Skip to content

Tags

Tags give the ability to mark specific points in history as being important
  • debian/4.1-4
    libreswan Debian release 4.1-4
    
  • debian/4.1-3
    eebd40de · prepare debian release ·
    libreswan Debian release 4.1-3
    
  • debian/4.1-2
    d4dfab69 · prepare debian release ·
    libreswan Debian release 4.1-2
    
  • debian/4.1-1
    842d8e1f · prepare debian release ·
    libreswan Debian release 4.1-1
    
  • v4.1
    v4.1 (October 18, 2020)
    * IKEv2: Fix Notify protocol ID interop with Cisco introduced in 4.0 [Antony]
    * addconn: Fix resolving with %defaultroute plus peer with A + AAAA [Antony]
    * building: minor cleanups [Andrew/Tuomo]
    
  • v4.0
    v4.0 (October 14, 2020)
    * KLIPS: Support for KLIPS completely removed [Paul]
    * pluto: Removed support for deprecated algos: serpent, twofish, cast [Paul]
    * IKEv2: EXPERIMENTAL: Support for RFC 8229 IKE/ESP over TCP [Andrew]
             New per-conn keywords: listen-tcp=yes|no, tcponly=yes|no, tcp-remoteport=
             Requires: Linux kernel >= 5.8
    * IKEv2: Support for leftikeport= / rightikeport= [Andrew/Paul]
    * IKEv2: EXPERIMENTAL: Support for INTERMEDIATE Exchange [Yulia Kuzovkova/GSoC]
             New keyword: intermediate=yes
    * FIPS: Remove DH 23/24 from FIPS allowed list as per SP 800 56A Rev 3 [Paul]
    * pluto: Support for rereading configured certificates from NSS [Myungjin Lee]
    * pluto: plutodebug= keywords are now: base,cpu-usage,crypt,tmi,private [Andrew]
    * pluto: find_pluto_xfrmi_interface() would only check first interface [Paul]
    * pluto: ddos cookies-threshold and max-halfopen output was swapped [John Mah]
    * pluto: Fix leased IP address leak [Andrew/Paul]
    * pluto: Fix displaying PLUTO_BYTES_ counters [Paul]
    * pluto: Replace/remove deprecated libselinux functions [Eduardo Barretto]
    * pluto: Update selinux calls for Labeled IPsec support [Richard Haines]
    * pluto: Memory leak fixes [Hugh]
    * pluto: Remove unused per peer logging [Andrew]
    * pluto: Cleanup logging code for minimal logging support [Andrew]
    * pluto: Cleanup netlink / XFRM code [Hugh]
    * pluto: xfrmi used mark-out for XFRMA_SET_MARK [Antony/Wolfgang]
    * pluto: Support for ipsec0 interface to help migrate from KLIPS to XFRM [Paul]
    * pluto: Fix logging some IKE messages to proper IKE SA state [Andrew]
    * pluto: Remove global ikeport/nat-ikeport, add listen-udp/listen-tcp [Paul]
    * pluto: Connections now have serial numbers which are logged [Paul/Andrew]
    * pluto: No longer require :RSA sections in ipsec.secrets [Andrew]
    * pluto: pluto chooses wrong raw RSA key (github#352) [Andrew]
    * seccomp: Update syscall allowlist for pluto and addconn [Paul]
    * whack: Support for ipsec whack --rereadcerts [Paul]
    * whack: Rename --ikev1-allow and --ikev2-allow to --ikev1 and --ikev2 [Paul]
