Skip to content

Tags

Tags give the ability to mark specific points in history as being important
  • debian/3.29-2

    65b34add · prepare debian release ·
    libreswan Debian release 3.29-2
    
  • debian/3.29-1

    ca4787c1 · prepare debian release ·
    libreswan Debian release 3.29-1
    
  • debian/3.27-6

    30e5c1fa · prepare debian release ·
    libreswan Debian release 3.27-6
    
  • v3.29

    v3.29 (June 10, 2019)
    * SECURITY: Fixes CVE-2019-10155 https://libreswan.org/security/CVE-2019-10155
    * programs: Change to /proc/sys/net/core/xfrm_acq_expires to detect XFRM [Paul]
    * barf: Fix shell script parse error and small cleanup [Tuomo/Hugh]
    * packaging: fedora30 requires gcc to be listed as BuildRequires: [Paul]
    * packaging: rhel6 doesn't need USE_AVA_COPY=true or WERROR_CFLAGS= [Tuomo]
    * packaging/rhel6: remove -lrt, not needed any more [Tuomo]
    * systemd: change Restart default to on-failure [Tuomo]
    * building: Makefiles: Use RT_LDFLAGS for glibc < 2.17 support [Tuomo]
    * building: userland-cflags.mk: add RT_LDFLAGS= for older glibc [Tuomo]
    
