy; urgency=medium
419+
420+ * SECURITY UPDATE: Incorrect Handling of Early EAP-Success Messages
421+ - debian/patches/CVE-2021-45079.patch: enforce failure if MSK
422+ generation fails in src/libcharon/plugins/eap_gtc/eap_gtc.c,
423+ src/libcharon/plugins/eap_md5/eap_md5.c,
424+ src/libcharon/plugins/eap_radius/eap_radius.c,
425+ src/libcharon/sa/eap/eap_method.h,
426+ src/libcharon/sa/ikev2/authenticators/eap_authenticator.c.
427+ - CVE-2021-45079
428+
429+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 01 Feb 2022 07:23:37 -0500
430+
431+strongswan (5.9.4-1ubuntu3) jammy; urgency=medium
432+
433+ * No-change rebuild against libssl3
434+
435+ -- Steve Langasek <steve.langasek@ubuntu.com> Thu, 09 Dec 2021 00:19:38 +0000
436+
437+strongswan (5.9.4-1ubuntu2) jammy; urgency=medium
438+
439+ * Add d/p/load-legacy-provider-in-openssl3.patch.
440+ Upstream cherry-pick to fix FTBFS against OpenSSL 3.0. (LP: #1946213)
441+
442+ -- Paride Legovini <paride@ubuntu.com> Wed, 17 Nov 2021 17:04:27 +0100
443+
444+strongswan (5.9.4-1ubuntu1) jammy; urgency=medium
445+
446+ * Merge with Debian unstable. Remaining changes:
447+ - d/control: strongswan-starter hard-depends on strongswan-charon,
448+ therefore bump the dependency from Recommends to Depends. At the same
449+ time avoid a circular dependency by dropping
450+ strongswan-charon->strongswan-starter from Depends to Recommends as the
451+ binaries can work without the services but not vice versa.
452+ - re-add post-quantum encryption algorithm (NTRU) (LP #1863749)
453+ + d/control: mention plugins in package description
454+ + d/rules: enable ntru at build time
455+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
456+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887)
457+ + d/control: update libcharon-extra-plugins description.
458+ + d/libcharon-extra-plugins.install: install .so and conf files.
459+ + d/rules: add plugins to the configuration arguments.
460+ - Remove conf files of plugins removed from libcharon-extra-plugins
461+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
462+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
463+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
464+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
465+ properly.
466+ * Dropped changes:
467+ - Compile the tpm plugin against the tpm2 software stack (tss2).
468+ Merged in Debian (5.9.4-1).
469+
470+ -- Paride Legovini <paride@ubuntu.com> Fri, 12 Nov 2021 12:34:30 +0100
471+
472 strongswan (5.9.4-1) unstable; urgency=medium
473
474 [ Paride Legovini ]
475@@ -216,6 +626,62 @@ strongswan (5.9.4-1) unstable; urgency=medium
476
477 -- Yves-Alexis Perez <corsac@debian.org> Tue, 19 Oct 2021 22:34:40 +0200
478
479+strongswan (5.9.1-1ubuntu3.1) impish-security; urgency=medium
480+
481+ * SECURITY UPDATE: Integer Overflow in gmp Plugin
482+ - debian/patches/CVE-2021-41990.patch: reject RSASSA-PSS params with
483+ negative salt length in
484+ src/libstrongswan/credentials/keys/signature_params.c,
485+ src/libstrongswan/plugins/gmp/gmp_rsa_public_key.c.
486+ - CVE-2021-41990
487+ * SECURITY UPDATE: Integer Overflow When Replacing Certificates in Cache
488+ - debian/patches/CVE-2021-41991.patch: prevent crash due to integer
489+ overflow/sign change in
490+ src/libstrongswan/credentials/sets/cert_cache.c.
491+ - CVE-2021-41991
492+
493+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 18 Oct 2021 13:10:30 -0400
494+
495+strongswan (5.9.1-1ubuntu3) impish; urgency=medium
496+
497+ * Compile the tpm plugin against the tpm2 software stack (tss2)
498+ (Debian packaging cherry-pick, LP: #1940079)
499+ - d/rules: add the --enable-tss-tss2 configure flag
500+ - d/control: add Build-Depends: libtss2-dev
501+
502+ -- Paride Legovini <paride@ubuntu.com> Thu, 16 Sep 2021 11:40:38 +0200
503+
504+strongswan (5.9.1-1ubuntu2) impish; urgency=medium
505+
506+ * No-change rebuild due to OpenLDAP soname bump.
507+
508+ -- Sergio Durigan Junior <sergio.durigan@canonical.com> Mon, 21 Jun 2021 18:09:22 -0400
509+
510+strongswan (5.9.1-1ubuntu1) hirsute; urgency=medium
511+
512+ * Merge with Debian unstable. Remaining changes:
513+ - d/control: strongswan-starter hard-depends on strongswan-charon,
514+ therefore bump the dependency from Recommends to Depends. At the same
515+ time avoid a circular dependency by dropping
516+ strongswan-charon->strongswan-starter from Depends to Recommends as the
517+ binaries can work without the services but not vice versa.
518+ - re-add post-quantum encryption algorithm (NTRU) (LP: 1863749)
519+ + d/control: mention plugins in package description
520+ + d/rules: enable ntru at build time
521+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
522+ - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887)
523+ + d/control: update libcharon-extra-plugins description.
524+ + d/libcharon-extra-plugins.install: install .so and conf files.
525+ + d/rules: add plugins to the configuration arguments.
526+ - Remove conf files of plugins removed from libcharon-extra-plugins
527+ + The conf file of the following plugins were removed: eap-aka-3gpp2,
528+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
529+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
530+ + Created d/libcharon-extra-plugins.maintscript to handle the removals
531+ properly.
532+
533+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 19 Jan 2021 12:39:11 +0100
534+
535 strongswan (5.9.1-1) unstable; urgency=medium
536
537 * New upstream version 5.9.1
538@@ -230,6 +696,45 @@ strongswan (5.9.0-1) unstable; urgency=medium
539
540 -- Yves-Alexis Perez <corsac@debian.org> Thu, 17 Sep 2020 10:21:30 +0200
541
542+strongswan (5.8.4-1ubuntu2) groovy; urgency=medium
543+
544+ * Re-enable eap-{dynamic,peap} libcharon plugins (LP: #1878887)
545+ - d/control: update libcharon-extra-plugins description.
546+ - d/libcharon-extra-plugins.install: install .so and conf files.
547+ - d/rules: add plugins to the configuration arguments.
548+ * Remove conf files of plugins removed from libcharon-extra-plugins
549+ - The conf file of the following plugins were removed: eap-aka-3gpp2,
550+ eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym,
551+ eap-simaka-reauth, eap-simaka-sql, xauth-noauth.
552+ - Created d/libcharon-extra-plugins.maintscript to handle the removals
553+ properly.
554+
555+ -- Lucas Kanashiro <kanashiro@ubuntu.com> Thu, 21 May 2020 14:53:05 -0300
556+
557+strongswan (5.8.4-1ubuntu1) groovy; urgency=medium
558+
559+ * Merge with Debian unstable. Remaining changes:
560+ - d/control: strongswan-starter hard-depends on strongswan-charon,
561+ therefore bump the dependency from Recommends to Depends. At the same
562+ time avoid a circular dependency by dropping
563+ strongswan-charon->strongswan-starter from Depends to Recommends as the
564+ binaries can work without the services but not vice versa.
565+ - re-add post-quantum encryption algorithm (NTRU) (LP: 1863749)
566+ + d/control: mention plugins in package description
567+ + d/rules: enable ntru at build time
568+ + d/libstrongswan-extra-plugins.install: ship config and shared objects
569+ * Dropped:
570+ - d/control: build-depend on libiptc-dev to avoid FTBFS (LP: #1861975)
571+ This is needed due to changes in regard to Debian bug 947176 and 939243
572+ and can later be dropped again.
573+ [applied by Debian in version 5.8.2-2]
574+ - d/control: Transition from former Ubuntu only libcharon-standard-plugins
575+ to common libcharon-extauth-plugins (drop after 20.04)
576+ - d/control: Transition from strongswan-tnc-* being in extra packages
577+ to libcharon-extra-plugins (drop after 20.04)
578+
579+ -- Lucas Kanashiro <lucas.kanashiro@canonical.com> Thu, 30 Apr 2020 18:06:55 -0300
580+
581 strongswan (5.8.4-1) unstable; urgency=medium
582
583 * New upstream version 5.8.4 (Closes: #956446)
584@@ -245,6 +750,43 @@ strongswan (5.8.2-2) unstable; urgency=medium
585
586 -- Yves-Alexis Perez <corsac@debian.org> Thu, 13 Feb 2020 22:46:40 +0100
587
588+strongswan (5.8.2-1ubuntu3) focal; urgency=medium
589+
590+ * Reverting part of 5.8.2-1ubuntu2 changes to remove BLISS again as
591+ there is a potential local side-channel attack on strongSwan's BLISS
592+ implementation (https://eprint.iacr.org/2017/505). (LP: #1866765)
593+
594+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 10 Mar 2020 07:56:56 +0100
595+
596+strongswan (5.8.2-1ubuntu2) focal; urgency=medium
597+
598+ * re-add post-quantum computer signature scheme (BLISS) and encryption
599+ algorithm (NTRU) as well as the dependent nttfft library (LP: #1863749)
600+ - d/control: mention plugins in package description
601+ - d/rules: enable ntru and bliss at build time
602+ - d/libstrongswan-extra-plugins.install: ship config and shared objects
603+
604+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 04 Mar 2020 07:54:26 +0100
605+
606+strongswan (5.8.2-1ubuntu1) focal; urgency=medium
607+
608+ * Merge with Debian unstable (LP: #1861971). Remaining changes:
609+ - d/control: Transition from strongswan-tnc-* being in extra packages
610+ to libcharon-extra-plugins (drop after 20.04)
611+ - d/control: Transition from former Ubuntu only libcharon-standard-plugins
612+ to common libcharon-extauth-plugins (drop after 20.04)
613+ - d/control: strongswan-starter hard-depends on strongswan-charon,
614+ therefore bump the dependency from Recommends to Depends. At the same
615+ time avoid a circular dependency by dropping
616+ strongswan-charon->strongswan-starter from Depends to Recommends as the
617+ binaries can work without the services but not vice versa.
618+ * Added Changes
619+ - d/control: build-depend on libiptc-dev to avoid FTBFS (LP: #1861975)
620+ This is needed due to changes in regard to Debian bug 947176 and 939243
621+ and can later be dropped again.
622+
623+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 05 Feb 2020 08:28:30 +0100
624+
625 strongswan (5.8.2-1) unstable; urgency=medium
626
627 [ Jean-Michel Vourgère ]
628@@ -261,6 +803,83 @@ strongswan (5.8.2-1) unstable; urgency=medium
629
630 -- Yves-Alexis Perez <corsac@debian.org> Wed, 01 Jan 2020 14:35:46 +0100
631
632+strongswan (5.8.1-1ubuntu1) focal; urgency=medium
633+
634+ * Merge with Debian unstable (LP: #1852579). Remaining changes:
635+ - d/control: Transition from strongswan-tnc-* being in extra packages
636+ to libcharon-extra-plugins
637+ * Added Changes:
638+ - d/control: Transition from former Ubuntu only libcharon-standard-plugins
639+ to common libcharon-extauth-plugins (drop after 20.04)
640+ - d/control: strongswan-starter hard-depends on strongswan-charon,
641+ therefore bump the dependency from Recommends to Depends. At the same
642+ time avoid a circular dependency by dropping
643+ strongswan-charon->strongswan-starter from Depends to Recommends as the
644+ binaries can work without the services but not vice versa.
645+ * Dropped Changes (now in Debian):
646+ - Clean up d/strongswan-starter.postinst: section about runlevel changes
647+ - Clean up d/strongswan-starter.postinst: Removed entire section on
648+ opportunistic encryption disabling - this was never in strongSwan and
649+ won't be see upstream issue #2160.
650+ - d/rules: Removed patching ipsec.conf on build (not using the
651+ debconf-managed config.)
652+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
653+ used for debconf-managed include of private key).
654+ - Add plugin kernel-libipsec to allow the use of strongswan in containers
655+ via this userspace implementation (please do note that this is still
656+ considered experimental by upstream).
657+ + d/libcharon-extra-plugins.install: Add kernel-libipsec components
658+ + d/control: List kernel-libipsec plugin at extra plugins description
659+ + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
660+ upstream recommends to not load kernel-libipsec by default.
661+ - d/control: Mention mgf1 plugin which is in libstrongswan now
662+ - Complete the disabling of libfast; This was partially accepted in Debian,
663+ it is no more packaging medcli and medsrv, but still builds and
664+ mentions it.
665+ + d/rules: Add --disable-fast to avoid build time and dependencies
666+ + d/control: Remove medcli, medsrv from package description
667+ - Add now built (since 5.5.1) libraries libtpmtss and nttfft to
668+ libstrongswan-extra-plugins (no deps from default plugins).
669+ - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
670+ plugins for the most common use cases from extra-plugins into a new
671+ standard-plugins package. This will allow those use cases without pulling
672+ in too much more plugins (a bit like the tnc package). Recommend that
673+ package from strongswan-libcharon.
674+ - d/usr.lib.ipsec.charon: allow reading of own FDs (LP 1786250)
675+ - d/usr.sbin.charon-systemd: allow CLUSTERIP for ha plugin (LP 1773956)
676+ - executables need to be able to read map and execute themselves otherwise
677+ execution in some environments e.g. containers is blocked (LP 1780534)
678+ + d/usr.lib.ipsec.stroke: add rmix permission to stroke binary
679+ + d/usr.lib.ipsec.lookip: add rmix permission to lookip binary
680+ - d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: resync apparmor
681+ profiles of both ways to start charon (LP 1807664)
682+ - d/usr.sbin.swanctl: add apparmor rule for af-alg plugin (LP 1807962)
683+ - We fixed up tpmtss and nttfft in the past, but tpmtss is now packaged in
684+ Debian so this part was be dropped. Two changes remain
685+ - d/control: fix the mentioning of tpmtss in d/control
686+ - apparmor fixes for container and root usage (LP 1826238)
687+ + d/usr.sbin.swanctl: allow reading own binary
688+ + d/usr.sbin.charon-systemd: allow accessing the binary
689+ + d/usr.sbin.swanctl: add attach_disconnected to work inside containers
690+ + d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: add CAP_SETPCAP
691+ to apparmor to allow dropping caps
692+ * Dropped Changes (too uncommon to support by default)
693+ - d/libstrongswan.install: Add kernel-netlink configuration files
694+ - d/usr.sbin.charon-systemd: allow to contact mysql for sql and
695+ attr-sql plugins (LP 1766240) - no more needed as itisn't enabled.