    * whack: Clear inherited defaults for IKEv2 from IKEv1 connections [Paul]
    * show: Fixup for python3 version of ipaddress module [Paul]
    * IKEv2: Fix Windows 10 rekey being rejected [Antony/Paul]
    * IKEv2: Remove duplicaes from proposals using "+" [Andrew]
    * IKEv2: CERTREQ payload was not sent for authby=ecdsa [Paul]
    * IKEv2: Decode notify payloads into the message digest [Andrew]
    * IKEv2: Don't use NAT-T port when no NAT DETECTION payloads received [Andrew]
    * IKEv2: Add load-balance support (multiple targets) to redirect [Vukasin]
    * IKEv2: Only sent REDIRECTs to established IKE SA's (not IPsec SAs) [Paul]
    * IKEv2: Fix AUTH failure if ID payload reserved fields != 0 [Paul/Andrew/Hugh]
    * IKEv2: A delete(IKE SA) request should not trigger a delete request [Andrew]
    * IKEv2: Ignore, not abort when receiving unknown type transforms [Andrew]
    * IKEv2: Don't switch NAT port on receiving non-NAT notify payloads [Andrew]
    * IKEv1: Prevent crashing in Quick Mode on unused NAT payload [Daniel Wendler]
    * libipsecconf: Fix config handling of policy-label [bauen1]
    * libipsecconf: Promote ah= / esp= as desired keywords over phase2alg= [Paul]
    * libipsecconf: Remove most obsoleted option names with undersscore(_) [Paul]
    * rsasigkey/newhostkey: Remove obsoleted --output option [Paul]
    * building: Add NetBSD support [Andrew]
    * building: Remove support for SINGLE_CONF_DIR, EMIT_ISAKMP_SPI, [Paul]
                USE_KEYRR and TEST_INDECENT_PROPOSAL
    * building: Merge userland.mk into config.mk to simplify makefiles [Tuomo]
    * building: Deprecate INC_ variables [Tuomo]
    * building: Remove all support for SERPENT, TWOFISH, CAST and RIPEMD [Paul]
    * building: Remove -DALLOW_MICROSOFT_BAD_PROPOSAL [Tuomo]
    * building: The define USE_NSS_PRF was renamed to USE_NSS_KDF [Tuomo]
    * building: Rename master branch to main branch [Paul]
    * building: Fix finding ipsec command in non-standard bin dirs [Tuomo]
    * building: Introduce USE_OLD_SELINUX to support libselinux < 2.1.9 [Paul]
    * building: NETKEY options changed to XFRM options [Paul]
    * building: NSS database (*.db) are now expected in /var/lib/ipsec/nss [Tuomo]
                ipsec checknss called in initsystem will migrate files
                Use FINALNSSDIR=/etc/ipsec.d to use the pre-4.0 location
    * packaging: Debian: remove runtime dependency on systemd [Stephen Kitt]
    * packaging: Fedora: add missing build dependency for certutil [Stephen Kitt]
    * packaging: Debian switched to using /usr/libexec/ [dkg]
    * testing: Support Fedora32, Ubuntu, improved namespaces support [Paul/Others]
    * testing: Work around kernel ICMP Acquire bug [Paul]
    * testing: Added interop testing with OpenBSD iked [Ravi Teja]
    * documentation: friendler ipsec cmd output [Paul]
    
