strongswan

Edit Package strongswan
No description set
Refresh
Refresh
Source Files
Filename Size Changed
0005-ikev1-Don-t-retransmit-Aggressive-Mode-response.patch 0000001088 1.06 KB
README.SUSE 0000002342 2.29 KB
fips-enforce.conf 0000000742 742 Bytes
fipscheck.sh.in 0000001934 1.89 KB
harden_strongswan.service.patch 0000000794 794 Bytes
strongswan-5.9.11.tar.bz2 0004786552 4.56 MB
strongswan-5.9.11.tar.bz2.sig 0000000659 659 Bytes
strongswan-rpmlintrc 0000000428 428 Bytes
strongswan.changes 0000118576 116 KB
strongswan.init.in 0000008747 8.54 KB
strongswan.keyring 0000003085 3.01 KB
strongswan.spec 0000040334 39.4 KB
strongswan_fipscheck.patch 0000001920 1.88 KB
strongswan_ipsec_service.patch 0000000446 446 Bytes
Revision 149 (latest revision is 167)
Mohd Saquib's avatar Mohd Saquib (msaquib) accepted request 1092621 from Mohd Saquib's avatar Mohd Saquib (msaquib) (revision 149)
- Update to release 5.9.11
  * A long-standing deadlock in the vici plugin has been fixed that
    could get triggered when multiple connections were
    initiated/terminated concurrently and control-log events were
    raised by the watcher_t component (#566). 
  * In compliance with RFC 5280, CRLs now have to be signed by a
    certificate that either encodes the cRLSign keyUsage bit
    (even if it is a CA certificate), or is a CA certificate without
    a keyUsage extension. strongSwan encodes a keyUsage extension
    with cRLSign bit set in all CA certificates since 13 years. And
    before that it didn't encode the extension, so these certificates
    would also be accepted as CRL issuer in case they are still valid
    (7dc82de).
  * Support for optional CA labels in EST server URIs
    (e.g. https://www.example.org/.well-known/est/arbitraryLabel1/<operation>)
    was added to the pki --est and pki --estca commands (#1614).
  * The pkcs7 and openssl plugins now support CMS-style signatures in
    PKCS#7 containers, which allows verifying RSA-PSS and ECDSA
    signatures (#1615).
  * Fixed a regression in the server implementation of EAP-TLS when
    using TLS 1.2 or earlier that was introduced with 5.9.10
    (#1613, 3d0d3f5).
  * The EAP-TLS client does now enforce that the TLS handshake is
    complete when using TLS 1.2 or earlier. It was possible to
    shortcut it by sending an early EAP-Success message. Note that
    this isn't a security issue as the server is authenticated at
    that point (db87087).
  * On Linux, the kernel-libipsec plugin can now optionally handle
    ESP packets without UDP encapsulation (uses RAW sockets, disabled
    by default, e3cb756). The plugin and libipsec also gained support
Comments 0
openSUSE Build Service is sponsored by