Skip to content

Tags

Tags give the ability to mark specific points in history as being important
  • debian/4.10-2+deb12u2

    6db46299 · refresh patches ·
    libreswan Debian release 4.10-2+deb12u2
    
  • v4.12

    * SECURITY IKEv2: Fixes https://libreswan.org/security/CVE-2023-38710
    * SECURITY IKEv1: Fixes https://libreswan.org/security/CVE-2023-38711
    * SECURITY IKEv1: Fixes https://libreswan.org/security/CVE-2023-38712
    * pluto: Do not crash on ipcomp expiry msg [Andrew]
    
  • debian/4.10-2+deb12u1

    libreswan Debian release 4.10-2+deb12u1
    
  • debian/4.11-1

    libreswan Debian release 4.11-1
    
  • debian/4.3-1+deb11u4

    libreswan Debian release 4.3-1+deb11u4
    
  • v4.11

    cbfa405c · Added CVE-2023-30570.txt ·
    * SECURITY IKEv1: Fixes https://libreswan.org/security/CVE-2023-30570
    
  • debian/4.10-2

    8d7bcb8d · prepare debian release ·
    libreswan Debian release 4.10-2
    
  • debian/4.10-1

    f469ba0e · prepare debian release ·
    libreswan Debian release 4.10-1
    
  • debian/4.3-1+deb11u3

    0f274aaa · use new upstream patch ·
    libreswan Debian release 4.3-1+deb11u3
    
  • debian/4.3-1+deb11u2

    libreswan Debian release 4.3-1+deb11u2
    
  • v4.10

    b681175c · documentation: fixup date ·
    v4.10 (February 28, 2023)
    * SECURITY IKEv2: Fixes https://libreswan.org/security/CVE-2023-23009
    * IKEv1: only clean up a connection when it isn't deleted [Andrew]
    
  • debian/4.9-2

    8e055d14 · prepare debian release ·
    libreswan Debian release 4.9-2
    
  • debian/4.9-1

    1016bfa5 · prepare debian release ·
    libreswan Debian release 4.9-1
    
  • v4.9

    v4.9 (October 13, 2022)
    
    * IKEv1: fix crasher (introduced in 4.8) when USE_NSS_KDF=false or MD5 [Andrew]
    * IKEv2: fix RFC 8229 IKE/ESP over IPv6 TCP [Andrew]
    
  • v4.8

    v4.8 (October 2, 2022)
    
    * release: remove SHA1 bindings from LIBRESWAN OpenPGP key [dkg/Paul]
    * pluto: ignore obsoleted unused interfaces= / --iface [Paul/Andrew]
    * pluto: various internal crypto struct changes [Andrew]
    * pluto: fix traffic counters for AH and IPCOMP [Andrew]
    * pluto: improve logging of duplicate serial cert error [Andrew]
    * pluto: support for maxbytes/maxpacket counters [Antony/Paul]
    * pluto: handle HW tokens using strange CKAIDs; github/815 [Andrew]
    * pluto: added --ipsec-max-bytes / --ipsec-max-packets support [Antony]
    * libipsecconf: added ipsec-max-bytes= and ipsec-max-packets= options [Paul]
    * IKEv2: emit one CERTREQ payload with all the hashes [Andrew]
    * addconn/whack: add support for {left,right}pubkey= [Andrew]
    * showhostkey: add support for ECDSA pubkeys [Andrew]
    * Crypto: add KDF self tests [Daiki Ueno]
    * IPv6: open IPv6 IKE port 4500; github/800 [Andrew]
    * showhostkey: add --pem option to print PEM encoded public key [Andrew]
    * unbound: _unbound-hook converted from python to shell [Andrew]
    * BSD: delete old BSDKAME code replaced by PFKEYV2 code [Andrew]
    * BSD: fix replay window byte vs bit math [Andrew]
    * BSD: fix code finding interfaces; github/728 [Andrew]
    * FreeBSD: support large replay window; github/756 [Andrew]
    * FreeBSD: support ESN; github/721 [Andrew]
    * linux: update copy of xfrm.h header [Paul]
    * packaging: update fedora spec file [Paul/Tuomo]
    * building: on BSD, always use GCC; freebsd/264288 llvm/55963 [Andrew]
    * building: enable LTO when USE_LTO=true; github/836 github/834 [Andrew]
    * building: dropped default build and packaging support for:
      	    Fedora 22, 28, 29, 30
                Debian stretch
                Ubuntu cosmic, xenial
                RHEL6 was removed in v4.5
                Add SUSE, Arch, Mint
    
  • debian/4.7-1

    32a297a1 · prepare debian release ·
    libreswan Debian release 4.7-1
    
  • v4.7

    19eabcd8 · bump to 4.7 ·
    v4.7 (May 24, 2022)
    * IKEv2: EAPTLS support [Timo Teräs / Andrew]
    * IKEv2: EAPONLY support [Andrew]
    * IKEv2: fix interop when IPCOMP+transport-mode [Andrew]
    * IKEv2: fix race between new IKE SA and liveness [Andrew]
    * IKEv2: fix interop with Android 12 + certificates [Andrew]
    * IKEv1: reject IKEv2 only authby=secret+rsasig [Andrew]
    * config: end keywords with no left/right prefix are applied to both ends
    * kernel: fix double delete of kernel policy when tearing down SA [Andrew]
    * kernel: fix deleting policy when an XFRMi FD ID; github/618 [Andrew]
    * kernel: general cleanups [Andrew]
    * _stackmanager / pluto: support Ubuntu 18.04 LTS kernels [Paul]
    * FreeBSD: libreswan builds out-of-the-box [Andrew]
    * BSD: Add IPv6 support (tested on NetBSD)
    * building: fix build on fedora rawhide [Paul]
    * internals: initiate IKEv2 CREATE_CHILD_SA exchange using IKE SA [Andrew]
    * internals: _updown.bsdkame renamed to _updown.bsd
    
  • debian/4.3-1+deb11u1

    f8233349 · use urgency=high ·
    libreswan Debian release 4.3-1+deb11u1
    
  • debian/4.6-1

    87462ebb · prepare debian release ·
    libreswan Debian release 4.6-1
    
  • v4.6

    v4.6 (January 11, 2022)
    * SECURITY: Fixes CVE-2022-23094 https://libreswan.org/security/CVE-2022-23094
    * IKEv2: aggressively check incoming fragments [Andrew]
    * IKEv2: when rekeying and PFS, only propose/allow original crypt-suite [Andrew]
    * IKEv2: when PFS, don't repeatedly log all proposals [Andrew]
    * IKEv2: Labeled IPsec improvements [Andrew]
    * IKEv1: support for ISAKMP_N_CISCO_LOAD_BALANCE removed [Andrew]
    * pluto: Revamp the host connection lookup mechanism [Andrew]
    * pluto: Change default replay-window from 32 to 128 [Paul]
    * pluto: Change default esn= to "either" and prefer "yes" [Paul]
    * pluto: Disable esn when replay-window=0 [Paul]
    * pluto: Drop obsolete debug options such as crypto-low [Andrew]
    * seccomp: Updated syscall allow-list [Paul]
    * packaging: replace old SUSE packaging with pointer to downstream [Andrew]
    * NetBSD: Don't use ESN - not supported by kernel [Andrew]
    * letsencrypt: Fix bashisms in letsencrypt script [dkg]
    * libipsecconf: allow leftauth=ecdsa|rsa (match authby= values) [Paul]
    * testing: significantly improved testing [Andrew, Paul]