  • debian/3.32-3
    3d6eb974 · prepare debian release ·
    libreswan Debian release 3.32-3
    
  • debian/3.32-2
    387159e8 · prepare debian release ·
    libreswan Debian release 3.32-2
    
  • debian/3.32-1
    bc4348c9 · prepare debian release ·
    libreswan Debian release 3.32-1
    
  • v3.32
    v3.32 (May 11, 2020)
    * SECURITY: Fixes CVE-2020-1763 https://libreswan.org/security/CVE-2020-1763
    * IKEv2: Support non-narrowed child rekey for narrowing (regression in 3.31)
    * FIPS: ECDSA keys were mistakenly rejected as "too weak" [Paul]
    * FIPS: Minimum RSA key size is 2048, not 3072 [Paul]
    * FIPS: Use NSS to check FIPS mode instead of manually checking fips=1 [Paul]
    * IKEv2: Do not use fragments if not appropriate (regression from v3.30) [Paul]
    * IKEv1: Add NSS KDF support for the Quick Mode KDF [Andrew/Paul]
    * libipsecconf: support old-style ",," to mean "\," in specifying id [Paul]
    * libipsecconf: left/rightinterface-ip= are not kt_obsolete [Paul]
    * whack: Add missing ecdsa/sha2 and compat rsa policy options to whack [Paul]
    * Fix left=%iface syntax due to string length miscalculation [Antony]
    * X509: don't try to match up ID on SAN when ID type is ID_DER_ASN1_DN [Paul]
    * packaging: debian fixes [Antony]
    * building: USE_NSS_KDF=true now uses NSS for all KDF functions
                Using this option, libreswan no longer needs FIPS certification
    
  • v3.31
    f54f5858 · * bump to 3.31 ·
    v3.31 (March 3, 2020)
    * IKEv2: Opportunistic conns specifying keyingtries=0 are changed to 1 [Paul]
    * IKEv2: Fix ikev2 rekey failures due to bad Traffic Selector proposa [Antony]
    * IKEv2: Verify (not ignore) expected TSi/TSr payloads for IPsec rekeys [Paul]
    * IKEv1: Support for XFRMi interfaces [Paul]
    * pluto: Disable log_to_audit if kernel does not support audit [Paul]
    * addconn: Do not assert on ipsec-interface=no [Paul]
    * nat_traversal: Fix not to send nat-t keepalives when there is no nat [Tuomo]
    * KLIPS: Fix _updown.klips (regression introduced in 3.30) [Wolfgang]
    * pluto: Increase max IKEv2 fragments to 32 to support Windows [John Mah]
    
