Revisions of strongswan

Mohd Saquib's avatar Mohd Saquib (msaquib) accepted request 1077377 from Mohd Saquib's avatar Mohd Saquib (msaquib) (revision 147)
- Allow to use stroke aka ipsec interface by default instead of
  vici aka swanctl interface which is current upstream's default.
  strongswan.service which enables swanctl interface is masked to
  stop interfering with the ipsec interface (bsc#1184144)
- Removes deprecated SysV support
buildservice-autocommit accepted request 1068724 from Jan Engelhardt's avatar Jan Engelhardt (jengelh) (revision 146)
baserev update by copy to link target
Jan Engelhardt's avatar Jan Engelhardt (jengelh) committed (revision 145)
upgrade note
Jan Engelhardt's avatar Jan Engelhardt (jengelh) committed (revision 144)
- Update to release 5.9.10
Mohd Saquib's avatar Mohd Saquib (msaquib) accepted request 1068696 from Mohd Saquib's avatar Mohd Saquib (msaquib) (revision 143)
- Added patch to fix a vulnerability in incorrectly accepted
  untrusted public key with incorrect refcount
  (CVE-2023-26463 boo#1208608)
  [+ CVE-2023-26463_tls_auth_bypass_exp_pointer.patch]
Mohd Saquib's avatar Mohd Saquib (msaquib) accepted request 1068689 from Mohd Saquib's avatar Mohd Saquib (msaquib) (revision 142)
- Fixed a vulnerability in incorrectly accepted untrusted public key
  with incorrect refcount (CVE-2023-26463 boo#1208608).
buildservice-autocommit accepted request 1046554 from Jan Engelhardt's avatar Jan Engelhardt (jengelh) (revision 141)
baserev update by copy to link target
Jan Engelhardt's avatar Jan Engelhardt (jengelh) committed (revision 140)
- Update to release 5.9.9
Jan Engelhardt's avatar Jan Engelhardt (jengelh) committed (revision 138)
- Update to release 5.9.8
Jan Engelhardt's avatar Jan Engelhardt (jengelh) committed (revision 137)
heed changelog syntax requirements
Jan Engelhardt's avatar Jan Engelhardt (jengelh) accepted request 991798 from Peter Conrad's avatar Peter Conrad (p_conrad) (revision 136)
This resolves one issue in particular that caused failures in Tumbleweed, see https://forums.opensuse.org/showthread.php/569960-Latest-strongswan-ipsec-crashes-on-startup .

- Update to release 5.9.7
  * The IKEv2 key derivation is now delayed until the keys are actually needed to process or send the next message.
  * Inbound IKEv2 messages, in particular requests, are now processed differently.
  * The retransmission logic in the dhcp plugin has been fixed (#1154).
  * The connmark plugin now considers configured masks in installed firewall rules (#1087).
  * Child config selection has been fixed as responder in cases where multiple children use transport mode traffic selectors (#1143).
  * The outbound SA/policy is now also removed after IKEv1 CHILD_SA rekeyings (#1041).
  * The openssl plugin supports AES and Camellia in CTR mode (112bb46).
  * The AES-XCBC/CMAC PRFs are demoted in the default proposal (after HMAC-based PRFs) since they were never widely adopted
  * The kdf plugin is now automatically enabled if any of the aesni, cmac or xcbc plugins are enabled, or if none of the plugins that directly provide HMAC-based KDFs are enabled (botan, openssl or wolfssl).
  * The CALLBACK macros (and some other issues) have been fixed when compiling with GCC 12 (#1053).
Jan Engelhardt's avatar Jan Engelhardt (jengelh) committed (revision 135)
- Update to release 5.9.6
Jan Engelhardt's avatar Jan Engelhardt (jengelh) accepted request 962674 from Marcus Meissner's avatar Marcus Meissner (msmeissn) (revision 134)
resubmit without hacky namespace change


- prf-plus-modularization.patch: updated from upstream branch
  after certifier feedback, SKEYSEED generated via HKDF-Extract.
Jan Engelhardt's avatar Jan Engelhardt (jengelh) accepted request 960489 from Marcus Meissner's avatar Marcus Meissner (msmeissn) (revision 133)
- Added prf-plus-modularization.patch that outsources the IKE 
  key derivation to openssl. (will be merged to 5.9.6)
- package the kdf config, template and plugin
Jan Engelhardt's avatar Jan Engelhardt (jengelh) accepted request 950382 from Marcus Meissner's avatar Marcus Meissner (msmeissn) (revision 132)
add more references for later sle import
Jan Engelhardt's avatar Jan Engelhardt (jengelh) committed (revision 131)
- Update to release 5.9.5
Jan Engelhardt's avatar Jan Engelhardt (jengelh) accepted request 949255 from Marcus Meissner's avatar Marcus Meissner (msmeissn) (revision 130)
This adds bug references to changes file that are in SLES 15 SP2,
to allow potential reintegration to SLES.