696+ - Mass enablement of extra plugins and features to allow a user to use
697+ strongswan for a variety of extra use cases without having to rebuild.
698+ + d/control: Add required additional build-deps
699+ + d/control: Mention addtionally enabled plugins
700+ + d/rules: Enable features at configure stage
701+ + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
702+ + d/libstrongswan.install: Add plugins (so, conf)
703+ + d/strongswan-starter.install: Install pool feature, which is useful
704+ since we now have attr-sql plugin enabled it.
705+ - Enable additional TNC plugins and add them to libcharon-extra-plugins
706+
707+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 14 Nov 2019 15:00:15 +0100
708+
709 strongswan (5.8.1-1) unstable; urgency=medium
710
711 * d/rules: disable http and stream tests under CI
712@@ -330,6 +949,99 @@ strongswan (5.8.0-1) unstable; urgency=medium
713
714 -- Yves-Alexis Perez <corsac@debian.org> Mon, 26 Aug 2019 12:58:23 +0200
715
716+strongswan (5.7.2-1ubuntu3) eoan; urgency=medium
717+
718+ * No change rebuild for libmysqlclient21.
719+
720+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 15 Aug 2019 09:34:34 +0200
721+
722+strongswan (5.7.2-1ubuntu2) eoan; urgency=medium
723+
724+ * Rebuild against new libjson-c4.
725+
726+ -- Gianfranco Costamagna <locutusofborg@debian.org> Mon, 01 Jul 2019 10:53:07 +0200
727+
728+strongswan (5.7.2-1ubuntu1) eoan; urgency=medium
729+
730+ [ Christian Ehrhardt ]
731+ * Merge with Debian unstable. Remaining changes:
732+ - Clean up d/strongswan-starter.postinst: section about runlevel changes
733+ - Clean up d/strongswan-starter.postinst: Removed entire section on
734+ opportunistic encryption disabling - this was never in strongSwan and
735+ won't be see upstream issue #2160.
736+ - d/rules: Removed patching ipsec.conf on build (not using the
737+ debconf-managed config.)
738+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
739+ used for debconf-managed include of private key).
740+ - Mass enablement of extra plugins and features to allow a user to use
741+ strongswan for a variety of extra use cases without having to rebuild.
742+ + d/control: Add required additional build-deps
743+ + d/control: Mention addtionally enabled plugins
744+ + d/rules: Enable features at configure stage
745+ + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
746+ + d/libstrongswan.install: Add plugins (so, conf)
747+ + d/strongswan-starter.install: Install pool feature, which is useful
748+ since we now have attr-sql plugin enabled it.
749+ - Add plugin kernel-libipsec to allow the use of strongswan in containers
750+ via this userspace implementation (please do note that this is still
751+ considered experimental by upstream).
752+ + d/libcharon-extra-plugins.install: Add kernel-libipsec components
753+ + d/control: List kernel-libipsec plugin at extra plugins description
754+ + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
755+ upstream recommends to not load kernel-libipsec by default.
756+ - d/libstrongswan.install: Add kernel-netlink configuration files
757+ - Complete the disabling of libfast; This was partially accepted in Debian,
758+ it is no more packaging medcli and medsrv, but still builds and
759+ mentions it.
760+ + d/rules: Add --disable-fast to avoid build time and dependencies
761+ + d/control: Remove medcli, medsrv from package description
762+ - d/control: Mention mgf1 plugin which is in libstrongswan now
763+ - Add now built (since 5.5.1) libraries libtpmtss and nttfft to
764+ libstrongswan-extra-plugins (no deps from default plugins).
765+ - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
766+ plugins for the most common use cases from extra-plugins into a new
767+ standard-plugins package. This will allow those use cases without pulling
768+ in too much more plugins (a bit like the tnc package). Recommend that
769+ package from strongswan-libcharon.
770+ - d/usr.sbin.charon-systemd: allow to contact mysql for sql and
771+ attr-sql plugins (LP #1766240)
772+ - d/usr.lib.ipsec.charon: allow reading of own FDs (LP #1786250)
773+ - d/usr.sbin.charon-systemd: allow CLUSTERIP for ha plugin (LP: 1773956)
774+ - executables need to be able to read map and execute themselves otherwise
775+ execution in some environments e.g. containers is blocked (LP: 1780534)
776+ + d/usr.lib.ipsec.stroke: add rmix permission to stroke binary
777+ + d/usr.lib.ipsec.lookip: add rmix permission to lookip binary
778+ - d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: resync apparmor
779+ profiles of both ways to start charon (LP: 1807664)
780+ - d/usr.sbin.swanctl: add apparmor rule for af-alg plugin (LP: 1807962)
781+ * Dropped changes
782+ - d/p/lp1795813-mysql-Don-t-release-the-connection-if-transactions-a.patch:
783+ fix SIGSEGV when using mysql plugin (LP: 1795813)
784+ [upstream in 5.7.2]
785+ - d/libstrongswan.install: Reorder conf and .so alphabetically
786+ [was a non functional change, dropped to avoid merge noise]
787+ - Relocate tnc plugin
788+ [TNC is back at libcharon-extra-plugins as it is in Debian]
789+ * Added changes:
790+ - We fixed up tpmtss and nttfft in the past, but tpmtss is now packaged in
791+ Debian so this part was be dropped. Two changes remain
792+ - d/control: fix the mentioning of tpmtss in d/control
793+ - add nttfft (can be merged with the mass enablement change later)
794+ - Transitional packages to go back from strongswan-tnc-* being in extra
795+ packages to be part of libcharon-extra-plugins.
796+ [can be dropped after 20.04]
797+
798+ [ Simon Deziel ]
799+ * Added changes:
800+ - apparmor fixes for container and root usage (LP: #1826238)
801+ + d/usr.sbin.swanctl: allow reading own binary
802+ + d/usr.sbin.charon-systemd: allow accessing the binary
803+ + d/usr.sbin.swanctl: add attach_disconnected to work inside containers
804+ + d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: add CAP_SETPCAP
805+ to apparmor to allow dropping caps
806+
807+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Fri, 26 Apr 2019 11:31:17 +0200
808+
809 strongswan (5.7.2-1) unstable; urgency=medium
810
811 * d/control: remove Rene from Uploaders, thanks!
812@@ -348,6 +1060,86 @@ strongswan (5.7.2-1) unstable; urgency=medium
813
814 -- Yves-Alexis Perez <corsac@debian.org> Wed, 02 Jan 2019 13:02:11 +0100
815
816+strongswan (5.7.1-1ubuntu2) disco; urgency=medium
817+
818+ * d/usr.sbin.charon-systemd: fix rule for CLUSTERIP to match effective
819+ path (LP: #1773956)
820+ * d/usr.lib.ipsec.charon, d/usr.sbin.charon-systemd: resync apparmor
821+ profiles of both ways to start charon (LP: #1807664)
822+ * d/usr.sbin.swanctl: add apparmor rule for af-alg plugin (LP: #1807962)
823+
824+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 10 Dec 2018 08:30:01 +0100
825+
826+strongswan (5.7.1-1ubuntu1) disco; urgency=medium
827+
828+ * Merge with Debian unstable (LP: #1806401). Remaining changes:
829+ - Clean up d/strongswan-starter.postinst: section about runlevel changes
830+ - Clean up d/strongswan-starter.postinst: Removed entire section on
831+ opportunistic encryption disabling - this was never in strongSwan and
832+ won't be see upstream issue #2160.
833+ - d/rules: Removed patching ipsec.conf on build (not using the
834+ debconf-managed config.)
835+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
836+ used for debconf-managed include of private key).
837+ - Mass enablement of extra plugins and features to allow a user to use
838+ strongswan for a variety of extra use cases without having to rebuild.
839+ + d/control: Add required additional build-deps
840+ + d/control: Mention addtionally enabled plugins
841+ + d/rules: Enable features at configure stage
842+ + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
843+ + d/libstrongswan.install: Add plugins (so, conf)
844+ - d/strongswan-starter.install: Install pool feature, which is useful since
845+ we have attr-sql plugin enabled as well using it.
846+ - Add plugin kernel-libipsec to allow the use of strongswan in containers
847+ via this userspace implementation (please do note that this is still
848+ considered experimental by upstream).
849+ + d/libcharon-extra-plugins.install: Add kernel-libipsec components
850+ + d/control: List kernel-libipsec plugin at extra plugins description
851+ + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
852+ upstream recommends to not load kernel-libipsec by default.
853+ - Relocate tnc plugin
854+ + debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
855+ + Add new subpackage for TNC in d/strongswan-tnc-* and d/control
856+ - d/libstrongswan.install: Reorder conf and .so alphabetically
857+ - d/libstrongswan.install: Add kernel-netlink configuration files
858+ - Complete the disabling of libfast; This was partially accepted in Debian,
859+ it is no more packaging medcli and medsrv, but still builds and
860+ mentions it.
861+ + d/rules: Add --disable-fast to avoid build time and dependencies
862+ + d/control: Remove medcli, medsrv from package description
863+ - d/control: Mention mgf1 plugin which is in libstrongswan now
864+ - Add now built (since 5.5.1) libraries libtpmtss and nttfft to
865+ libstrongswan-extra-plugins (no deps from default plugins).
866+ - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
867+ plugins for the most common use cases from extra-plugins into a new
868+ standard-plugins package. This will allow those use cases without pulling
869+ in too much more plugins (a bit like the tnc package). Recommend that
870+ package from strongswan-libcharon.
871+ - d/usr.sbin.charon-systemd: allow to contact mysql for sql and
872+ attr-sql plugins (LP #1766240)
873+ - d/usr.lib.ipsec.charon: allow reading of own FDs (LP #1786250)
874+ * Added Changes:
875+ - d/p/lp1795813-mysql-Don-t-release-the-connection-if-transactions-a.patch:
876+ fix SIGSEGV when using mysql plugin (LP: #1795813)
877+ - d/usr.sbin.charon-systemd: allow CLUSTERIP for ha plugin (LP: #1773956)
878+ - executables need to be able to read map and execute themselves otherwise
879+ execution in some environments e.g. containers is blocked (LP: #1780534)
880+ + d/usr.lib.ipsec.stroke: add rmix permission to stroke binary
881+ + d/usr.lib.ipsec.lookip: add rmix permission to lookip binary
882+ - adapt "mass enablement of extra plugins" to match 5.7.x changes
883+ + d/rules: use new options for swima instead of swid
884+ + d/strongswan-tnc-server.install: add new sec updater tool
885+ + d/strongswan-tnc-client.install: add new sw-collector tool
886+ * Dropped (in Debian now):
887+ - SECURITY UPDATE: Insufficient input validation in gmp plugin
888+ (CVE-2018-17540)
889+ - SECURITY UPDATE: Insufficient input validation in gmp plugin
890+ (CVE-2018-16151 CVE-2018-16152)
891+ - d/usr.lib.ipsec.charon, d/usr/sbin/charon-systemd: Add support for
892+ usr-merge, thanks to Christian Ehrhardt. LP #1784023
893+
894+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 03 Dec 2018 15:18:31 +0100
895+
896 strongswan (5.7.1-1) unstable; urgency=medium
897
898 [ Ondřej Nový ]
899@@ -378,6 +1170,96 @@ strongswan (5.7.0-1) unstable; urgency=medium
900
901 -- Yves-Alexis Perez <corsac@debian.org> Mon, 24 Sep 2018 16:36:28 +0200
902
903+strongswan (5.6.3-1ubuntu5) disco; urgency=medium
904+
905+ * No-change rebuild against libunbound8
906+
907+ -- Steve Langasek <steve.langasek@ubuntu.com> Sun, 11 Nov 2018 09:01:53 +0000
908+
909+strongswan (5.6.3-1ubuntu4) cosmic; urgency=medium
910+
911+ * d/usr.lib.ipsec.charon: allow reading of own FDs (LP: #1786250)
912+ Thanks to Matt Callaghan.
913+
914+ -- Andreas Hasenack <andreas@canonical.com> Thu, 04 Oct 2018 10:34:01 -0300
915+
916+strongswan (5.6.3-1ubuntu3) cosmic; urgency=medium
917+
918+ * SECURITY UPDATE: Insufficient input validation in gmp plugin
919+ - debian/patches/strongswan-4.4.0-5.7.0_gmp-pkcs1-overflow.patch: fix
920+ buffer overflow with very small RSA keys in
921+ src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c.
922+ - CVE-2018-17540
923+
924+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 01 Oct 2018 13:23:59 -0400
925+
926+strongswan (5.6.3-1ubuntu2) cosmic; urgency=medium
927+
928+ * SECURITY UPDATE: Insufficient input validation in gmp plugin
929+ - debian/patches/strongswan-5.6.1-5.6.3_gmp-pkcs1-verify.patch: don't
930+ parse PKCS1 v1.5 RSA signatures to verify them in
931+ src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c,
932+ src/libstrongswan/plugins/gmp/gmp_rsa_public_key.c.
933+ - CVE-2018-16151
934+ - CVE-2018-16152
935+
936+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 25 Sep 2018 10:16:15 -0400
937+
938+strongswan (5.6.3-1ubuntu1) cosmic; urgency=medium
939+
940+ * Merge with Debian unstable. Remaining changes:
941+ - Clean up d/strongswan-starter.postinst: section about runlevel changes
942+ - Clean up d/strongswan-starter.postinst: Removed entire section on
943+ opportunistic encryption disabling - this was never in strongSwan and
944+ won't be see upstream issue #2160.
945+ - d/rules: Removed patching ipsec.conf on build (not using the
946+ debconf-managed config.)
947+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
948+ used for debconf-managed include of private key).
949+ - Mass enablement of extra plugins and features to allow a user to use
950+ strongswan for a variety of extra use cases without having to rebuild.
951+ + d/control: Add required additional build-deps
952+ + d/control: Mention addtionally enabled plugins
953+ + d/rules: Enable features at configure stage
954+ + d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
955+ + d/libstrongswan.install: Add plugins (so, conf)
956+ - d/strongswan-starter.install: Install pool feature, which is useful since
957+ we have attr-sql plugin enabled as well using it.
958+ - Add plugin kernel-libipsec to allow the use of strongswan in containers
959+ via this userspace implementation (please do note that this is still
960+ considered experimental by upstream).
961+ + d/libcharon-extra-plugins.install: Add kernel-libipsec components
962+ + d/control: List kernel-libipsec plugin at extra plugins description
963+ + d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
964+ upstream recommends to not load kernel-libipsec by default.
965+ - Relocate tnc plugin
966+ + debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
967+ + Add new subpackage for TNC in d/strongswan-tnc-* and d/control
968+ - d/libstrongswan.install: Reorder conf and .so alphabetically
969+ - d/libstrongswan.install: Add kernel-netlink configuration files
970+ - Complete the disabling of libfast; This was partially accepted in Debian,
971+ it is no more packaging medcli and medsrv, but still builds and
972+ mentions it.