  • v3.30
    d95ef3f2 · * bump to version 3.30 ·
    v3.30 (February 2020)
    * WARNING: This is the last release that supports the KLIPS stack,
               use the new ipsec-interface= virtual interfaces instead.
    * XFRM: Fix detection on kernels without xfrm_stat (debian et all) [Paul]
    * XFRM: XFRMi interface support using ipsec-interface= and iface-ip= [Antony]
    * IKEv2: Message ID handling: remove a O(#STATES) lookup [Andrew]
    * IKEv2: OE previous half-open state overwrites IPsec policy [Paul/Stepan]
    * IKEv2: On initiator, do not retransmit on IKE_AUTH processing failure [Paul]
    * IKEv2: Prevent leak in ikev2_send_certreq() on sending error [Paul]
    * IKEv2: Remove SHA1 from default proposal list [Paul]
    * IKEv2: On PPK failure with insist, return AUTHENTICATION_FAILED [Vukasin]
    * IKEv2: Do not try to delete (replaced) bare shunts [Paul]
    * IKEv2: Delete pending outgoing bare shunts if incoming IPsec happened [Paul]
    * IKEv2: Allow CP payload in CREATE_CHILD_SA (RFC 7296 Appendix C.4) [Paul]
    * IKEv2: calculate_sa_prio() now allows OE shunt to override priority [Paul]
    * IKEv2: calculate_sa_prio() support for /32 template vs instance [Hugh/Paul]
    * IKEv2: IPv6 support for addresspool= option [Antony]
    * IKEv2: Updated support for MOBIKE triggered events [Antony]
    * IKEv2: Support reconnecting authnull clients [Paul]
    * IKEv2: New whack commands --rekey-ike and --rekey-ipsec [Antony]
    * IKEv2: Prefer RFC 7427 Digital Signatures for default authby=rsasig [Sahana]
    * IKEv2: Refuse SHA1 for RFC 7427 Digital Signatures as per RFC 8247 [Sahana]
    * IKEv2: Use IKEv2 fragment size values (not IKEv1) [Andrew]
    * IKEv2: On initiator, do not retransmit on IKE_AUTH processing failure [Paul]
    * IKEv1: Re-implement CVE-2019-10155 fix to prevent future occurances [Andrew]
    * IKEv1: do not assert on bad virtual private entry [Paul]
    * pluto: Simplify plutodebug= options to: base, cpu-usage, crypt, private and tmi
             (maps old values to new ones for compatibility) [Andrew]
    * pluto: non-default ipsec.conf did not load auto=add connections [Paul]
    * pluto: fix %defaultroute for link-local and non-link-local gateway [Antony]
    * pluto: Improve whackfd handling (prevent console hangs/omissions) [Andrew]
    * pluto: Support to disable SAN checks (require-id-on-certificate=no) [Paul]
    * pluto: Audit log IKE SA and IPsec SA failures for Common Criteria (CC) [Paul]
    * pluto: Disable support for DH2/modp1024 at compile time [Paul]
    * pluto: Add audit-log=yes|no (default yes) [Paul]
    * pluto: DDNS event should not cause connection initialization [Paul]
    * pluto: Various O(STATE) optimializations [Andrew]
    * pluto: Fixup reporting of esp-hw-offload capabilities in kernel/nic [Paul]
    * pluto: Add chacha20_poly1305 and curve25519 to default proposals [Paul]
    * pluto: Updated SECCOMP syscall whitelist [Paul]
    * pluto: With non-default config file, connections loading was skipped [Paul]
    * pluto: Fix Opportunistic Encryption with Transport Mode policies [Paul]
    * pluto: Fix various memory leaks in IKE and X.509 code [Andrew]
    * pluto: netlink: increase the additional bufferspace to 32KiB [Antony]
    * pluto: pluto --selftest no longer logs to stderr with timestamps [Paul]
    * pluto: fix for redirect-to type when it is FQDN [John Mah]
    * pluto: addresspool: give new lease to different (xauth)usernames [Paul]
    * pluto: addresspool: reduce complexity from O(#LEASES) to O(1) [Andrew]
    * whack: Remove obsoleted --whackrecord and --whackstoprecord options [Andrew]
    * whack: Added whack --ddns to trigger DNS refresh event manually [Paul]
    * X509: Offload most code to helpers for significant performance boost [Andrew]
    * X509: Simplify code, cut redundant calculations, speed improvements [Andrew]
    * X509: SAN checks should confirm IKE peer ID on responder too [Paul]
    * letsencrypt: new command "ipsec letsencrypt" [Rishabh]
    * _updown.netkey: PLUTO_VIRT_INTERFACE replaces PLUTO_INTERFACE [Antony]
    * _updown.netkey: add IPv6 routing support [Tuomo]
    * _updown.netkey: don't remove old resolv.conf, just update it [Tuomo]
    * _updown.netkey: fix for iproute2 >= 5.1 which no longer ignores /mask [Paul]
    * libswan: Don't leak ECDSA pubkey on form_ckaid_ecdsa() failure [Paul]
    * libswan: Close netlink socket on send error in netlink_query() [Paul]
    * libipsecconf: don't throw error for not finding a wildcarded include [Paul]
    * verify: improve support for python2 and python3 [Anand Bibhuti/Paul]
    * KLIPS: Support for kernels >= 4.20 with SYNC_SKCIPHER_REQUEST_ON_STACK [Paul]
    * KLIPS: Userland tools compile fixes [Hugh/Paul]
    * building: No longer build with DH2(modp1024) support (see RFC 8247) [Paul]
    * building: Add config for PYTHON_BINARY, default being /usr/bin/python3 [Tuomo]
    * building: Add new USE_NSS_PRF, to use KDF from NSS [Robert Relyea/Andrew]
    * building: Add USE_PRF_AES_XCBC, replaces USE_XCBC [Paul]
    * building: Fixes for NetBSD build [Andrew]
    * building: Fixes for gcc10 [Paul]
    * packaging: fedora30 requires gcc to be listed as BuildRequires: [Paul]
    * packaging: Add Debian stretch specific configs and more cleanup [Antony]
    * packaging: make deb jessie and xenial config detection [Antony]
    * packaging: update python she-bang handling [Tuomo]
    * testing: Added a new namespaces based testrun method [Antony]
    * testing: setup: namespace based ipsec stop needs ip xfrm flush state [Paul]
    * testing: setup: namespace based ipsec skips initsystem [Paul]
    