old: network:vpn/strongswan
new: home:msmeissn:branches:network:vpn/strongswan rev None
Index: strongswan.changes
===================================================================
--- strongswan.changes (revision 129)
+++ strongswan.changes (revision 2)
@@ -12,12 +12,12 @@
     was caused by an integer overflow when processing RSASSA-PSS
     signatures with very large salt lengths. This vulnerability has
     been registered as CVE-2021-41990. Please refer to our blog for
-    details.
+    details. (bsc#1191367)
   * Fixed a denial-of-service vulnerability in the in-memory
     certificate cache if certificates are replaced and a very large
     random value caused an integer overflow. This vulnerability has
     been registered as CVE-2021-41991. Please refer to our blog for
-    details.
+    details. (bsc#1191435)
   * Fixed a related flaw that caused the daemon to accept and cache
     an infinite number of versions of a valid certificate by
     modifying the parameters in the signatureAlgorithm field of the
@@ -46,7 +46,7 @@
 - Update to version 5.9.3:
   * Added AES-ECB, SHA-3 and SHAKE-256 support to the wolfssl
     plugin.
-  * Added AES-CCM support to the openssl plugin (#353).
+  * Added AES-CCM support to the openssl plugin (#353 bsc#1185363).
   * The x509 and the openssl plugins now consider the
     authorityKeyIdentifier, if available, before verifying
     signatures, which avoids unnecessary signature verifications
@@ -70,6 +70,9 @@
 - Replace libsoup-devel with pkgconfig(libsoup-2.4) BuildRequires,
   as this is what really checks for. Needed as libsoup-3.0 is
   released.
+- 5.9.1
+  - README: added a missing " to pki example command (bsc#1167880)
+  - fixed a libgcrypt call in FIPS mode (bsc#1180801)
 
 -------------------------------------------------------------------
 Mon Sep  7 08:38:01 UTC 2020 - Jan Engelhardt <jengelh@inai.de>
Jan Engelhardt's avatar Jan Engelhardt (jengelh) accepted request 933481 from Johannes Segitz's avatar Johannes Segitz (jsegitz) (revision 129)
Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
Jan Engelhardt's avatar Jan Engelhardt (jengelh) accepted request 933151 from Bjørn Lie's avatar Bjørn Lie (iznogood) (revision 128)
- Update to version 5.9.4:
  * Fixed a denial-of-service vulnerability in the gmp plugin that
    was caused by an integer overflow when processing RSASSA-PSS
    signatures with very large salt lengths. This vulnerability has
    been registered as CVE-2021-41990. Please refer to our blog for
    details.
  * Fixed a denial-of-service vulnerability in the in-memory
    certificate cache if certificates are replaced and a very large
    random value caused an integer overflow. This vulnerability has
    been registered as CVE-2021-41991. Please refer to our blog for
    details.
  * Fixed a related flaw that caused the daemon to accept and cache
    an infinite number of versions of a valid certificate by
    modifying the parameters in the signatureAlgorithm field of the
    outer X.509 Certificate structure.
  * AUTH_LIFETIME notifies are now only sent by a responder if it
    can't reauthenticate the IKE_SA itself due to asymmetric
    authentication (i.e. EAP) or the use of virtual IPs.
  * Several corner cases with reauthentication have been fixed
    (48fbe1d, 36161fe, 0d373e2).
  * Serial number generation in several pki sub-commands has been
    fixed so they don't start with an unintended zero byte.
  * Loading SSH public keys via vici has been improved.
  * Shared secrets, PEM files, vici messages, PF_KEY messages,
    swanctl configs and other data is properly wiped from memory.
  * Use a longer dummy key to initialize HMAC instances in the
    openssl plugin in case it's used in FIPS-mode.
  * The --enable-tpm option now implies --enable-tss-tss2 as the
    plugin doesn't do anything without a TSS 2.0.
  * libtpmtss is initialized in all programs and libraries that use
    it.
  * Migrated testing scripts to Python 3.
Displaying revisions 21 - 40 of 167
openSUSE Build Service is sponsored by