973+ + d/rules: Add --disable-fast to avoid build time and dependencies
974+ + d/control: Remove medcli, medsrv from package description
975+ - d/control: Mention mgf1 plugin which is in libstrongswan now
976+ - Add now built (since 5.5.1) libraries libtpmtss and nttfft to
977+ libstrongswan-extra-plugins (no deps from default plugins).
978+ - d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
979+ plugins for the most common use cases from extra-plugins into a new
980+ standard-plugins package. This will allow those use cases without pulling
981+ in too much more plugins (a bit like the tnc package). Recommend that
982+ package from strongswan-libcharon.
983+ - d/usr.sbin.charon-systemd: allow to contact mysql for sql and
984+ attr-sql plugins (LP #1766240)
985+ - d/usr.lib.ipsec.charon, d/usr/sbin/charon-systemd: Add support for
986+ usr-merge, thanks to Christian Ehrhardt. LP #1784023
987+ * Dropped:
988+ - d/usr.sbin.charon-systemd: allow systemd notifications (LP: #1765652)
989+ [Fixed in 5.6.3-1]
990+
991+ -- Andreas Hasenack <andreas@canonical.com> Thu, 23 Aug 2018 13:05:11 -0300
992+
993 strongswan (5.6.3-1) unstable; urgency=medium
994
995 * New upstream version 5.6.2
996@@ -393,6 +1275,78 @@ strongswan (5.6.3-1) unstable; urgency=medium
997
998 -- Yves-Alexis Perez <corsac@debian.org> Mon, 04 Jun 2018 10:23:22 +0200
999
1000+strongswan (5.6.2-2ubuntu2) cosmic; urgency=medium
1001+
1002+ * Add support for usr-merge, thanks to Christian Ehrhardt. LP: #1784023
1003+
1004+ -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 21 Aug 2018 00:42:38 +0100
1005+
1006+strongswan (5.6.2-2ubuntu1) cosmic; urgency=medium
1007+
1008+ * Merge with Debian unstable, closes LP: #1773814 and LP: #1772705.
1009+ Remaining changes:
1010+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
1011+ + Clean up d/strongswan-starter.postinst: Removed entire section on
1012+ opportunistic encryption disabling - this was never in strongSwan and
1013+ won't be see upstream issue #2160.
1014+ + d/rules: Removed patching ipsec.conf on build (not using the
1015+ debconf-managed config.)
1016+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
1017+ used for debconf-managed include of private key).
1018+ + Mass enablement of extra plugins and features to allow a user to use
1019+ strongswan for a variety of extra use cases without having to rebuild.
1020+ - d/control: Add required additional build-deps
1021+ - d/control: Mention addtionally enabled plugins
1022+ - d/rules: Enable features at configure stage
1023+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1024+ - d/libstrongswan.install: Add plugins (so, conf)
1025+ + d/strongswan-starter.install: Install pool feature, which is useful since
1026+ we have attr-sql plugin enabled as well using it.
1027+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1028+ via this userspace implementation (please do note that this is still
1029+ considered experimental by upstream).
1030+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1031+ - d/control: List kernel-libipsec plugin at extra plugins description
1032+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1033+ upstream recommends to not load kernel-libipsec by default.
1034+ + Relocate tnc plugin
1035+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1036+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1037+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1038+ + d/libstrongswan.install: Add kernel-netlink configuration files
1039+ + Complete the disabling of libfast; This was partially accepted in Debian,
1040+ it is no more packaging medcli and medsrv, but still builds and
1041+ mentions it.
1042+ - d/rules: Add --disable-fast to avoid build time and dependencies
1043+ - d/control: Remove medcli, medsrv from package description
1044+ + d/control: Mention mgf1 plugin which is in libstrongswan now
1045+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
1046+ libstrongswan-extra-plugins (no deps from default plugins).
1047+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1048+ plugins for the most common use cases from extra-plugins into a new
1049+ standard-plugins package. This will allow those use cases without pulling
1050+ in too much more plugins (a bit like the tnc package). Recommend that
1051+ package from strongswan-libcharon.
1052+ * Dropped Changes (no more needed after 18.04)
1053+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1054+ missed that, droppable after 18.04)
1055+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
1056+ libstrongswan as we dropped relocating ccm and test-vectors.
1057+ (droppable >18.04).
1058+ + d/control: add breaks/replace from libstrongswan to
1059+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
1060+ (droppable >18.04).
1061+ + d/control: bump breaks/replaces for the move of the updown plugin
1062+ (Missed Changelog entry on last merge)
1063+ + d/control: fix dependencies of strongswan-libcharon due to the move
1064+ the updown plugin (droppable >18.04).
1065+ * Added Changes:
1066+ + d/usr.sbin.charon-systemd: allow to contact mysql for sql and
1067+ attr-sql plugins (LP: #1766240)
1068+ + d/usr.sbin.charon-systemd: allow systemd notifications (LP: #1765652)
1069+
1070+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 29 May 2018 08:21:42 +0200
1071+
1072 strongswan (5.6.2-2) unstable; urgency=medium
1073
1074 * charon-nm: Fix building list of DNS/MDNS servers with libnm
1075@@ -403,6 +1357,74 @@ strongswan (5.6.2-2) unstable; urgency=medium
1076
1077 -- Yves-Alexis Perez <corsac@debian.org> Fri, 13 Apr 2018 13:46:04 +0200
1078
1079+strongswan (5.6.2-1ubuntu2) bionic; urgency=medium
1080+
1081+ * d/control: fix dependencies of strongswan-libcharon due to the move
1082+ the updown plugin.
1083+
1084+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 20 Mar 2018 07:37:29 +0100
1085+
1086+strongswan (5.6.2-1ubuntu1) bionic; urgency=medium
1087+
1088+ * Merge with Debian unstable (LP: #1753018). Remaining changes:
1089+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
1090+ + Clean up d/strongswan-starter.postinst: Removed entire section on
1091+ opportunistic encryption disabling - this was never in strongSwan and
1092+ won't be see upstream issue #2160.
1093+ + Ubuntu is not using the debconf triggered private key generation
1094+ - d/rules: Removed patching ipsec.conf on build (not using the
1095+ debconf-managed config.)
1096+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
1097+ used for debconf-managed include of private key).
1098+ + Mass enablement of extra plugins and features to allow a user to use
1099+ strongswan for a variety of extra use cases without having to rebuild.
1100+ - d/control: Add required additional build-deps
1101+ - d/control: Mention addtionally enabled plugins
1102+ - d/rules: Enable features at configure stage
1103+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1104+ - d/libstrongswan.install: Add plugins (so, conf)
1105+ + d/strongswan-starter.install: Install pool feature, which is useful since
1106+ we have attr-sql plugin enabled as well using it.
1107+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1108+ via this userspace implementation (please do note that this is still
1109+ considered experimental by upstream).
1110+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1111+ - d/control: List kernel-libipsec plugin at extra plugins description
1112+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1113+ upstream recommends to not load kernel-libipsec by default.
1114+ + Relocate tnc plugin
1115+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1116+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1117+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1118+ + d/libstrongswan.install: Add kernel-netlink configuration files
1119+ + Complete the disabling of libfast; This was partially accepted in Debian,
1120+ it is no more packaging medcli and medsrv, but still builds and
1121+ mentions it.
1122+ - d/rules: Add --disable-fast to avoid build time and dependencies
1123+ - d/control: Remove medcli, medsrv from package description
1124+ + d/control: Mention mgf1 plugin which is in libstrongswan now
1125+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
1126+ libstrongswan-extra-plugins (no deps from default plugins).
1127+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1128+ missed that, droppable after 18.04)
1129+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1130+ plugins for the most common use cases from extra-plugins into a new
1131+ standard-plugins package. This will allow those use cases without pulling
1132+ in too much more plugins (a bit like the tnc package). Recommend that
1133+ package from strongswan-libcharon.
1134+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
1135+ libstrongswan as we dropped relocating ccm and test-vectors.
1136+ (droppable >18.04).
1137+ + d/control: add breaks/replace from libstrongswan to
1138+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
1139+ (droppable >18.04).
1140+ * Added Changes:
1141+ + d/control: bump breaks/replaces from strongswan-libcharon to strongswan-
1142+ starter as we followed Debian to move the updown plugin but need to
1143+ match Ubuntu versions (Droppable >18.04).
1144+
1145+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Fri, 16 Mar 2018 11:08:47 +0100
1146+
1147 strongswan (5.6.2-1) unstable; urgency=medium
1148
1149 * d/NEWS: add information about disabled algorithms (closes: #883072)
1150@@ -425,6 +1447,129 @@ strongswan (5.6.1-3) unstable; urgency=medium
1151
1152 -- Yves-Alexis Perez <corsac@debian.org> Sun, 17 Dec 2017 16:40:39 +0100
1153
1154+strongswan (5.6.1-2ubuntu4) bionic; urgency=medium
1155+
1156+ * SECURITY UPDATE: DoS via crafted RSASSA-PSS signature
1157+ - debian/patches/CVE-2018-6459.patch: Properly handle MGF1 algorithm
1158+ identifier without parameters in
1159+ src/libstrongswan/credentials/keys/signature_params.c.
1160+ - CVE-2018-6459
1161+
1162+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 07 Mar 2018 14:52:02 +0100
1163+
1164+strongswan (5.6.1-2ubuntu3) bionic; urgency=medium
1165+
1166+ * No-change rebuild against libcurl4
1167+
1168+ -- Steve Langasek <steve.langasek@ubuntu.com> Wed, 28 Feb 2018 08:52:09 +0000
1169+
1170+strongswan (5.6.1-2ubuntu2) bionic; urgency=high
1171+
1172+ * No change rebuild against openssl1.1.
1173+
1174+ -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 12 Feb 2018 16:00:24 +0000
1175+
1176+strongswan (5.6.1-2ubuntu1) bionic; urgency=medium
1177+
1178+ * Merge with Debian unstable (LP: #1717343).
1179+ Also fixes and issue with multiple psk's (LP: #1734207). Remaining changes:
1180+ + Clean up d/strongswan-starter.postinst: section about runlevel changes
1181+ + Clean up d/strongswan-starter.postinst: Removed entire section on
1182+ opportunistic encryption disabling - this was never in strongSwan and
1183+ won't be see upstream issue #2160.
1184+ + Ubuntu is not using the debconf triggered private key generation
1185+ - d/rules: Removed patching ipsec.conf on build (not using the
1186+ debconf-managed config.)
1187+ - d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference (was
1188+ used for debconf-managed include of private key).
1189+ + Mass enablement of extra plugins and features to allow a user to use
1190+ strongswan for a variety of extra use cases without having to rebuild.
1191+ - d/control: Add required additional build-deps
1192+ - d/control: Mention addtionally enabled plugins
1193+ - d/rules: Enable features at configure stage
1194+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1195+ - d/libstrongswan.install: Add plugins (so, conf)
1196+ + d/strongswan-starter.install: Install pool feature, which is useful since
1197+ we have attr-sql plugin enabled as well using it.
1198+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1199+ via this userspace implementation (please do note that this is still
1200+ considered experimental by upstream).
1201+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1202+ - d/control: List kernel-libipsec plugin at extra plugins description
1203+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1204+ upstream recommends to not load kernel-libipsec by default.
1205+ + Relocate tnc plugin
1206+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1207+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1208+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1209+ + d/libstrongswan.install: Add kernel-netlink configuration files
1210+ + Complete the disabling of libfast; This was partially accepted in Debian,
1211+ it is no more packaging medcli and medsrv, but still builds and
1212+ mentions it.
1213+ - d/rules: Add --disable-fast to avoid build time and dependencies
1214+ - d/control: Remove medcli, medsrv from package description
1215+ + d/control: Mention mgf1 plugin which is in libstrongswan now
1216+ + Add now built (since 5.5.1) libraries libtpmtss and nttfft to
1217+ libstrongswan-extra-plugins (no deps from default plugins).
1218+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1219+ missed that, droppable after 18.04)
1220+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1221+ plugins for the most common use cases from extra-plugins into a new
1222+ standard-plugins package. This will allow those use cases without pulling
1223+ in too much more plugins (a bit like the tnc package). Recommend that
1224+ package from strongswan-libcharon.
1225+ * Added changes:
1226+ + d/strongswan-tnc-client.install (relocate tnc) swidtag creation changed
1227+ in 5.6
1228+ + d/strongswan-tnc-server.install (relocate tnc) pacman no more needed
1229+ + d/control: bump breaks/replaces from libstrongswan-extra-plugins to
1230+ libstrongswan as we dropped relocating ccm and test-vectors.
1231+ (droppable >18.04).
1232+ - d/control: add breaks/replace from libstrongswan to
1233+ libstrongswan-extra-plugins for the move of mgf1 to libstrongswan.
1234+ (droppable >18.04).
1235+ * Dropped changes:
1236+ + Update init/service handling (debian default matches Ubuntu past now)
1237+ Dropping this fixes (LP: #1734886)
1238+ - d/rules: Change init/systemd program name to strongswan
1239+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
1240+ patching upstream
1241+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
1242+ linking to upstream
1243+ + d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call
1244+ (this is a never failing no-op for us, no need for Delta).
1245+ + d/strongswan-starter.prerm: Stop strongswan service on package removal
1246+ (ipsec now maps to strongswan service, so this works as-is).
1247+ + Clean up d/strongswan-starter.postinst: rename service ipsec to
1248+ strongswan (ipsec now maps to strongswan service, so this works as-is)
1249+ + Clean up d/strongswan-starter.postinst: daemon enable/disable (the
1250+ whole section is disabled, so no need for delta)
1251+ + (is upstream) CVE-2017-11185 patches
1252+ + (is upstream) FTBFS upstream fix for changed include files
1253+ + (is upstream) debian/patches/increase-bliss-test-timeout.patch: Under
1254+ QEMU/KVM autopkgtest the bliss test takes longer than the default
1255+ + (in Debian) add now built (since 5.5.1) mgf1 plugin to
1256+ libstrongswan-extra-plugins.
1257+ + (in Debian) d/strongswan-starter.install: install stroke apparmor profile
1258+ + (this was enabled as part of the former delta, squash changes to no-up)
1259+ d/rules: Disable duplicheck.