  • debian/3.27-5

    7981443b · prepare debian release ·
    libreswan Debian release 3.27-5
    
  • debian/3.28-1

    libreswan Debian release 3.28-1
    
  • v3.28

    3897683f · Bump version to 3.28 ·
    v3.28 (May 20, 2019)
    * KLIPS: Disable KLIPS userland support per default [Paul]
             WARNING: Support for KLIPS will be removed in 2019
    * MAST: Removed support for MAST variant of KLIPS stack [Paul]
    * IKE: Change default connection from IKEv1 to IKEv2 [Paul]
    * IKEv2: Don't try to encrypt notify response without SKEYSEED [Andrew/Paul/Hugh]
    * IKEv2: ikev2= keyword changed to only accept "yes" or "no" [Paul]
    * IKEv2: Support for REDIRECT (RFC 5685) [Vukasin Karadzic/GSoC]
             (new keywords redirect-to, accept-redirect, global-redirect=
              global-redirect-to and new ipsec whack --redirect command
    * IKEv2: Initialize daily secret used for DCOOKIES [Paul/Andrew]
    * IKEv2: Extend narrowing code to support protoports [Andrew/Paul]
    * IKEv2: Fix bug that prevented AH from rekeying [Andrew]
    * IKEv2: IKE SA rekey could lead to losing track of Child SA [Andrew/Antony]
    * IKEv2: A spurious DH calculation was performed and disgarded [Andrew]
    * IKEv2: Support for IPCOMP (compress=yes) [Paul]
    * IKEv2: Initialize NAT keepalives check on IKE SA establishment [Paul]
    * IKEv2: Only sent NAT keepalives for IKE states (supresses IPsec dups) [Paul]
    * IKEv2: Timeout in receiving IKE_AUTH reply would abort connection [Paul]
    * IKEv2: Add ECP384, ECP521 and CURVE25519 to default IKEv2 proposal [Paul]
    * IKEv2: Remove SHA1 from default IKEv2 proposal [Paul]
    * IKEv2: Delete on auto=start conn would not restart (introduced in 3.23) [Paul]
    * IKEv2: Compact proposals to prevent fragmentation of IKE_INIT [Andrew]
    * IKEv2: Fix opportunistic group policy on /32 groupinstances on delete [Paul]
    * IKEv2: Fix opportunistic /32 on non-defaultroute interface [Paul]
    * IKEv2: Do not send two requests for IKEv2_INTERNAL_IP4_ADDRESS [Paul]
    * IKEv2: Show payload structure of received packet in RFC notation [Andrew]
    * IKEv2: Release whack when peer ID is wrong [Paul]
    * IKEv2: Hardened PPK code and fixed memory leaks [Hugh]
    * IKEv2: Use less resources under DDoS attack to send/process COOKIES [Andrew]
    * IKEv2: Delete partial Child SA states that can never establish [Paul]
    * IKEv2: Remove SHA1 from default proposals [Paul]
    * IKEv2: Add ECP groups and Curve25519 to default proposal [Paul]
    * IKEv2: Fix AH rekeying (handle not having encrypter [Paul]
    * IKEv2: NAT-T keepalives did not start if only IKEv2 conns were in use [Paul]
    * IKEv2: Drop IKE_SA_INIT requests with non-zero SPIr [Andrew]
    * IKEv2: On rekey, sometimes a CHILD SA was lost (wrong hash slot) [Andrew]
    * IKEv1: Don't leave a dangling pointer after IKE SA delete [Paul/Hugh]
    * IKEv1: Only sent NAT keepalives for IPsec states (supresses 1 dup) [Paul]
    * IKEv1: Do not activate DPD when peer does not support it [Paul]
    * IKEv1: Reject key sizes <= 0 properly instead of crashing [Paul]
    * IKEv1: Fix Aggressive Mode interop with Volans Technology [wuwei29]
    * IKEv1: Remove bogus "duplicate Delete" check causing Windows 1m outage [Paul]
    * IKEv1: If whack socket not there for passwd input, return STF_FATAL [Paul]
    * IKEv1: Remove Win98 workaround ignoring IPsec SA deletes in first 60s [Paul]
    * X509: Do not keep received CERTs beyond the connection lifetime [Andrew]
    * X509: Support for NSS IPsec profiles mbz#1252891 [Kai Engbert/Paul]
    * X509: Don't fail validation on critical flag in Key Usage payloads [Paul]
    * X509: Fix ocsp-method=get|post to actually skip get when asked) [Stepan Broz]
    * X509: Fix various leaks [Hugh, Andrew]
    * X509: Cache contents read from NSS database for performance [Andrew]
    * pluto: Re-initialize (w backoff) conns that should remain "up" [Paul/Hugh]
    * pluto: Use any sent IKE message to reset the DPD/liveness counter [Paul]
    * pluto: Add timing information to packet processing [Andrew]
    * pluto: Significant performance improvements for conns and certs [Andrew]
    * pluto: Simplify state lookups and SPI passing [Andrew]
    * pluto: Speed up state lookups by only looking at proper hash chain [Andrew]
    * pluto: metric= value should accept values > 255 [Tuomo]
    * pluto: New "cpu-usage" plutodebug option displaying timing info [Andrew/Paul]
    * pluto: Refuse to load connections with TFC and AH or Transport Mode [Paul]
    * pluto: Fix memory leak in CERTREQ sending [Hugh]
    * pluto: Revive (with back-off) auto=start conns that receive Delete/Notify [Paul]
    * pluto: Show all activated impairments in ipsec status [Andrew]
    * pluto: Do not load a connection if its certificate has a problem [Andrew]
    * pluto: Handle case when external use deletes certificate from NSS [Andrew]
    * pluto: Fix resource leaks [Andrew/Hugh]
    * pluto: Improve and extend pluto statistics [Paul]
    * pluto: Deleting a connection should bring it down first to run _updown [Paul]
    * pluto: Revive auto=start conns that receive Delete/Notify [Paul/Hugh/Andrew]
    * pluto: Refuse to load connections with unsupported type=transport [Paul]
    * pluto: Refuse to load connections with TFC and AH or Transport Mode [Paul]
    * addconn: Fix crash on startup with dnssec-enable=no [Stepan Broz]
    * libswan: Only use valid ephemeral ports for libunbound context [Stepan Broz]
    * libswan: Do not process DNSSEC root key or trust anchors when disabled [Paul]
    * libipsecconf: conn %default content could get overwritten rhbz#1704085 [Hugh]
    * libipsecconf: Allow IKEv2 style ike/esp proposals using '+' symbol [Andrew]
      (example: ike=aes_gcm+chacha20_poly1305,aes-sha2+sha1)
    * libipsecconf: Updated defaults for filling in proposal elements [Andrew]
      (drop sha1, sha2_512 before sha2_256 for esp, lots of new DH groups)
    * libipsecconf: Be more tolerant of duplicate proposals and 'none' DH [Andrew]
    * confreadwrite: Fix double host printing, line and bad ikev2=UNKNOWN [Paul]
    * ipsec: Add "ipsec traffic" as shorthand for "ipsec trafficstatus" [Paul]
    * ipsec: Add "ipsec brief" as shorthand for "ipsec briefcstatus" [Paul]
    * _stackmanager: Do not attempt to load PF_KEY (af_key.ko) module [Paul]
    * whack: Fix option name to and documentation of ms-dh-downgrade [Tuomo]
    * whack: Two new impairments: del-with-notify and bad-ikev2-xchg [Andrew/Paul]
    * whack: Fix non operational connection flags / arguments [Daniel Kautz]
    * whack: Add new --briefstatus which skips showing all states [Paul]
    * auto: Fix replace operation for when changing from subnet= to subnets= [wuwei29]
    * verify: Removed broken IP forwarding check [Paul]
    * FIPS: X.509 minimum public key size check was rejecting valid keys [Paul]
    * FIPS: Disallow AES-XCBC from PRF/INTEG, Allow AES-GMAC [Paul]
    * FIPS: Fixup FIPS_IKE_SA_LIFETIME_MAXIMUM to 24h as per NIST SP 800-77 [Paul]
    * FIPS: Force IKE maximum lifetime of 24h (default is 1h) [Paul/Vukasin]
    * XFRM: Use netlink for last remaining obsolete PF_KEY API API calls [Antony]
    * XFRM: Clean up and aadd logging to IPsec SA for nic-offload= [Hugh/Paul]
    * XFRM: Set default XFRM_LIFETIME_DEFAULT to 30 (was 300) [Paul]
    * libswan: Fix leaks in badly formed secrets/ppk_id [Vukasin Karadzic]
    * libswan: Don't crash on mangled PSK or PPK secrets [Vukasin Karadzic]
    * initsystems/systemd: Install tmpfiles config when installing unitfile [Tuomo]
    * barf: No longer look for netstat, ifconfig and mii-tool [Paul]
    * building: Sort all wildcarded object files for build reproducibility [dkg]
    * building: Update NSS includes to not use obsoleted header files [Paul/Andrew]
    * building: USE_NSS_AVA_COPY ?= false, only needed with NSS < 3.30 [Tuomo]
    * building: USE_UNBOUND_EVENT_H_COPY ?= false, enable only for [Tuomo]
                unbound <= 1.7.3 without unbound-event.h
    * building: Fix UNBOUND_VERSION testing so result compiles on Fedora 29 [Hugh]
    * building: USE_NSS_IPSEC_PROFILE ?= true, Requires nss >= 3.41 [Tuomo]
    * building: Support for unbound > 1.8.0 [Antony]
    * building: Update XFRM headers [Antony]
    * building: Add 'make install-rpm-dep' and 'make install-deb-dep' [Antony]
    * testing: Lots of new and improved test cases [lots of people]
    * packaging: Add a spec file for RHEL8/CentOS8 [Paul]
    * packaging: debian: explicitly set ARCH for reproducibility [dkg]
    * packaging: debian updates [Antony/Paul]
    