  • debian/3.29-2
    65b34add · prepare debian release ·
    libreswan Debian release 3.29-2
    
  • debian/3.29-1
    ca4787c1 · prepare debian release ·
    libreswan Debian release 3.29-1
    
  • debian/3.27-6
    30e5c1fa · prepare debian release ·
    libreswan Debian release 3.27-6
    
  • v3.29
    v3.29 (June 10, 2019)
    * SECURITY: Fixes CVE-2019-10155 https://libreswan.org/security/CVE-2019-10155
    * programs: Change to /proc/sys/net/core/xfrm_acq_expires to detect XFRM [Paul]
    * barf: Fix shell script parse error and small cleanup [Tuomo/Hugh]
    * packaging: fedora30 requires gcc to be listed as BuildRequires: [Paul]
    * packaging: rhel6 doesn't need USE_AVA_COPY=true or WERROR_CFLAGS= [Tuomo]
    * packaging/rhel6: remove -lrt, not needed any more [Tuomo]
    * systemd: change Restart default to on-failure [Tuomo]
    * building: Makefiles: Use RT_LDFLAGS for glibc < 2.17 support [Tuomo]
    * building: userland-cflags.mk: add RT_LDFLAGS= for older glibc [Tuomo]
    
  • debian/3.27-5
    7981443b · prepare debian release ·
    libreswan Debian release 3.27-5
    