1260+ + (not needed) Relocate plugins test-vectors from extra-plugins to
1261+ libstrongswan
1262+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
1263+ - d/libstrongswan.install: Add plugins/confiles
1264+ - d/control: move package descriptions and add required breaks/replaces
1265+ + (not needed) Relocate plugins ccm from extra-plugins to libstrongswan
1266+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
1267+ - d/libstrongswan.install: Add plugins/confiles
1268+ - d/control: move package descriptions and add required breaks/replaces
1269+ + (while using it requires special kernel, it does not hurt to be
1270+ available in the package) Remove ha plugin
1271+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
1272+ - d/rules: Do not enable ha plugin
1273+ - d/control: Drop listing the ha plugin in the package description
1274+
1275+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 29 Nov 2017 15:55:18 +0100
1276+
1277 strongswan (5.6.1-2) unstable; urgency=medium
1278
1279 * move counters plugin from -starter to -libcharon. closes: #882431
1280@@ -511,6 +1656,213 @@ strongswan (5.5.2-1) experimental; urgency=medium
1281
1282 -- Yves-Alexis Perez <corsac@debian.org> Fri, 19 May 2017 11:32:00 +0200
1283
1284+strongswan (5.5.1-4ubuntu3) bionic; urgency=medium
1285+
1286+ * Fix Artful FTBFS due to newer glibc (LP: #1724859)
1287+ - d/p/utils-Include-stdint.h.patch: upstream fix for changed include
1288+ files.
1289+
1290+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 19 Oct 2017 15:18:52 +0200
1291+
1292+strongswan (5.5.1-4ubuntu2) artful; urgency=medium
1293+
1294+ * SECURITY UPDATE: Fix RSA signature verification
1295+ - debian/patches/CVE-2017-11185.patch: does some
1296+ verifications in order to avoid null-point dereference
1297+ in src/libstrongswan/gmp/gmp_rsa_public_key.c
1298+ - CVE-2017-11185
1299+
1300+ -- Leonidas S. Barbosa <leo.barbosa@canonical.com> Tue, 15 Aug 2017 14:49:49 -0300
1301+
1302+strongswan (5.5.1-4ubuntu1) artful; urgency=medium
1303+
1304+ * Merge from Debian to pick up latest security changes (CVE-2017-9022,
1305+ CVE-2017-9023).
1306+ * Remaining Changes:
1307+ + Update init/service handling
1308+ - d/rules: Change init/systemd program name to strongswan
1309+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
1310+ patching upstream
1311+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
1312+ linking to upstream
1313+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1314+ - d/strongswan-starter.prerm: Stop strongswan service on package
1315+ removal (as opposed to using the old init.d script).
1316+ + Clean up d/strongswan-starter.postinst:
1317+ - Removed section about runlevel changes
1318+ - Adapted service restart section for Upstart (kept to be Trusty
1319+ backportable).
1320+ - Remove old symlinks to init.d files is necessary.
1321+ - Removed further out-dated code
1322+ - Removed entire section on opportunistic encryption - this was never in
1323+ strongSwan.
1324+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
1325+ + Mass enablement of extra plugins and features to allow a user to use
1326+ strongswan for a variety of use cases without having to rebuild.
1327+ - d/control: Add required additional build-deps
1328+ - d/rules: Enable features at configure stage
1329+ - d/control: Mention addtionally enabled plugins
1330+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1331+ - d/libstrongswan.install: Add plugins (so, conf)
1332+ + d/rules: Disable duplicheck as per
1333+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
1334+ + Remove ha plugin (requires special kernel)
1335+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
1336+ - d/rules: Do not enable ha plugin
1337+ - d/control: Drop listing the ha plugin in the package description
1338+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1339+ via this userspace implementation (please do note that this is still
1340+ considered experimental by upstream).
1341+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1342+ - d/control: List kernel-libipsec plugin at extra plugins description
1343+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1344+ upstream recommends to not load kernel-libipsec by default.
1345+ + Relocate tnc plugin
1346+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1347+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1348+ + d/strongswan-starter.install: Install pool feature, that useful due to
1349+ having attr-sql plugin that is enabled now.
1350+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
1351+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
1352+ - d/libstrongswan.install: Add plugins/confiles
1353+ - d/control: move package descriptions and add required breaks/replaces
1354+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1355+ + d/libstrongswan.install: Add kernel-netlink configuration files
1356+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1357+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
1358+ autopkgtest the bliss test takes longer than the default (Upstream in
1359+ 5.5.2 via issue 2204)
1360+ + Complete the disabling of libfast; This was partially accepted in Debian,
1361+ it is no more packaging medcli and medsrv, but still builds and
1362+ mentions it.
1363+ - d/rules: Add --disable-fast to avoid build time and dependencies
1364+ - d/control: Remove medcli, medsrv from package description
1365+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
1366+ "only" to extra-plugins Mgf1 is not listed as default plugin at
1367+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
1368+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
1369+ libstrongswan-extra-plugins.
1370+ + Add missing mention of md4 plugin in d/control
1371+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1372+ missed that)
1373+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1374+ plugins for the most common use cases from extra-plugins into a new
1375+ standard-plugins package. This will allow those use cases without pulling
1376+ in too much more plugins (a bit like the tnc package). Recommend that
1377+ package from strongswan-libcharon.
1378+
1379+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Wed, 31 May 2017 15:57:54 +0200
1380+
1381+strongswan (5.5.1-3ubuntu1) artful; urgency=medium
1382+
1383+ * Merge from Debian to pick up latest changes. Among others this includes:
1384+ - a lot of the Delta we upstreamed to Debian (more discussions are ongoing
1385+ but likely have to wait until Debian stretch was released)
1386+ - enabling mediation support (LP: #1657413)
1387+ * Remaining Changes:
1388+ + Update init/service handling
1389+ - d/rules: Change init/systemd program name to strongswan
1390+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
1391+ patching upstream
1392+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
1393+ linking to upstream
1394+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1395+ - d/strongswan-starter.prerm: Stop strongswan service on package
1396+ removal (as opposed to using the old init.d script).
1397+ + Clean up d/strongswan-starter.postinst:
1398+ - Removed section about runlevel changes
1399+ - Adapted service restart section for Upstart (kept to be Trusty
1400+ backportable).
1401+ - Remove old symlinks to init.d files is necessary.
1402+ - Removed further out-dated code
1403+ - Removed entire section on opportunistic encryption - this was never in
1404+ strongSwan.
1405+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
1406+ + Mass enablement of extra plugins and features to allow a user to use
1407+ strongswan for a variety of use cases without having to rebuild.
1408+ - d/control: Add required additional build-deps
1409+ - d/rules: Enable features at configure stage
1410+ - d/control: Mention addtionally enabled plugins
1411+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1412+ - d/libstrongswan.install: Add plugins (so, conf)
1413+ + d/rules: Disable duplicheck as per
1414+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
1415+ + Remove ha plugin (requires special kernel)
1416+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
1417+ - d/rules: Do not enable ha plugin
1418+ - d/control: Drop listing the ha plugin in the package description
1419+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1420+ via this userspace implementation (please do note that this is still
1421+ considered experimental by upstream).
1422+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1423+ - d/control: List kernel-libipsec plugin at extra plugins description
1424+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1425+ upstream recommends to not load kernel-libipsec by default.
1426+ + Relocate tnc plugin
1427+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1428+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1429+ + d/strongswan-starter.install: Install pool feature, that useful due to
1430+ having attr-sql plugin that is enabled now.
1431+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
1432+ - d/libstrongswan-extra-plugins.install: Remove plugins/conffiles
1433+ - d/libstrongswan.install: Add plugins/confiles
1434+ - d/control: move package descriptions and add required breaks/replaces
1435+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1436+ + d/libstrongswan.install: Add kernel-netlink configuration files
1437+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1438+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
1439+ autopkgtest the bliss test takes longer than the default (Upstream in
1440+ 5.5.2 via issue 2204)
1441+ + Complete the disabling of libfast; This was partially accepted in Debian,
1442+ it is no more packaging medcli and medsrv, but still builds and
1443+ mentions it.
1444+ - d/rules: Add --disable-fast to avoid build time and dependencies
1445+ - d/control: Remove medcli, medsrv from package description
1446+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
1447+ "only" to extra-plugins Mgf1 is not listed as default plugin at
1448+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
1449+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
1450+ libstrongswan-extra-plugins.
1451+ + Add missing mention of md4 plugin in d/control
1452+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1453+ missed that)
1454+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1455+ plugins for the most common use cases from extra-plugins into a new
1456+ standard-plugins package. This will allow those use cases without pulling
1457+ in too much more plugins (a bit like the tnc package). Recommend that
1458+ package from strongswan-libcharon.
1459+ * Dropped Changes:
1460+ + Add and install apparmor profiles (in Debian)
1461+ - d/rules: Install AppArmor profiles
1462+ - d/control: Add dh-apparmor build-dep
1463+ - d/usr.lib.ipsec.{charon, lookip, stroke}: Add latest AppArmor profiles
1464+ for charon, lookip and stroke
1465+ - d/libcharon-extra-plugins.install: Install profile for lookip
1466+ - d/strongswan-charon.install: Install profile for charon
1467+ - d/strongswan-starter.install: Install profile for stroke
1468+ - Fix strongswan ipsec status issue with apparmor
1469+ - Fix Dep8 tests for the now extra strongswan-pki package for pki
1470+ - Fix Dep8 tests for the now extra strongswan-scepclient package
1471+ + d/rules: Sorted and only one enable option per configure line (in
1472+ Debian)
1473+ + Add updated logcheck rules (in Debian)
1474+ - debian/libstrongswan.strongswan.logcheck.*: Remove outdated files
1475+ - debian/strongswan.logcheck: Add updated logcheck rules
1476+ + Add updated DEP8 tests (in Debian)
1477+ - d/tests/*: Add DEP8 tests
1478+ - d/control: Enable autotestpkg
1479+ + d/rules: do not strip for library integrity checking (After Discussion
1480+ with Debian this isn't acceptable there, but at the same time it turned
1481+ out the real use-case of this never uses this lib but instead third
1482+ party checks of checksums for e.g. FIPS cert; so drop the Delta)
1483+ - Use override_dh_strip to to avoid overwriting user build flags.
1484+ - Add missing mention of libchecksum integrity test in d/control
1485+ + d/rules: Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths
1486+ in tests to avoid issues in low entropy environments. (Debian has
1487+ disabled !x86 tests for the same reason, one solution is enough)
1488+
1489+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Thu, 04 May 2017 14:06:23 +0200
1490+
1491 strongswan (5.5.1-3) unstable; urgency=medium
1492
1493 [ Christian Ehrhardt ]
1494@@ -544,6 +1896,136 @@ strongswan (5.5.1-2) unstable; urgency=medium
1495
1496 -- Yves-Alexis Perez <corsac@debian.org> Wed, 07 Dec 2016 08:34:52 +0100
1497
1498+strongswan (5.5.1-1ubuntu2) zesty; urgency=medium
1499+
1500+ * Update Maintainers which was missed while merging 5.5.1-1.
1501+
1502+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 19 Dec 2016 16:02:40 +0100
1503+
1504+strongswan (5.5.1-1ubuntu1) zesty; urgency=medium
1505+
1506+ * Merge from Debian (complex delta, discussions and broken out changes can be
1507+ found in the merge proposal linked from the merge bug LP: #1631198)
1508+ * Remaining Changes:
1509+ + d/rules: Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity
1510+ checking.
1511+ + d/rules: Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths
1512+ in tests to avoid issues in low entropy environments.
1513+ + Update init/service handling
1514+ - d/rules: Change init/systemd program name to strongswan
1515+ - d/strongswan-starter.strongswan.service: Add new systemd file instead of
1516+ patching upstream
1517+ - d/strongswan-starter.links: Removed, use Ubuntu systemd file instead of
1518+ linking to upstream
1519+ - d/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1520+ - d/strongswan-starter.prerm: Stop strongswan service on package
1521+ removal (as opposed to using the old init.d script).
1522+ + Clean up d/strongswan-starter.postinst:
1523+ - Removed section about runlevel changes
1524+ - Adapted service restart section for Upstart (kept to be Trusty
1525+ backportable).
1526+ - Remove old symlinks to init.d files is necessary.
1527+ - Removed further out-dated code
1528+ - Removed entire section on opportunistic encryption - this was never in
1529+ strongSwan.
1530+ + Add and install apparmor profiles
1531+ - d/rules: Install AppArmor profiles
1532+ - d/control: Add dh-apparmor build-dep
1533+ - d/usr.lib.ipsec.{charon, lookip, stroke}: Add latest AppArmor profiles
1534+ for charon, lookip and stroke
1535+ - d/libcharon-extra-plugins.install: Install profile for lookip
1536+ - d/strongswan-charon.install: Install profile for charon
1537+ - d/strongswan-starter.install: Install profile for stroke
1538+ + d/rules: Removed pieces on 'patching ipsec.conf' on build.
1539+ + d/rules: Sorted and only one enable option per configure line
1540+ + Mass enablement of extra plugins and features to allow a user to use
1541+ strongswan for a variety of use cases without having to rebuild.
1542+ - d/control: Add required additional build-deps
1543+ - d/rules: Enable features at configure stage
1544+ - d/control: Mention addtionally enabled plugins
1545+ - d/libbstrongswan-extra-plugins.install: Add plugins (so, lib, conf)
1546+ - d/libstrongswan.install: Add plugins (so, conf)
1547+ + d/rules: Disable duplicheck as per
1548+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
1549+ + Remove ha plugin (requires special kernel)
1550+ - d/libcharon-extra-plugins.install: Stop installing ha (so, conf)
1551+ - d/rules: Do not enable ha plugin
1552+ - d/control: Drop listing the ha plugin in the package description
1553+ + Add plugin kernel-libipsec to allow the use of strongswan in containers
1554+ via this userspace implementation (please do note that this is still
1555+ considered experimental by upstream).
1556+ - d/libcharon-extra-plugins.install: Add kernel-libipsec components
1557+ - d/control: List kernel-libipsec plugin at extra plugins description
1558+ - d/p/dont-load-kernel-libipsec-plugin-by-default.patch: As
1559+ upstream recommends to not load kernel-libipsec by default.
1560+ + Relocate tnc plugin
1561+ - debian/libcharon-extra-plugins.install: Drop tnc from extra plugins
1562+ - Add new subpackage for TNC in d/strongswan-tnc-* and d/control
1563+ + d/strongswan-starter.install: Install pool feature, that useful due to
1564+ having attr-sql plugin that is enabled now.