  • vbananas

    9b1394ea · Bump to version 3.27 ·
    wfwf
    
  • debian/3.27-4

    f035f19d · prepare debian release ·
    libreswan Debian release 3.27-4
    
  • debian/3.27-3

    90cecfb5 · prepare debian release ·
    libreswan Debian release 3.27-3
    
  • debian/3.27-2

    6c759209 · prepare debian release ·
    libreswan Debian release 3.27-2
    
  • debian/3.27-1

    d4e849b3 · refresh patches ·
    libreswan Debian release 3.27-1
    
  • v3.27

    9b1394ea · Bump to version 3.27 ·
    v3.27 (October 7, 2018)
    * XFRM: SA marks must be included for delete operation [Tijs Van Buggenhout]
    * pluto: Resolve a crasher in ECDSA freeing code [Hugh/Sahana]
    * pluto: Resolve a hang when recursively loading same config file [Hugh]
    * pluto: Refuse to load conns with different subnet address families [Paul]
    * IKEv2: Fix regression on ID_NULL causing a new conn instance [Paul]
    * IKEv1: Drop duplicates when not a reply [Andrew]
    * IKEv1: Don't respond with errors to invalid encrypted packets [Andrew]
    * IKEv1: Don't print empty informational warning on delete payload [Paul]
    * IKEv1: Don't add spurious ESP-NULL proposal to AH proposals [Andrew]
    * whack: Release whack socket on IKE_AUTH errors [Andrew]
    * libswan: fix buffer size to getnameinfo() call in resolve_ppp_peer() [Hugh]
    * libipsecconf: Don't accidentally clear modecfgdomains= entries [Andrew]
    * building: Fixup NSS includes and links (fixes Debian builds) [Andrew/Paul]
    * documentation: Update (L)GPL license links and http -> https links [dkg]
    * Bugtracker bugs fixed:
       #177 left=%defaultroute not working when "src" in the default route [Kim]
       #80 VTI interface vanishes when peer goes down and up [yu-shiba]
    