  • debian/3.28-1
    libreswan Debian release 3.28-1
    
  • v3.28
    3897683f · Bump version to 3.28 ·
    v3.28 (May 20, 2019)
    * KLIPS: Disable KLIPS userland support per default [Paul]
             WARNING: Support for KLIPS will be removed in 2019
    * MAST: Removed support for MAST variant of KLIPS stack [Paul]
    * IKE: Change default connection from IKEv1 to IKEv2 [Paul]
    * IKEv2: Don't try to encrypt notify response without SKEYSEED [Andrew/Paul/Hugh]
    * IKEv2: ikev2= keyword changed to only accept "yes" or "no" [Paul]
    * IKEv2: Support for REDIRECT (RFC 5685) [Vukasin Karadzic/GSoC]
             (new keywords redirect-to, accept-redirect, global-redirect=
              global-redirect-to and new ipsec whack --redirect command
    * IKEv2: Initialize daily secret used for DCOOKIES [Paul/Andrew]
    * IKEv2: Extend narrowing code to support protoports [Andrew/Paul]
    * IKEv2: Fix bug that prevented AH from rekeying [Andrew]
    * IKEv2: IKE SA rekey could lead to losing track of Child SA [Andrew/Antony]
    * IKEv2: A spurious DH calculation was performed and disgarded [Andrew]
    * IKEv2: Support for IPCOMP (compress=yes) [Paul]
    * IKEv2: Initialize NAT keepalives check on IKE SA establishment [Paul]
    * IKEv2: Only sent NAT keepalives for IKE states (supresses IPsec dups) [Paul]
    * IKEv2: Timeout in receiving IKE_AUTH reply would abort connection [Paul]
    * IKEv2: Add ECP384, ECP521 and CURVE25519 to default IKEv2 proposal [Paul]
    * IKEv2: Remove SHA1 from default IKEv2 proposal [Paul]
    * IKEv2: Delete on auto=start conn would not restart (introduced in 3.23) [Paul]
    * IKEv2: Compact proposals to prevent fragmentation of IKE_INIT [Andrew]
    * IKEv2: Fix opportunistic group policy on /32 groupinstances on delete [Paul]
    * IKEv2: Fix opportunistic /32 on non-defaultroute interface [Paul]
    * IKEv2: Do not send two requests for IKEv2_INTERNAL_IP4_ADDRESS [Paul]
    * IKEv2: Show payload structure of received packet in RFC notation [Andrew]
    * IKEv2: Release whack when peer ID is wrong [Paul]
    * IKEv2: Hardened PPK code and fixed memory leaks [Hugh]
    * IKEv2: Use less resources under DDoS attack to send/process COOKIES [Andrew]
    * IKEv2: Delete partial Child SA states that can never establish [Paul]
    * IKEv2: Remove SHA1 from default proposals [Paul]
    * IKEv2: Add ECP groups and Curve25519 to default proposal [Paul]
    * IKEv2: Fix AH rekeying (handle not having encrypter [Paul]
    * IKEv2: NAT-T keepalives did not start if only IKEv2 conns were in use [Paul]
    * IKEv2: Drop IKE_SA_INIT requests with non-zero SPIr [Andrew]
    * IKEv2: On rekey, sometimes a CHILD SA was lost (wrong hash slot) [Andrew]
    * IKEv1: Don't leave a dangling pointer after IKE SA delete [Paul/Hugh]
    * IKEv1: Only sent NAT keepalives for IPsec states (supresses 1 dup) [Paul]
    * IKEv1: Do not activate DPD when peer does not support it [Paul]
    * IKEv1: Reject key sizes <= 0 properly instead of crashing [Paul]
    * IKEv1: Fix Aggressive Mode interop with Volans Technology [wuwei29]
    * IKEv1: Remove bogus "duplicate Delete" check causing Windows 1m outage [Paul]
    * IKEv1: If whack socket not there for passwd input, return STF_FATAL [Paul]
    * IKEv1: Remove Win98 workaround ignoring IPsec SA deletes in first 60s [Paul]
    * X509: Do not keep received CERTs beyond the connection lifetime [Andrew]
    * X509: Support for NSS IPsec profiles mbz#1252891 [Kai Engbert/Paul]
    * X509: Don't fail validation on critical flag in Key Usage payloads [Paul]
    * X509: Fix ocsp-method=get|post to actually skip get when asked) [Stepan Broz]
    * X509: Fix various leaks [Hugh, Andrew]
    * X509: Cache contents read from NSS database for performance [Andrew]
    * pluto: Re-initialize (w backoff) conns that should remain "up" [Paul/Hugh]
    * pluto: Use any sent IKE message to reset the DPD/liveness counter [Paul]
    * pluto: Add timing information to packet processing [Andrew]
    * pluto: Significant performance improvements for conns and certs [Andrew]
    * pluto: Simplify state lookups and SPI passing [Andrew]
    * pluto: Speed up state lookups by only looking at proper hash chain [Andrew]
    * pluto: metric= value should accept values > 255 [Tuomo]