1565+ + Relocate plugins test-vectors and ccm from extra-plugins to libstrongswan
1566+ - d/libstrongswan-extra-plugins.install: Remove plugins
1567+ - d/libstrongswan.install: Add plugins
1568+ + d/libstrongswan.install: Reorder conf and .so alphabetically
1569+ + d/libstrongswan.install: Add kernel-netlink configuration files
1570+ + d/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1571+ + Add updated logcheck rules
1572+ - debian/libstrongswan.strongswan.logcheck.*: Remove outdated files
1573+ - debian/strongswan.logcheck: Add updated logcheck rules
1574+ + Add updated DEP8 tests
1575+ - d/tests/*: Add DEP8 tests
1576+ - d/control: Enable autotestpkg
1577+ + debian/patches/increase-bliss-test-timeout.patch: Under QEMU/KVM
1578+ autopkgtest the bliss test takes longer than the default
1579+ + Complete the disabling of libfast
1580+ - Note: This was partially accepted in Debian, it is no more
1581+ packaging medcli and medsrv, but still builds and mentions it
1582+ - d/rules: Add --disable-fast to avoid build time and dependencies
1583+ - d/control: Remove medcli, medsrv from package description
1584+ * Dropped Changes:
1585+ + Adding build-dep to iptables-dev (no change, was only in Changelog)
1586+ + Dropping of build deps libfcgi-dev, clearsilver-dev (in Debian)
1587+ + Adding strongswan-plugin-* virtual packages for dist-upgrade (no
1588+ upgrade path left needing them)
1589+ + Most of "disabling libfast" (Debian dropped it from package content)
1590+ + Transition for ipsec service (no upgrade path left)
1591+ + Reverted part of the cleanup to d/strongswan-starter.postinst as using
1592+ service should rather use invoke-rc.d (so it is a partial revert of our
1593+ delta)
1594+ + Transition handling (breaks/replaces) from per-plugin packages to the
1595+ three grouped plugin packages (no upgrade path left)
1596+ + debian/strongswan-starter.dirs: Don't touch /etc/init.d. (while "correct"
1597+ it is effectively a no-op still, so not worth the delta)
1598+ + Lower dpkg-dev to 1.16.1 from 1.16.2 to enable backporting to Precise
1599+ (no more needed)
1600+ + d/rules: Remove configure option --enable-unit-test (unit tests run by
1601+ default)
1602+ * Added Changes:
1603+ + Fix strongswan ipsec status issue with apparmor (LP: #1587886)
1604+ + d/control, d/libstrongswan.install, d/libstrongswan-extra-plugins: Fixup
1605+ the relocation of the ccm plugin which missed to move the conffiles.
1606+ + Complete move of test-vectors (was missing in d/control)
1607+ + Add now built (5.5.1 vs 5.3.5) mgf1 plugin to libstrongswan-extra-plugins.
1608+ "only" to extra-plugins Mgf1 is not listed as default plugin at
1609+ https://wiki.strongswan.org/projects/strongswan/wiki/Pluginlist.
1610+ + Add now built (5.5.1 vs 5.3.5) libraries libtpmtss and nttfft to
1611+ libstrongswan-extra-plugins.
1612+ + Add missing mention of md4 plugin in d/control
1613+ + Add missing mention of libchecksum integrity test in d/control
1614+ + Add rm_conffile for /etc/init.d/ipsec (transition from precies had
1615+ missed that)
1616+ + Use override_dh_strip to to fix library integrity checking instead of
1617+ DEB_BUILD_OPTION to avoid overwriting user build flags.
1618+ + d/control, d/libcharon-{extras,standard}-plugins.install: Move charon
1619+ plugins for the most common use cases from extra-plugins into a new
1620+ standard-plugins package. This will allow those use cases without pulling
1621+ in too much more plugins (a bit like the tnc package). Recommend that
1622+ package from strongswan-libcharon (LP: #1640826).
1623+ + Fix Dep8 tests for the now extra strongswan-pki package for pki
1624+ + Fix Dep8 tests for the now extra strongswan-scepclient package
1625+
1626+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Mon, 07 Nov 2016 16:16:41 +0100
1627+
1628 strongswan (5.5.1-1) unstable; urgency=medium
1629
1630 * New upstream bugfix release.
1631@@ -660,6 +2142,177 @@ strongswan (5.3.5-2) unstable; urgency=medium
1632
1633 -- Yves-Alexis Perez <corsac@debian.org> Mon, 14 Mar 2016 23:53:34 +0100
1634
1635+strongswan (5.3.5-1ubuntu4) yakkety; urgency=medium
1636+
1637+ * Build-depend on libjson-c-dev instead of libjson0-dev.
1638+ * Rebuild against libjson-c3.
1639+
1640+ -- Graham Inggs <ginggs@ubuntu.com> Fri, 29 Apr 2016 19:04:22 +0200
1641+
1642+strongswan (5.3.5-1ubuntu3) xenial; urgency=medium
1643+
1644+ * Rebuild against libmysqlclient20.
1645+
1646+ -- Robie Basak <robie.basak@ubuntu.com> Tue, 05 Apr 2016 13:02:48 +0000
1647+
1648+strongswan (5.3.5-1ubuntu2) xenial; urgency=medium
1649+
1650+ * debian/tests/plugins: rdrand may or may not be loaded, depending on the
1651+ cpu features.
1652+
1653+ -- Iain Lane <iain@orangesquash.org.uk> Mon, 22 Feb 2016 17:13:01 +0000
1654+
1655+strongswan (5.3.5-1ubuntu1) xenial; urgency=medium
1656+
1657+ * debian/{rules,control,libstrongswan-extra-plugins.install}
1658+ Enable bliss plugin
1659+ * debian/{rules,control,libstrongswan-extra-plugins.install}
1660+ Enable chapoly plugin
1661+ * debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch
1662+ Upstream suggests to not load this plugin by default as it has
1663+ some limitations.
1664+ https://wiki.strongswan.org/projects/strongswan/wiki/Kernel-libipsec
1665+ * debian/patches/increase-bliss-test-timeout.patch
1666+ Under QEMU/KVM for autopkgtest bliss test takes a bit longer then default
1667+ * Update Apparmor profiles
1668+ - usr.lib.ipsec.charon
1669+ - add capability audit_write for xauth-pam (LP: #1470277)
1670+ - add capability dac_override (needed by agent plugin)
1671+ - allow priv dropping (LP: #1333655)
1672+ - allow caching CRLs (LP: #1505222)
1673+ - allow rw access to /dev/net/tun for kernel-libipsec (LP: #1309594)
1674+ - usr.lib.ipsec.stroke
1675+ - allow priv dropping (LP: #1333655)
1676+ - add local include
1677+ - usr.lib.ipsec.lookip
1678+ - add local include
1679+ * Merge from Debian, which includes fixes for all previous CVEs
1680+ Fixes (LP: #1330504, #1451091, #1448870, #1470277)
1681+ Remaining changes:
1682+ * debian/control
1683+ - Lower dpkg-dev to 1.16.1 from 1.16.2 to enable backporting to Precise
1684+ - Update Maintainer for Ubuntu
1685+ - Add build-deps
1686+ - dh-apparmor
1687+ - iptables-dev
1688+ - libjson0-dev
1689+ - libldns-dev
1690+ - libmysqlclient-dev
1691+ - libpcsclite-dev
1692+ - libsoup2.4-dev
1693+ - libtspi-dev
1694+ - libunbound-dev
1695+ - Drop build-deps
1696+ - libfcgi-dev
1697+ - clearsilver-dev
1698+ - Create virtual packages for all strongswan-plugin-* for dist-upgrade
1699+ - Set XS-Testsuite: autopkgtest
1700+ * debian/rules:
1701+ - Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity checking.
1702+ - Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths in
1703+ tests.
1704+ - Change init/systemd program name to strongswan
1705+ - Install AppArmor profiles
1706+ - Removed pieces on 'patching ipsec.conf' on build.
1707+ - Enablement of features per Ubuntu current config suggested from
1708+ upstream recommendation
1709+ - Unpack and sort enabled features to one-per-line
1710+ - Disable duplicheck as per
1711+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
1712+ - Disable libfast (--disable-fast):
1713+ Requires dropping medsrv, medcli plugins which depend on libfast
1714+ - Add configure options
1715+ --with-tss=trousers
1716+ - Remove configure options:
1717+ --enable-ha (requires special kernel)
1718+ --enable-unit-test (unit tests run by default)
1719+ - Drop logcheck install
1720+ * debian/tests/*
1721+ - Add DEP8 test for strongswan service and plugins
1722+ * debian/strongswan-starter.strongswan.service
1723+ - Add new systemd file instead of patching upstream
1724+ * debian/strongswan-starter.links
1725+ - removed, use Ubuntu systemd file instead of linking to upstream
1726+ * debian/usr.lib.ipsec.{charon, lookip, stroke}
1727+ - added AppArmor profiles for charon, lookip and stroke
1728+ * debian/libcharon-extra-plugins.install
1729+ - Add plugins
1730+ - kernel-libipsec.{so, lib, conf, apparmor}
1731+ - Remove plugins
1732+ - libstrongswan-ha.so
1733+ - Relocate plugins
1734+ - libstrongswan-tnc-tnccs.so (strongswan-tnc-base.install)
1735+ * debian/libstrongswan-extra-plugins.install
1736+ - Add plugins (so, lib, conf)
1737+ - acert
1738+ - attr-sql
1739+ - coupling
1740+ - dnscert
1741+ - fips-prf
1742+ - gmp
1743+ - ipseckey
1744+ - load-tester
1745+ - mysql
1746+ - ntru
1747+ - radattr
1748+ - soup
1749+ - sqlite
1750+ - sql
1751+ - systime-fix
1752+ - unbound
1753+ - whitelist
1754+ - Relocate plugins (so, lib, conf)
1755+ - ccm (libstrongswan.install)
1756+ - test-vectors (libstrongswan.install)
1757+ * debian/libstrongswan.install
1758+ - Sort sections
1759+ - Add plugins (so, lib, conf)
1760+ - libchecksum
1761+ - ccm
1762+ - eap-identity
1763+ - md4
1764+ - test-vectors
1765+ * debian/strongswan-charon.install
1766+ - Add AppArmor profile for charon
1767+ * debian/strongswan-starter.install
1768+ - Add tools, manpages, conf
1769+ - openac
1770+ - pool
1771+ - _updown_espmark
1772+ - Add AppArmor profile for stroke
1773+ * debian/strongswan-tnc-base.install
1774+ - Add new subpackage for TNC
1775+ - remove non-existent (dropped in 5.2.1) libpts library files
1776+ * debian/strongswan-tnc-client.install
1777+ - Add new subpackage for TNC
1778+ * debian/strongswan-tnc-ifmap.install
1779+ - Add new subpackage for TNC
1780+ * debian/strongswan-tnc-pdp.install
1781+ - Add new subpackage for TNC
1782+ * debian/strongswan-tnc-server.install
1783+ - Add new subpackage for TNC
1784+ * debian/strongswan-starter.postinit:
1785+ - Removed section about runlevel changes, it's almost 2014.
1786+ - Adapted service restart section for Upstart.
1787+ - Remove old symlinks to init.d files is necessary.
1788+ * debian/strongswan-starter.dirs: Don't touch /etc/init.d.
1789+ * debian/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
1790+ * debian/strongswan-starter.prerm: Stop strongswan service on package
1791+ removal (as opposed to using the old init.d script).
1792+ * debian/libstrongswan.strongswan.logcheck combined into debian/strongswan.logcheck
1793+ - logcheck patterns updated to be helpful
1794+ * debian/strongswan-starter.postinst: Removed further out-dated code and
1795+ entire section on opportunistic encryption - this was never in strongSwan.
1796+ * debian/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1797+ Drop changes:
1798+ * debian/control
1799+ - Per-plugin package breakup: Reducing packaging delta from Debian
1800+ - Don't build dhcp, farp subpackages: Reduce packging delta from Debian
1801+ * debian/watch: Already exists in Debian merge
1802+ * debian/upstream/signing-key.asc: Upstream has newer version.
1803+
1804+ -- Ryan Harper <ryan.harper@canonical.com> Fri, 12 Feb 2016 11:24:53 -0600
1805+
1806 strongswan (5.3.5-1) unstable; urgency=medium
1807
1808 * New upstream bugfix release.
1809@@ -932,6 +2585,210 @@ strongswan (5.1.2-1) unstable; urgency=medium
1810
1811 -- Yves-Alexis Perez <corsac@debian.org> Wed, 12 Mar 2014 11:22:38 +0100
1812
1813+strongswan (5.1.2-0ubuntu8) xenial; urgency=medium
1814+
1815+ * Import FTBFS for s390x from Debian 5.1.2-3 upload. (LP: #1521240)
1816+
1817+ -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 30 Nov 2015 15:46:06 +0000
1818+
1819+strongswan (5.1.2-0ubuntu7) xenial; urgency=medium
1820+
1821+ * SECURITY UPDATE: authentication bypass in eap-mschapv2 plugin
1822+ - debian/patches/CVE-2015-8023.patch: only succeed authentication if
1823+ MSK was established in
1824+ src/libcharon/plugins/eap_mschapv2/eap_mschapv2.c.
1825+ - CVE-2015-8023
1826+ * debian/patches/disable_ntru_test.patch: disable test causing FTBFS
1827+ until regression is properly investigated.
1828+
1829+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Thu, 19 Nov 2015 14:00:17 -0500
1830+
1831+strongswan (5.1.2-0ubuntu6) wily; urgency=medium
1832+
1833+ * SECURITY UPDATE: user credential disclosure to rogue servers
1834+ - debian/patches/CVE-2015-4171.patch: enforce remote authentication
1835+ config before proceeding with own authentication in
1836+ src/libcharon/sa/ikev2/tasks/ike_auth.c.
1837+ - CVE-2015-4171
1838+ * debian/rules: don't FTBFS from unused service file
1839+
1840+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 08 Jun 2015 12:50:38 -0400
1841+
1842+strongswan (5.1.2-0ubuntu5) vivid; urgency=medium
1843+
1844+ * Add a systemd unit corresponding to strongswan-starter.strongswan.upstart.
1845+
1846+ -- Martin Pitt <martin.pitt@ubuntu.com> Fri, 16 Jan 2015 08:27:54 +0100
1847+
1848+strongswan (5.1.2-0ubuntu4) vivid; urgency=medium
1849+
1850+ * SECURITY UPDATE: denial of service via DH group 1025
1851+ - debian/patches/CVE-2014-9221.patch: define MODP_CUSTOM outside of
1852+ IKE DH range in src/libstrongswan/crypto/diffie_hellman.c,
1853+ src/libstrongswan/crypto/diffie_hellman.h.
1854+ - CVE-2014-9221
1855+
1856+ -- Tyler Hicks <tyhicks@canonical.com> Mon, 05 Jan 2015 08:25:29 -0500
1857+
1858+strongswan (5.1.2-0ubuntu3) utopic; urgency=low
1859+
1860+ * Added "libgcrypt20-dev | libgcrypt11-dev" to build dependencies to fix
1861+ build.
1862+
1863+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 15 Oct 2014 16:49:18 +0000
1864+
1865+strongswan (5.1.2-0ubuntu2) trusty; urgency=medium
1866+
1867+ * SECURITY UPDATE: remote authentication bypass
1868+ - debian/patches/CVE-2014-2338.patch: reject CREATE_CHILD_SA exchange
1869+ on unestablished IKE_SAs in src/libcharon/sa/ikev2/task_manager_v2.c.