  • debian/3.26-1

    c41ff7ad · prepare debian release ·
    libreswan Debian release 3.26-1
    
  • debian/3.25-2

    bb1cd683 · prepare debian release ·
    libreswan Debian release 3.25-2
    
  • v3.26

    ac3a32c4 · bump version to 3.26 ·
    v3.26 (September 16, 2018)
    * IKEv2: Support for RSA-PSS (RFC 7427) via authby=rsa-sha2 [Sahana Prasad]
    * IKEv2: Support for ECDSA (RFC 7427) via authby=ecdsa-sha2 [Sahana Prasad]
    * IKEv2: Use DER handling code of NSS instead of our custom code [Andrew]
    * IKEv2: Fix core dump when impaired and proposing esp=null-none [Andrew]
    * IKEv2: Fix traffic selector lookup for asymmetric conns [Andrew/Paul]
    * IKEv2: Add IKE and ESP support for chacha20poly1305 (RFC 7634) [Andrew]
    * IKEv2: Fix leaks in ikev2_calculate_rsa_hash [Hugh]
    * IKEv2: Simplify proposal generating [Hugh]
    * IKEv1: Fix handling XAUTH empty passwords [Andrew]
    * IKEv1: Fix XAUTH message padding [Hugh]
    * IKEv1: Various code cleanup, next payload handling [Hugh]
    * IKEv1: fix optional key-length regression (in v3.25) with ESP prop [Andrew]
    * IKEv1: Don't delete replaced IKE SA, it confuses third party clients [Paul]
    * pluto: Relax strictness of DH in ESP/AH proposals [Andrew]
    * pluto: Fix for two roadwarriors using ID_IPv4 behind same NAT [Paul]
    * pluto: Do not hand out old lease address for authby=secret conns [Paul]
    * pluto: new --selftest option that exits pluto after startup tests [Paul]
    * pluto: Updated known Vendor ID table [Paul]
    * XFRM:  Don't call init_pfkey() on boot so Linux upstream can kill it [Andrew]
    *_unbound-hook: Fixup adding IPv4 pubkey, unbound now quotes arg as 1 [Paul]
    * building: Fix listed patches for debian build [Paul]
    * building: enable DH31 (curve25519) per default [Paul]
    * testing: prepare to migrate from f22 to f28 [Andrew, Antony, Paul]
    * Bugtracker bugs fixed:
       #166 IPsec/XAuth reusing lease for multiple clients behind same NAT [Paul]
    