    * pluto: New "cpu-usage" plutodebug option displaying timing info [Andrew/Paul]
    * pluto: Refuse to load connections with TFC and AH or Transport Mode [Paul]
    * pluto: Fix memory leak in CERTREQ sending [Hugh]
    * pluto: Revive (with back-off) auto=start conns that receive Delete/Notify [Paul]
    * pluto: Show all activated impairments in ipsec status [Andrew]
    * pluto: Do not load a connection if its certificate has a problem [Andrew]
    * pluto: Handle case when external use deletes certificate from NSS [Andrew]
    * pluto: Fix resource leaks [Andrew/Hugh]
    * pluto: Improve and extend pluto statistics [Paul]
    * pluto: Deleting a connection should bring it down first to run _updown [Paul]
    * pluto: Revive auto=start conns that receive Delete/Notify [Paul/Hugh/Andrew]
    * pluto: Refuse to load connections with unsupported type=transport [Paul]
    * pluto: Refuse to load connections with TFC and AH or Transport Mode [Paul]
    * addconn: Fix crash on startup with dnssec-enable=no [Stepan Broz]
    * libswan: Only use valid ephemeral ports for libunbound context [Stepan Broz]
    * libswan: Do not process DNSSEC root key or trust anchors when disabled [Paul]
    * libipsecconf: conn %default content could get overwritten rhbz#1704085 [Hugh]
    * libipsecconf: Allow IKEv2 style ike/esp proposals using '+' symbol [Andrew]
      (example: ike=aes_gcm+chacha20_poly1305,aes-sha2+sha1)
    * libipsecconf: Updated defaults for filling in proposal elements [Andrew]
      (drop sha1, sha2_512 before sha2_256 for esp, lots of new DH groups)
    * libipsecconf: Be more tolerant of duplicate proposals and 'none' DH [Andrew]
    * confreadwrite: Fix double host printing, line and bad ikev2=UNKNOWN [Paul]
    * ipsec: Add "ipsec traffic" as shorthand for "ipsec trafficstatus" [Paul]
    * ipsec: Add "ipsec brief" as shorthand for "ipsec briefcstatus" [Paul]
    * _stackmanager: Do not attempt to load PF_KEY (af_key.ko) module [Paul]
    * whack: Fix option name to and documentation of ms-dh-downgrade [Tuomo]
    * whack: Two new impairments: del-with-notify and bad-ikev2-xchg [Andrew/Paul]
    * whack: Fix non operational connection flags / arguments [Daniel Kautz]
    * whack: Add new --briefstatus which skips showing all states [Paul]
    * auto: Fix replace operation for when changing from subnet= to subnets= [wuwei29]
    * verify: Removed broken IP forwarding check [Paul]
    * FIPS: X.509 minimum public key size check was rejecting valid keys [Paul]
    * FIPS: Disallow AES-XCBC from PRF/INTEG, Allow AES-GMAC [Paul]
    * FIPS: Fixup FIPS_IKE_SA_LIFETIME_MAXIMUM to 24h as per NIST SP 800-77 [Paul]
    * FIPS: Force IKE maximum lifetime of 24h (default is 1h) [Paul/Vukasin]
    * XFRM: Use netlink for last remaining obsolete PF_KEY API API calls [Antony]
    * XFRM: Clean up and aadd logging to IPsec SA for nic-offload= [Hugh/Paul]
    * XFRM: Set default XFRM_LIFETIME_DEFAULT to 30 (was 300) [Paul]
    * libswan: Fix leaks in badly formed secrets/ppk_id [Vukasin Karadzic]
    * libswan: Don't crash on mangled PSK or PPK secrets [Vukasin Karadzic]
    * initsystems/systemd: Install tmpfiles config when installing unitfile [Tuomo]
    * barf: No longer look for netstat, ifconfig and mii-tool [Paul]
    * building: Sort all wildcarded object files for build reproducibility [dkg]
    * building: Update NSS includes to not use obsoleted header files [Paul/Andrew]
    * building: USE_NSS_AVA_COPY ?= false, only needed with NSS < 3.30 [Tuomo]
    * building: USE_UNBOUND_EVENT_H_COPY ?= false, enable only for [Tuomo]
                unbound <= 1.7.3 without unbound-event.h
    * building: Fix UNBOUND_VERSION testing so result compiles on Fedora 29 [Hugh]
    * building: USE_NSS_IPSEC_PROFILE ?= true, Requires nss >= 3.41 [Tuomo]
    * building: Support for unbound > 1.8.0 [Antony]
    * building: Update XFRM headers [Antony]
    * building: Add 'make install-rpm-dep' and 'make install-deb-dep' [Antony]
    * testing: Lots of new and improved test cases [lots of people]
    * packaging: Add a spec file for RHEL8/CentOS8 [Paul]
    * packaging: debian: explicitly set ARCH for reproducibility [dkg]
    * packaging: debian updates [Antony/Paul]
    
  • vbananas
    9b1394ea · Bump to version 3.27 ·
    wfwf