1870+ - CVE-2014-2338
1871+
1872+ -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 14 Apr 2014 11:24:34 -0400
1873+
1874+strongswan (5.1.2-0ubuntu1) trusty; urgency=low
1875+
1876+ * New upstream release.
1877+
1878+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 01 Mar 2014 08:53:17 +0000
1879+
1880+strongswan (5.1.2~rc2-0ubuntu2) trusty; urgency=low
1881+
1882+ * debian/ipsec.secrets.proto: Removed ipsec.secrets.inc reference.
1883+ * debian/usr.lib.ipsec.charon: Allow read access to /run/charon.
1884+
1885+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 19 Feb 2014 13:07:16 +0000
1886+
1887+strongswan (5.1.2~rc2-0ubuntu1) trusty; urgency=low
1888+
1889+ * New upstream release candidate.
1890+
1891+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 19 Feb 2014 12:59:21 +0000
1892+
1893+strongswan (5.1.2~rc1-0ubuntu4) trusty; urgency=medium
1894+
1895+ * debian/strongswan-tnc-*.install: Fixed files so libraries go into correct
1896+ packages.
1897+ * debian/usr.lib.ipsec.stroke: Allow access to strongswan.d directories.
1898+
1899+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 17 Feb 2014 18:12:38 +0000
1900+
1901+strongswan (5.1.2~rc1-0ubuntu3) trusty; urgency=low
1902+
1903+ * debian/rules: Exclude rdrand.conf in dh_install's --fail-missing.
1904+
1905+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:46:46 +0000
1906+
1907+strongswan (5.1.2~rc1-0ubuntu2) trusty; urgency=low
1908+
1909+ * debian/libstrongswan.install: Moved rdrand plugin configuration to rules
1910+ as it's only useful on amd64.
1911+ * debian/watch: Added opts=pgpsigurlmangle option.
1912+ * debian/upstream/signing-key.asc: Added key: 0xB34DBA77.
1913+
1914+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:32:10 +0000
1915+
1916+strongswan (5.1.2~rc1-0ubuntu1) trusty; urgency=medium
1917+
1918+ * New upstream release candidate.
1919+ * debian/*.install - include new configuration files for plugins in
1920+ appropiate packages.
1921+
1922+ -- Jonathan Davies <jonathan.davies@canonical.com> Sat, 15 Feb 2014 15:03:14 +0000
1923+
1924+strongswan (5.1.2~dr3+git20130120-0ubuntu3) trusty; urgency=low
1925+
1926+ * debian/control:
1927+ - Added Breaks/Replaces for all library files which have been moved
1928+ about (LP: #1278176).
1929+ - Removed build-dependency on check and added one on dh-apparmor.
1930+ * debian/strongswan-starter.postinst: Removed further out-dated code and
1931+ entire section on opportunistic encryption - this was never in strongSwan.
1932+ * debian/rules: Removed pieces on 'patching ipsec.conf' on build.
1933+
1934+ -- Jonathan Davies <jonathan.davies@canonical.com> Sun, 09 Feb 2014 23:53:23 +0000
1935+
1936+strongswan (5.1.2~dr3+git20130120-0ubuntu2) trusty; urgency=low
1937+
1938+ * debian/control: Fixed references to plugin-fips-prf.
1939+
1940+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 22 Jan 2014 11:22:14 +0000
1941+
1942+strongswan (5.1.2~dr3+git20130120-0ubuntu1) trusty; urgency=low
1943+
1944+ * Upstream Git snapshot for build fixes with regards to entropy.
1945+ * debian/rules:
1946+ - Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity checking.
1947+ - Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths in
1948+ tests.
1949+
1950+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 20 Jan 2014 19:00:59 +0000
1951+
1952+strongswan (5.1.2~dr3-0ubuntu1) trusty; urgency=low
1953+
1954+ * New upstream developer release.
1955+ * Made changes to packaging per upstream suggestions.
1956+ - Dropped medcli and medsrv packages - not recommended by upstream at this
1957+ time.
1958+ - Dropped ha plugin - needs special kernel.
1959+ - Improved all package descriptions in general.
1960+ - Drop build-dep on clearsilver-dev and libfcgi-dev - no longer needed.
1961+ - Removed debian/*logcheck* files - not relevant to strongSwan.
1962+ - Split dhcp and farp packages into sub-packages.
1963+ - Build kernel-libipsec, ntru, systime-fix, and xauth-noauth plugins.
1964+ - Changes to TNC-related packages.
1965+ * Created AppArmor profiles for lookip and stroke.
1966+
1967+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 15 Jan 2014 22:52:53 +0000
1968+
1969+strongswan (5.1.2~dr2+git20130106-0ubuntu2) trusty; urgency=low
1970+
1971+ * libstrongswan.install: Removed lingering unit-tester.so reference.
1972+
1973+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 06 Jan 2014 20:29:59 +0000
1974+
1975+strongswan (5.1.2~dr2+git20130106-0ubuntu1) trusty; urgency=low
1976+
1977+ * Git snapshot of commit 94e10f15e51ead788d9947e966878ebfdc95b7ce.
1978+ Incorporates upstream fixes for:
1979+ - Integrity testing.
1980+ - Unit test failures on little endian systems.
1981+ * Dropped debian/patches/02_test_asn1_fix_32bit_time_test.patch - fixed
1982+ upstream.
1983+ * debian/rules:
1984+ - Stop using CK_TIMEOUT_MULTIPLIER.
1985+ - Stop enabling the test suite only on non-powerpc arches (it runs
1986+ anyway).
1987+
1988+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 06 Jan 2014 20:17:20 +0000
1989+
1990+strongswan (5.1.2~dr2-0ubuntu3) trusty; urgency=low
1991+
1992+ * debian/control: Reinstate missing comma in dependencies.
1993+
1994+ -- Jonathan Davies <jonathan.davies@canonical.com> Fri, 03 Jan 2014 05:39:13 +0000
1995+
1996+strongswan (5.1.2~dr2-0ubuntu2) trusty; urgency=low
1997+
1998+ * Added debian/patches/02_test_asn1_fix_32bit_time_test.patch - fixes issue
1999+ where test for >2038 tests on 32-bit platforms is broken.
2000+ - Reported upstream: https://wiki.strongswan.org/issues/477
2001+ * debian/control: Added strongswan-plugin-ntru to strongswan-ike Suggests.
2002+
2003+ -- Jonathan Davies <jonathan.davies@canonical.com> Fri, 03 Jan 2014 05:02:32 +0000
2004+
2005+strongswan (5.1.2~dr2-0ubuntu1) trusty; urgency=low
2006+
2007+ * New upstream developer release.
2008+ * debian/rules: Configure with: --enable-af-alg, --enable-ntru, --enable-soup,
2009+ and --enable-unity.
2010+ * debian/control:
2011+ - New plugin packages created for the above
2012+ - Split fips-prf into its own package.
2013+ - Added build-dependency on libsoup2.4-dev.
2014+
2015+ -- Jonathan Davies <jonathan.davies@canonical.com> Thu, 02 Jan 2014 17:37:33 +0000
2016+
2017 strongswan (5.1.1-3) unstable; urgency=low
2018
2019 * Upload to unstable.
2020@@ -1023,6 +2880,192 @@ strongswan (5.1.1-1) unstable; urgency=low
2021
2022 -- Yves-Alexis Perez <corsac@debian.org> Fri, 24 Jan 2014 21:22:32 +0100
2023
2024+strongswan (5.1.1-0ubuntu17) trusty; urgency=low
2025+
2026+ * debian/control:
2027+ - Make strongswan-ike depend on iproute2.
2028+ - Added xauth plugin dependency on strongswan-plugin-eap-gtc.
2029+ - Created strongswan-libfast package.
2030+
2031+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 01 Jan 2014 17:04:45 +0000
2032+
2033+strongswan (5.1.1-0ubuntu16) trusty; urgency=low
2034+
2035+ * debian/control:
2036+ - Further splitting of plugins into subpackages (such as all EAP plugins
2037+ to their own packages).
2038+ - Added libpcsclite-dev to build-dependencies.
2039+ * debian/rules:
2040+ - Sort configure options in alphabetical order.
2041+ - Added configure option of --enable-eap-aka-3gpp2, --enable-eap-dynamic,
2042+ --enable-eap-sim-file, --enable-eap-sim-pcsc,
2043+ --enable-eap-simaka-pseudonym, --enable-eap-simaka-reauth and
2044+ --enable-eap-simaka-sql.
2045+ - Don't exclude medsrv from install.
2046+ * Moved eap-identity.so to libstrongswan package as it's used by all the
2047+ other EAP plugins.
2048+
2049+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 21:25:50 +0000
2050+
2051+strongswan (5.1.1-0ubuntu15) trusty; urgency=low
2052+
2053+ * debian/control:
2054+ - Split plugins from libstrongswan package into modular subpackages.
2055+ - Added libmysqlclient-dev to build-dependencies.
2056+ - strongswan-ike: Set to depend on either strongswan-plugins-openssl or
2057+ strongswan-plugins-gcrypt.
2058+ - strongswan-ike: All other plugins added to Suggests.
2059+ - Created two new TNC packages: strongswan-tnc-ifmap and
2060+ strongswan-tnc-pdp and added to tnc-imcvs Suggests.
2061+ * debian/rules: Added to CONFIGUREARGS: --enable-certexpire,
2062+ --enable-error-notify, --enable-mysql, --enable-load-tester,
2063+ --enable-radattr, --enable-tnc-pdp, and --enable-whitelist.
2064+ * debian/strongswan-ike.install: Moved eap-identity.so to -tnc-imcvs package.
2065+
2066+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 16:15:32 +0000
2067+
2068+strongswan (5.1.1-0ubuntu14) trusty; urgency=low
2069+
2070+ * debian/rules:
2071+ - CK_TIMEOUT_MULTIPLIER back down to 6.
2072+ - Disable unit tests on powerpc.
2073+
2074+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:39:48 +0000
2075+
2076+strongswan (5.1.1-0ubuntu13) trusty; urgency=low
2077+
2078+ * debian/rules: CK_TIMEOUT_MULTIPLIER to 10 as just powerppc is being stubborn.
2079+
2080+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:23:42 +0000
2081+
2082+strongswan (5.1.1-0ubuntu12) trusty; urgency=low
2083+
2084+ * debian/rules: Bring CK_TIMEOUT_MULTIPLIER up to 6 to fix powerppc and
2085+ armhf.
2086+
2087+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 07:03:40 +0000
2088+
2089+strongswan (5.1.1-0ubuntu11) trusty; urgency=low
2090+
2091+ * 02_increase-test_rsa_generate-timeout.patch: Removed - only fixed build on
2092+ one extra arch.
2093+ * debian/rules: Set CK_TIMEOUT_MULTIPLIER to 4.
2094+
2095+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 06:51:47 +0000
2096+
2097+strongswan (5.1.1-0ubuntu10) trusty; urgency=low
2098+
2099+ * debian/patches: Added patch 02_increase-test_rsa_generate-timeout.patch -
2100+ - Increases RSA key generate test timeout to 30 seconds so that it doesn't
2101+ fail on armhf, arm64, and powerppc.
2102+ * Contrary to what the last changelog entry says, we are still running
2103+ strongswan as root (with AppArmor protection).
2104+
2105+ -- Jonathan Davies <jonathan.davies@canonical.com> Tue, 31 Dec 2013 06:06:47 +0000
2106+
2107+strongswan (5.1.1-0ubuntu9) trusty; urgency=low
2108+
2109+ * debian/rules: Added to configure options:
2110+ - --enable-tnc-ifmap: enable TNC IF-MAP module.
2111+ - --enable-duplicheck: enable duplicheck plugin.
2112+ - --enable-imv-swid, --enable-imc-swid: Added.
2113+ - Run strongswan as it's own user.
2114+ * debian/strongswan-starter.install: Install duplicheck.
2115+ * debian/strongswan-tnc-imcvs.install: Install swidtags.
2116+
2117+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 19:33:27 +0000
2118+
2119+strongswan (5.1.1-0ubuntu8) trusty; urgency=low
2120+
2121+ * debian/rules: Added to configure options:
2122+ - --enable-unit-tests: check unit testing on build.
2123+ - --enable-unbound: for validating DNS lookups.
2124+ - --enable-dnscert: for DNSCERT peer authentication.
2125+ - --enable-ipseckey: for IPSEC key authentication.
2126+ - --enable-lookip: for LookIP functionality.
2127+ - --enable-coupling: certificate coupling functionality.
2128+ * debian/control: Added check, libldns-dev, libunbound-dev to
2129+ build-dependencies.
2130+ * debian/libstrongswan.install: Install new plugin .so's.
2131+ * debian/strongswan-starter.install: Added lookip.
2132+
2133+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:52:07 +0000
2134+
2135+strongswan (5.1.1-0ubuntu7) trusty; urgency=low
2136+
2137+ * strongswan-starter.install: Moved pt-tls-client to tnc-imcvs (to prevent
2138+ the former from depending on the latter).
2139+
2140+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:30:19 +0000
2141+
2142+strongswan (5.1.1-0ubuntu6) trusty; urgency=low
2143+
2144+ * debian/strongswan-starter.prerm: Stop strongswan service on package
2145+ removal (as opposed to using the old init.d script).
2146+
2147+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 17:22:10 +0000
2148+
2149+strongswan (5.1.1-0ubuntu5) trusty; urgency=low
2150+
2151+ * debian/rules:
2152+ - CONFIGUREARGS: Merged Debian and RPM options.
2153+ - Brings in TNC functionality.
2154+ * debian/control:
2155+ - Added build-dependency on libtspi-dev.
2156+ - Created strongswan-tnc-imcvs binary package for TNC components.
2157+ - Added strongswan-tnc-imcvs to libstrongswan's Suggests.
2158+ * debian/libstrongswan.install:
2159+ - Included newly built MD4 and SQLite libraries.
2160+ - Removed 'tnc' references (moved to TNC package).
2161+ * debian/strongswan-tnc-imcvs.install: Created - handle new TNC libraries and
2162+ binaries.
2163+ * debian/usr.lib.ipsec.charon: Allow access to TNC modules.
2164+
2165+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 14:05:43 +0000
2166+
2167+strongswan (5.1.1-0ubuntu4) trusty; urgency=low
2168+
2169+ * debian/usr.lib.ipsec.charon: Added - AppArmor profile for charon.
2170+ * debian/strongswan-starter.postrm: Removed 'update-rc.d ipsec remove' call.
2171+ * debian/control: strongswan-ike - Stop depending on ipsec-tools.
2172+
2173+ -- Jonathan Davies <jonathan.davies@canonical.com> Mon, 30 Dec 2013 05:35:17 +0000
2174+
2175+strongswan (5.1.1-0ubuntu3) trusty; urgency=low
2176+
2177+ * strongswan-starter.strongswan.upstart - Only start strongSwan when a
2178+ network connection is available.
2179+ * debian/control: Downgrade build-dep version of dpkg-dev from 1.16.2 to
2180+ 1.16.1 - to make precise backporting easier.
2181+
2182+ -- Jonathan Davies <jonathan.davies@canonical.com> Thu, 12 Dec 2013 10:43:15 +0000
2183+
2184+strongswan (5.1.1-0ubuntu2) trusty; urgency=low
2185+
2186+ * strongswan-starter.strongswan.upstart - Created Upstart job for
2187+ strongSwan.
2188+ * debian/rules: Set dh_installinit to install above file.
2189+ * debian/strongswan-starter.postinit:
2190+ - Removed section about runlevel changes, it's almost 2014.
2191+ - Adapted service restart section for Upstart.
2192+ - Remove old symlinks to init.d files is necessary.
2193+ * debian/strongswan-starter.dirs: Don't touch /etc/init.d.
2194+
2195+ -- Jonathan Davies <jonathan.davies@canonical.com> Wed, 11 Dec 2013 23:10:28 +0000
2196+
2197+strongswan (5.1.1-0ubuntu1) trusty; urgency=low
2198+
2199+ * New upstream release.
2200+ * Removed: debian/patches/CVE-2013-6075, CVE-2013-6076.patch - upsteamed.
2201+ * debian/control: Updated Standards-Version to 3.9.5 and applied
2202+ XSBC-Original-Maintainer policy.
2203+ * strongswan-starter.install:
2204+ - pki tool is now in /usr/bin.
2205+ - Install pt-tls-client.
2206+ - Install manpages (LP: #1206263).
2207+
2208+ -- Jonathan Davies <jpds@ubuntu.com> Sun, 01 Dec 2013 17:43:59 +0000
2209+
2210 strongswan (5.1.0-3) unstable; urgency=high
2211
2212 * urgency=high for the security fixes.
2213diff --git a/debian/control b/debian/control
2214index df2d9f3..c82b7aa 100644
2215--- a/debian/control
2216+++ b/debian/control
2217@@ -1,7 +1,8 @@
2218 Source: strongswan
2219 Section: net
2220 Priority: optional
2221-Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org>
2222+Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
2223+XSBC-Original-Maintainer: strongSwan Maintainers <pkg-swan-devel@lists.alioth.debian.org>
2224 Uploaders: Yves-Alexis Perez <corsac@debian.org>
2225 Standards-Version: 4.7.1
2226 Vcs-Browser: https://salsa.debian.org/debian/strongswan
2227@@ -207,6 +208,9 @@ Description: strongSwan charon library (extra plugins)
2228 - unity (Cisco Unity extensions for IKEv1)
2229 - xauth-eap (XAuth backend that uses EAP methods to verify passwords)
2230 - xauth-pam (XAuth backend that uses PAM modules to verify passwords)
2231+ - eap-dynamic (EAP proxy plugin that dynamically selects an EAP method
2232+ requested/supported by the client (since 5.0.1))
2233+ - eap-peap (EAP-PEAP protocol handler, wraps other EAP methods securely)
2234
2235 Package: strongswan-starter
2236 Architecture: any
2237@@ -214,10 +218,10 @@ Pre-Depends: ${misc:Pre-Depends}
2238 Depends: adduser,
2239 libstrongswan (= ${binary:Version}),
2240 sysvinit-utils (>= 3.05-3),
2241+ strongswan-charon,
2242 ${misc:Depends},
2243 ${shlibs:Depends}
2244 Conflicts: libreswan
2245-Recommends: strongswan-charon
2246 Description: strongSwan daemon starter and configuration file parser
2247 The strongSwan VPN suite uses the native IPsec stack in the standard
2248 Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
2249@@ -253,10 +257,10 @@ Architecture: any
2250 Pre-Depends: debconf | debconf-2.0
2251 Depends: iproute2 [linux-any] | iproute [linux-any],
2252 libstrongswan (= ${binary:Version}),
2253- strongswan-starter,
2254 ${misc:Depends},
2255 ${shlibs:Depends}
2256 Conflicts: charon-systemd
2257+Recommends: strongswan-starter,
2258 Provides: ike-server
2259 Description: strongSwan Internet Key Exchange daemon
2260 The strongSwan VPN suite uses the native IPsec stack in the standard
2261diff --git a/debian/libcharon-extra-plugins.install b/debian/libcharon-extra-plugins.install
2262index 94fbabd..91ca716 100644
2263--- a/debian/libcharon-extra-plugins.install
2264+++ b/debian/libcharon-extra-plugins.install
2265@@ -2,9 +2,11 @@
2266 usr/lib/ipsec/plugins/libstrongswan-addrblock.so
2267 usr/lib/ipsec/plugins/libstrongswan-certexpire.so
2268 usr/lib/ipsec/plugins/libstrongswan-eap-aka.so
2269+usr/lib/ipsec/plugins/libstrongswan-eap-dynamic.so
2270 usr/lib/ipsec/plugins/libstrongswan-eap-gtc.so
2271 usr/lib/ipsec/plugins/libstrongswan-eap-identity.so
2272 usr/lib/ipsec/plugins/libstrongswan-eap-md5.so
2273+usr/lib/ipsec/plugins/libstrongswan-eap-peap.so
2274 usr/lib/ipsec/plugins/libstrongswan-eap-radius.so
2275 usr/lib/ipsec/plugins/libstrongswan-eap-tls.so
2276 usr/lib/ipsec/plugins/libstrongswan-eap-tnc.so
2277@@ -25,9 +27,11 @@ usr/lib/ipsec/plugins/libstrongswan-xauth-pam.so
2278 usr/share/strongswan/templates/config/plugins/addrblock.conf
2279 usr/share/strongswan/templates/config/plugins/certexpire.conf
2280 usr/share/strongswan/templates/config/plugins/eap-aka.conf
2281+usr/share/strongswan/templates/config/plugins/eap-dynamic.conf
2282 usr/share/strongswan/templates/config/plugins/eap-gtc.conf
2283 usr/share/strongswan/templates/config/plugins/eap-identity.conf
2284 usr/share/strongswan/templates/config/plugins/eap-md5.conf
2285+usr/share/strongswan/templates/config/plugins/eap-peap.conf
2286 usr/share/strongswan/templates/config/plugins/eap-radius.conf
2287 usr/share/strongswan/templates/config/plugins/eap-tls.conf
2288 usr/share/strongswan/templates/config/plugins/eap-tnc.conf
2289@@ -49,9 +53,11 @@ etc/strongswan.d/tnc.conf
2290 etc/strongswan.d/charon/addrblock.conf
2291 etc/strongswan.d/charon/certexpire.conf
2292 etc/strongswan.d/charon/eap-aka.conf
2293+etc/strongswan.d/charon/eap-dynamic.conf
2294 etc/strongswan.d/charon/eap-gtc.conf
2295 etc/strongswan.d/charon/eap-identity.conf
2296 etc/strongswan.d/charon/eap-md5.conf
2297+etc/strongswan.d/charon/eap-peap.conf
2298 etc/strongswan.d/charon/eap-radius.conf
2299 etc/strongswan.d/charon/eap-tls.conf
2300 etc/strongswan.d/charon/eap-tnc.conf
2301diff --git a/debian/rules b/debian/rules
2302index 415178c..42a7f54 100755
2303--- a/debian/rules
2304+++ b/debian/rules
2305@@ -17,9 +17,11 @@ CONFIGUREARGS := --libdir=/usr/lib --libexecdir=/usr/lib \
2306 --enable-curve25519 \
2307 --enable-eap-aka \
2308 --enable-eap-gtc \
2309+ --enable-eap-dynamic \
2310 --enable-eap-identity \
2311 --enable-eap-md5 \
2312 --enable-eap-mschapv2 \
2313+ --enable-eap-peap \
2314 --enable-eap-radius \
2315 --enable-eap-tls \
2316 --enable-eap-tnc \
2317diff --git a/debian/tests/control b/debian/tests/control
2318index 524498c..43d9b0c 100644
2319--- a/debian/tests/control
2320+++ b/debian/tests/control
2321@@ -5,3 +5,9 @@ Restrictions: needs-root isolation-container allow-stderr
2322 Tests: daemon plugins
2323 Depends: strongswan-starter, strongswan-charon, libstrongswan-standard-plugins, libstrongswan-extra-plugins, libcharon-extra-plugins
2324 Restrictions: needs-root isolation-machine allow-stderr
2325+
2326+Tests: host-to-host
2327+Depends: strongswan-swanctl, strongswan-pki, libstrongswan-extra-plugins,
2328+ charon-systemd, lsb-release, snapd, dctrl-tools, libtss2-tcti-tabrmd0,
2329+ bind9-dnsutils
2330+Restrictions: needs-root isolation-machine allow-stderr skippable
2331diff --git a/debian/tests/host-to-host b/debian/tests/host-to-host
2332new file mode 100755
2333index 0000000..3a76da0
2334--- /dev/null
2335+++ b/debian/tests/host-to-host
2336@@ -0,0 +1,401 @@
2337+#!/bin/bash
2338+
2339+# host to host setup from https://docs.strongswan.org/docs/5.9/config/quickstart.html
2340+
2341+set -e
2342+set -o pipefail
2343+
2344+# exit early if not on Ubuntu
2345+if [ "$(lsb_release --short --id)" != "Ubuntu" ]; then
2346+ echo "This test only runs on Ubuntu, skipping."
2347+ exit 77
2348+fi
2349+
2350+cleanup() {
2351+ if [ $? -ne 0 ]; then
2352+ set +e
2353+ echo "Something failed, gathering debug info"
2354+ echo
2355+ echo "Installed strongswan packages:"
2356+ dpkg -l | grep -E "(strongswan|charon)"
2357+ echo
2358+ echo "loaded kernel modules:"
2359+ lsmod
2360+ echo
2361+ echo "journal logs from host:"
2362+ journalctl --no-pager -u strongswan.service || :
2363+ echo
2364+ echo "LXD details:"
2365+ lxc network list
2366+ lxc list
2367+ echo
2368+ for container in $(lxc list -f compact -c ns | grep -F RUNNING | awk '{print $1}'); do
2369+ echo "journal logs from container ${container}"
2370+ lxc exec "${container}" -- journalctl -u strongswan.service --no-pager || :
2371+ echo
2372+ echo "strongswan data from container ${container}"
2373+ for cmd in stats list-certs list-conns list-pols list-sas; do
2374+ echo "${cmd}:"
2375+ lxc exec "${container}" -- swanctl --${cmd} || :
2376+ echo
2377+ done
2378+ done
2379+ fi
2380+ set +e
2381+ rm -rf "${WORKDIR}"
2382+ for container in "${PEERS[@]}"; do
2383+ lxc delete --force "${container}" > /dev/null 2>&1 || :
2384+ done
2385+}
2386+
2387+trap cleanup EXIT
2388+
2389+WORKDIR=$(mktemp -d)
2390+PEERS=("moon" "sun")
2391+declare -A REMOTE
2392+REMOTE["moon"]="sun"
2393+REMOTE["sun"]="moon"
2394+PUBKEY_ALGO="ed25519"
2395+TESTNAME=$(basename "${0}")
2396+
2397+# ca
2398+CA_KEY_FILE="${WORKDIR}/strongswanKey.pem"
2399+REQ_FILE="${WORKDIR}/req.pem" # can be reused for multiple reqs
2400+CA_CERT_FILE="${WORKDIR}/strongswanCert.pem"
2401+
2402+source debian/tests/utils
2403+
2404+check_pol() {
2405+ #root@moon:~# swanctl --list-pols
2406+ #moon-sun/moon-sun, TUNNEL
2407+ # local: 10.38.71.14/32
2408+ # remote: 10.38.71.194/32
2409+ local me="${1}"
2410+ local pol="${2}"
2411+ local -i failures=0
2412+ local tunnel
2413+ local ip
2414+ local policy_ip
2415+
2416+ echo "Checking policy for:"
2417+ echo -n " we have a tunnel: "
2418+ if echo "${pol}" | head -n 1 | grep -qF TUNNEL; then
2419+ echo "OK"
2420+ else
2421+ echo "FAIL"
2422+ failures=$((failures+1))
2423+ fi
2424+
2425+ # moon-sun/moon-sun, TUNNEL -> tunnel = moon-sun
2426+ tunnel=$(echo "${pol}" | head -n 1 | cut -d , -f 1)
2427+ echo -n " tunnel matches local-remote: "
2428+ if echo "${tunnel}" | grep -qE "^${me}-${REMOTE[${me}]}/${me}-${REMOTE[${me}]}"; then
2429+ echo "OK"
2430+ else
2431+ echo "FAIL (tunnel=${tunnel})"
2432+ failures=$((failures+1))
2433+ fi
2434+
2435+ echo -n " local IP matches local peer: "
2436+ ip=$(lxc exec "${me}" -- dig +short "${me}.lxd")/32
2437+ policy_ip=$(echo "${pol}" | sed -n -r "s,^[[:blank:]]+local:[[:blank:]]+([0-9.]+/32),\1,p")
2438+ if [ "${ip}" = "${policy_ip}" ]; then
2439+ echo "OK"
2440+ else
2441+ echo "FAIL: local ip ${ip} != policy local ip ${policy_ip}"
2442+ failures=$((failures+1))
2443+ fi
2444+
2445+ echo -n " remote IP matches remote peer: "
2446+ ip=$(lxc exec "${me}" -- dig +short "${REMOTE[${me}]}.lxd")/32
2447+ policy_ip=$(echo "${pol}" | sed -n -r "s,^[[:blank:]]+remote:[[:blank:]]+([0-9.]+/32),\1,p")
2448+ if [ "${ip}" = "${policy_ip}" ]; then
2449+ echo "OK"
2450+ else
2451+ echo "FAIL: local ip ${ip} != policy local ip ${policy_ip}"
2452+ failures=$((failures+1))
2453+ fi
2454+
2455+ return ${failures}
2456+}
2457+
2458+check_sa() {
2459+ local -i failures=0
2460+ local me="${1}"
2461+ local sa="${2}"
2462+ local name=""
2463+ local sa_ip
2464+
2465+ # SAs look like this:
2466+ # moon-sun: #1, ESTABLISHED, IKEv2, f1bdc688a5078946_i* bf6e1559c5a87ab9_r
2467+ # local 'C=CH, O=strongswan, CN=moon.strongswan.org' @ 10.84.128.22[4500]
2468+ # remote 'C=CH, O=strongswan, CN=sun.strongswan.org' @ 10.84.128.191[4500]
2469+ # AES_CBC-128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/CURVE_25519
2470+ # established 11s ago, rekeying in 14147s
2471+ # moon-sun: #2, reqid 1, INSTALLED, TUNNEL, ESP:AES_GCM_16-128
2472+ # installed 11s ago, rekeying in 3285s, expires in 3949s
2473+ # in c3bcdf8d, 168 bytes, 2 packets, 0s ago
2474+ # out caf49378, 168 bytes, 2 packets, 0s ago
2475+ # local 10.84.128.22/32
2476+ # remote 10.84.128.191/32
2477+
2478+ echo "Checking SA for:"
2479+
2480+ echo -n " established SA: "
2481+ if echo "${sa}" | grep -qE "^[[:alnum:]]+-[[:alnum:]]+:.*ESTABLISHED"; then
2482+ echo "OK"
2483+ else
2484+ echo "FAIL"
2485+ failures=$((failures+1))
2486+ fi
2487+
2488+ # parse the connection name from the first line: $local-$remote: #1,....
2489+ name=$(echo "${sa}" | head -n 1 | sed -r "s/^([[:alnum:]]+)-[[:alnum:]]+:.*/\1/")
2490+ echo -n " local DN matches CN=${name}.strongswan.org: "
2491+ if echo "${sa}" | grep -qE "^[[:blank:]]*local.*CN=${name}\.strongswan\.org"; then
2492+ echo "OK"
2493+ else
2494+ echo "FAIL"
2495+ failures=$((failures+1))
2496+ fi
2497+
2498+ # parse the connection name from the first line: $local-$remote: #1,....
2499+ name=$(echo "${sa}" | head -n 1 | sed -r "s/^[[:alnum:]]+-([[:alnum:]]+):.*/\1/")
2500+ echo -n " remote DN matches CN=${name}.strongswan.org: "
2501+ if echo "${sa}" | grep -qE "^[[:blank:]]*remote.*CN=${name}\.strongswan\.org"; then
2502+ echo "OK"
2503+ else
2504+ echo "FAIL"
2505+ failures=$((failures+1))
2506+ fi
2507+
2508+ echo -n " local IP matches local peer: "
2509+ ip=$(lxc exec "${me}" -- dig +short "${me}.lxd")/32
2510+ sa_ip=$(echo "${sa}" | sed -n -r "s,^[[:blank:]]+local[[:blank:]]+([0-9.]+/32),\1,p")
2511+ if [ "${ip}" = "${sa_ip}" ]; then
2512+ echo "OK"
2513+ else
2514+ echo "FAIL: local ip ${ip} != SA local ip ${sa_ip}"
2515+ failures=$((failures+1))
2516+ fi
2517+
2518+ echo -n " remote IP matches remote peer: "
2519+ ip=$(lxc exec "${me}" -- dig +short "${REMOTE[${me}]}.lxd")/32
2520+ sa_ip=$(echo "${sa}" | sed -n -r "s,^[[:blank:]]+remote[[:blank:]]+([0-9.]+/32),\1,p")
2521+ if [ "${ip}" = "${sa_ip}" ]; then
2522+ echo "OK"
2523+ else
2524+ echo "FAIL: remote ip ${ip} != SA remote ip ${sa_ip}"
2525+ failures=$((failures+1))
2526+ fi
2527+
2528+ # TODO: check for cipher, if it matches the algo used in the pubkey
2529+ # TODO: check for traffic, should not be zero
2530+
2531+ return ${failures}
2532+}
2533+
2534+_setup_peer() {
2535+ local peer="${1}"
2536+ local algo="${2}"
2537+ local key_file="${WORKDIR}/${peer}Key.pem"
2538+ local cert_file="${WORKDIR}/${peer}Cert.pem"
2539+
2540+ pki --gen --type "${algo}" --outform pem > "${key_file}"
2541+
2542+ pki --req --type priv --in "${key_file}" \
2543+ --dn "C=CH, O=strongswan, CN=${peer}.strongswan.org" \
2544+ --san "${peer}.strongswan.org" --outform pem > "${REQ_FILE}"
2545+
2546+ pki --issue --cacert "${CA_CERT_FILE}" --cakey "${CA_KEY_FILE}" \
2547+ --type pkcs10 --in "${REQ_FILE}" --serial 01 --lifetime 5 \
2548+ --outform pem --flag serverAuth > "${cert_file}"
2549+}
2550+
2551+_setup_lxd() {
2552+ lxd init --auto
2553+ network=$(lxc network list --format=compact | grep -E "bridge.*YES.*CREATED" | awk '{print $1}')
2554+ lxc network set "${network:-lxdbr0}" ipv6.address=none
2555+ if [ -n "${http_proxy}" ]; then
2556+ lxc config set core.proxy_http "${http_proxy}"
2557+ fi
2558+ if [ -n "${https_proxy}" ]; then
2559+ lxc config set core.proxy_https "${https_proxy}"
2560+ fi
2561+ if [ -n "${noproxy}" ]; then
2562+ lxc config set core.proxy_ignore_hosts "${noproxy}"
2563+ fi
2564+}
2565+
2566+_setup_host_containers() {
2567+ local release
2568+ local ip
2569+ local -i result=0
2570+ local -a deps
2571+
2572+ release=$(lsb_release -cs)
2573+ readarray -t deps < <(get_test_dependencies "${TESTNAME}" snapd dctrl-tools)
2574+
2575+ for container in "${PEERS[@]}"; do
2576+ echo "Launching container ${container} with release ${release}"
2577+ lxc launch "ubuntu-daily:${release}" "${container}" -c security.nesting=true -q
2578+ echo -en "Waiting for container ${container} to be ready "
2579+ wait_container_ready "${container}"
2580+
2581+ echo "Copying over /etc/apt to container ${container}"
2582+ lxc exec "${container}" -- rm -rf /etc/apt
2583+ lxc exec "${container}" -- mkdir -p /etc/apt
2584+ tar -cC /etc/apt . | lxc exec "${container}" -- tar -xC /etc/apt
2585+
2586+ echo "Installing deps in container ${container} (${deps[*]})"
2587+ output=$(lxc exec "${container}" -- apt-get update -q) || {
2588+ result=$?
2589+ echo "apt-get update failed in container ${container}"
2590+ echo "${output}"
2591+ return ${result}
2592+ }
2593+ output=$(lxc exec "${container}" --env DEBIAN_FRONTEND=noninteractive -- apt-get dist-upgrade -q -y) || {
2594+ result=$?
2595+ echo "apt-get dist-upgrade failed in container ${container}"
2596+ echo "${output}"
2597+ return ${result}
2598+ }
2599+ output=$(lxc exec "${container}" --env DEBIAN_FRONTEND=noninteractive -- apt-get install -q -y "${deps[@]}") || {
2600+ result=$?
2601+ echo "apt-get install ${deps[*]} failed in container ${container}"
2602+ echo "${output}"
2603+ return ${result}
2604+ }
2605+ echo "Done for container ${container}"
2606+ done
2607+}
2608+
2609+_setup_host_containers_certs() {
2610+ for container in "${PEERS[@]}"; do
2611+ echo "Copying ${CA_CERT_FILE} to container ${container}"
2612+ lxc file push "${CA_CERT_FILE}" "${container}/etc/swanctl/x509ca/"
2613+
2614+ echo "Copying ${container} cert and key"
2615+ lxc file push "${WORKDIR}/${container}Key.pem" "${container}/etc/swanctl/private/"
2616+ lxc file push "${WORKDIR}/${container}Cert.pem" "${container}/etc/swanctl/x509/"
2617+ done
2618+}
2619+
2620+_setup_host_containers_strongswan() {
2621+ local config
2622+
2623+ config=$(mktemp)
2624+
2625+ for peer in "${PEERS[@]}"; do
2626+ conn_name="${peer}-${REMOTE[${peer}]}"
2627+ cat > "${config}" <<EOF
2628+connections {
2629+ ${conn_name} {
2630+ remote_addrs = ${REMOTE[${peer}]}.lxd
2631+ local {
2632+ auth=pubkey
2633+ certs = ${peer}Cert.pem
2634+ }
2635+ remote {
2636+ auth = pubkey
2637+ id = "C=CH, O=strongswan, CN=${REMOTE[${peer}]}.strongswan.org"
2638+ }
2639+ children {
2640+ ${conn_name} {
2641+ start_action = trap
2642+ }
2643+ }
2644+ }
2645+}
2646+EOF
2647+ lxc file push "${config}" "${peer}/etc/swanctl/conf.d/${conn_name}.conf"
2648+ echo "Loading creds in container ${peer}"
2649+ lxc exec "${peer}" -- swanctl --load-creds
2650+ echo "Loading connections in container ${peer}"
2651+ lxc exec "${peer}" -- swanctl --load-conns
2652+ done
2653+}
2654+
2655+setup() {
2656+ local algo=${1:-ed25519}
2657+ echo "Creating a CA"
2658+ echo
2659+ echo "Generating private key for CA"
2660+ pki --gen --type "${algo}" --outform pem > "${CA_KEY_FILE}"
2661+
2662+ echo "Generating self-signed certificate for CA"
2663+ pki \
2664+ --self --ca --lifetime 10 --in "${CA_KEY_FILE}" \
2665+ --dn "C=CH, O=strongSwan, CN=strongSwan Root CA" \
2666+ --outform pem > "${CA_CERT_FILE}"
2667+ echo "Here is the CA cert:"
2668+ pki --print --in "${CA_CERT_FILE}"
2669+
2670+ for peer in "${PEERS[@]}"; do
2671+ echo "Generating key and certificate for peer ${peer}"
2672+ _setup_peer "${peer}" "${algo}"
2673+ done
2674+
2675+ echo "Setting up host LXD"
2676+ _setup_lxd
2677+
2678+ echo "Creating host containers"
2679+ _setup_host_containers
2680+
2681+ echo "Copy certificates to containers"
2682+ _setup_host_containers_certs
2683+
2684+ echo "Configuring strongswan in containers"
2685+ _setup_host_containers_strongswan
2686+}
2687+
2688+test_ping() {
2689+ for peer in "${PEERS[@]}"; do
2690+ echo "Generating traffic from ${peer} to ${REMOTE[${peer}]}"
2691+ # first ping to establish the tunnel always fails
2692+ lxc exec "${peer}" -- ping -c 2 -W 3 "${REMOTE[${peer}]}.lxd" > /dev/null 2>&1 || :
2693+ # this one must work
2694+ lxc exec "${peer}" -- ping -c 4 -W 3 "${REMOTE[${peer}]}.lxd"
2695+ echo
2696+ done
2697+}
2698+
2699+test_sa() {
2700+ for peer in "${PEERS[@]}"; do
2701+ sa=$(lxc exec "${peer}" -- swanctl --list-sas)
2702+ echo "This is the ${peer} SA:"
2703+ if [ -z "${sa}" ]; then
2704+ echo "FAILED: SA is empty (swanctl --list-sas)"
2705+ return 1
2706+ fi
2707+ echo "${sa}"
2708+ echo
2709+ check_sa "${peer}" "${sa}"
2710+ echo
2711+ done
2712+}
2713+
2714+test_pol() {
2715+ for peer in "${PEERS[@]}"; do
2716+ pol=$(lxc exec "${peer}" -- swanctl --list-pols)
2717+ echo "This is the ${peer} policy:"
2718+ if [ -z "${pol}" ]; then
2719+ echo "FAILED: pol is empty (swanctl --list-pols)"
2720+ return 1
2721+ fi
2722+ echo "${pol}"
2723+ echo
2724+ check_pol "${peer}" "${pol}"
2725+ echo
2726+ done
2727+}
2728+
2729+
2730+# the lxd deb package last existed in focal, so we install the snap
2731+snap list lxd > /dev/null 2>&1 || snap install lxd
2732+
2733+setup "${PUBKEY_ALGO}"
2734+
2735+test_ping
2736+test_sa
2737+test_pol
2738diff --git a/debian/tests/utils b/debian/tests/utils
2739new file mode 100644
2740index 0000000..e8a8584
2741--- /dev/null
2742+++ b/debian/tests/utils
2743@@ -0,0 +1,61 @@
2744+wait_container_ready() {
2745+ local container="${1}"
2746+ local -i limit=300 # seconds
2747+ local -i i=0
2748+ while /bin/true; do
2749+ ip=$(lxc list "${container}" -c 4 --format=compact | tail -1 | awk '{print $1}')
2750+ if [ -n "${ip}" ]; then
2751+ break
2752+ fi
2753+ i=$((i+1))
2754+ if [ ${i} -ge ${limit} ]; then
2755+ return 1
2756+ fi
2757+ sleep 1s
2758+ echo -n "."
2759+ done
2760+ while ! nc -z "${ip}" 22; do
2761+ echo -n "."
2762+ i=$((i+1))
2763+ if [ ${i} -ge ${limit} ]; then
2764+ return 1
2765+ fi
2766+ sleep 1s
2767+ done
2768+ # cloud-init might still be doing things...
2769+ # this call blocks, so wrap it in its own little timeout
2770+ # Give it ${limit} seconds too
2771+ output=$(lxc exec "${container}" -- timeout --verbose ${limit} cloud-init status --wait) || {
2772+ result=$?
2773+ echo "cloud-init status --wait failed on container ${container}"
2774+ echo "${output}"
2775+ return ${result}
2776+ }
2777+ echo
2778+}
2779+
2780+get_test_dependencies() {
2781+ local test_name="${1}"
2782+ shift
2783+ local exclusions="$*"
2784+ # Get test dependencies which we need to install in the containers
2785+ # we will create:
2786+ # -s: show Depends field
2787+ # -n: omit field name in output
2788+ # -X: do an exact match, instead of substring
2789+ # -F Tests: apply regexp to Tests field
2790+ depends=$(grep-dctrl -s Depends -n -F Tests -X "${test_name}" debian/tests/control | tr -d ,)
2791+ [ -n "${depends}" ] || {
2792+ echo "Failed to obtain list of dependencies for this test"
2793+ return 1
2794+ }
2795+ # remove exclusions, if any
2796+ for p in ${depends}; do
2797+ if echo "${exclusions}" | grep -qwF "${p}"; then
2798+ continue
2799+ else
2800+ echo "${p}"
2801+ fi
2802+ done
2803+}
2804+
2805diff --git a/debian/usr.sbin.swanctl b/debian/usr.sbin.swanctl
2806index 455c7cb..54c2b06 100644
2807--- a/debian/usr.sbin.swanctl
2808+++ b/debian/usr.sbin.swanctl
2809@@ -22,7 +22,7 @@
2810 /run/charon.vici rw,
2811
2812 # Allow reading own binary
2813- /usr/sbin/swanctl r,
2814+ /usr/sbin/swanctl rm,
2815
2816 # for af-alg plugin
2817 network alg seqpacket,

Subscribers

People subscribed via source and target branches