  • debian/3.25-1

    53d2a689 · prepare debian release ·
    libreswan Debian release 3.25-1
    
  • v3.25

    a14ddb4d · bump version to 3.25 ·
    v3.25 (June 27, 2018)
    * IKEv2: MOBIKE Initiator support (RFC 4555) [Antony]
    * IKEv2: Support for IKE SA rekeying RFC7296 1.3.2, initiator [Antony]
    * IKEv2: Support for IPsec SA rekeying RFC7296 1.3.3, initiator [Antony]
    * IKEv2: Support for IKE SA reauth=yes|no RFC7296  2.8.3 [Antony]
    * IKEv2: Temporarilly disable Liveness/DPD when MOBIKE kick in [Antony]
    * IKEv2: No longer allow contradicting esp= and pfs= options [Andrew]
    * IKEv2: PPK support for authby=rsasig [Vukasin Karadzic]
    * IKEv2: IANA INTERNAL_DNSSEC_TA allocation added [Paul]
    * IKEv2: Add PPK support to authby=rsasig [Vukasin]
    * IKEv2: Don't calculate NO_PPK_AUTH when the POLICY is INSIST [Vukasin]
    * IKEv2: fix PPK when responder is ppk=no but has a valid PPKID [Paul/Vukasin]
    * IKEv2: Support for protoport based Opportunistic IPsec [Paul]
    * IKEv2: Support multiple authby values (eg authby=rsasig,null) [Paul]
    * IKEv2: Support for AUTHNULL fallback via private use Notify [Vukasin]
    * IKEv2: Fix v3.23 regression causing liveness check to always fail [Tuomo]
    * IKEv2: Support for Microsoft rekey bug: ms-dh-downgrade=yes|no [Andrew/Paul]
    * IKEv2: Allow switching between OE instances with different protoports [Paul]
    * IKEv2: process INITIAL_CONTACT and delete old states from a connection [Paul]
    * IKEv2: Only retransmit fragments on receiving first fragment [Andrew]
    * IKEv2: When sending fragments, also update st_msgid_lastreplied [Paul]
    * IKEv2: Encrypt IKE_AUTH reply when authenticaion failed [Andrew]
    * IKEv2: Fix handling of corrupt encrypted packets [Andrew]
    * IKEv2: Do not call ISAKMP_SA_established() during CREATE_CHILD_SA [Paul]
    * IKEv2: When receiving Initial Contact, delete old IPsec SA's [Paul]
    * IKEv2: Harden IP triggered OE with new dns-match-id=yes|no [AntonyPaul]
    * IKEv2: Add PRF/INTEG support for AES_XCBC / AES_CMAC [Andrew]
    * IKEv2: permit DH=none (as in esp=aes;none,aes;dh22) [Andrew]
    * IKEv1: Prevent crashes with IKEv1 mistakenly allowing narrowing=yes [Paul]
    * IKEv1: DPD was not getting scheduled (bug introduced in 3.23) [Paul]
    * IKEv1: modecfg_send_set() must not ignore failure of modecfg_resp() [Hugh]
    * X509: Extend support for wildcard certs matching remote peer ID [Paul/Hugh]
    * X509: Support PKCS7 for Microsoft interop with intermediate certs [Andrew]
    * X509: Handle CRL fetching in separate thread [Andrew]
    * pluto: Obsoleted connaddrfamily= (fixes 6in4 and 4in6) [Paul]
    * pluto: New hostaddrfamily= and clientaddrfamily= (only needed w DNS) [Paul]
    * pluto: Cleanup of state/md passing code [Andrew]
    * pluto: Allow switching back from wrong instance to template conn [Paul]
    * pluto: disentangle IKEv1 and IKEv2 packet sending code [Andrew]
    * pluto: Allow rightsubnets= without leftsubnet(s)= [Paul]
    * pluto: don't share IP leases for authby=secret (in case of group ID) [Paul]
    * pluto: Parser bug prevented 4in6 config [mhuntxu at github, Daniel M. Weeks]
    * pluto: Find and delete old connection/states with same ID [Paul/Hugh]
    * pluto: traffic log (and updown) line had in/out bytes swapped [Paul/Tuomo]
    * pluto: Fix memory/fd leaks found by Coverity and in cert code [Hugh/Andrew]
    * pluto: Improve SPD longest prefix to priority calculation [Andrew/Paul/Hugh]
    * addconn: Fix auto=route and auto=start processing [Paul]
    * whack/auto: Ensure all status and list commands return no error code [Paul]
    * KLIPS: Replace deprecated blkcipher with skcipher crypto API [Tijs Van Buggenhout]
    * FIPS: Support new NIST ACVP protocol with cavp tool cmdline args [Andrew]
    * FIPS: Don't attempt HMAC integrity test on rsasigkey (rhbz#1544143) [Paul]
    * FIPS: Don't allow RSA keys < 3072 [Matt/Paul]
    * FIPS: Enable our PRF aes_xcbc wrapper on NSS hash code in FIPS mode [Andrew]
    * FIPS: Raise minimum RSA key length allowed to 3072 [Paul]
    * CAVP: Add -<acvp-key> <acvp-value> and -json(output) options to CAVP [Andrew]
    * portexcludes: new command ipsec portexcludes (see portexcludes.conf) [Paul]
    * _updown.netkey: fix deleting routes when half routes are used [Tuomo]
    * _updown.netkey: don't delete VTI interfaces until we can refcount [Tuomo]
    * _updown.netkey: fix unroute: "need at least a destination address" [Tuomo]
    * _updown.netkey: don't do proxyarp for direct host-host tunnels [Tuomo]
    * _updown.netkey: force routing if we don't have route to remote network [Tuomo]
    * _unbound-hook: Pass all IPSECKEY's to pluto, not just the first [Paul]
    * contrib/python-swan: module to check if trafic get be encrypted [Kim]
    * contrib/c-swan: example code to check if trafic get be encrypted [Kim]
    * building: added USE_GLIBC_KERN_FLIP_HEADERS (default off) [Paul]
    * building: when ElectricFence enabled, add extra system calls to seccomp [Andrew]
    * ipsec: add checknss option --settrusts to reset CA trusts in nss db [Tuomo]
    * _updown.netkey: force routing when necessary for IPsec to work [Tuomo]
    * _updown.netkey: do not proxyarp for host-host tunnels [Tuomo]
    * look: sort XFRM output by priority [Andrew]
    * Bugtracker bugs fixed:
       #311: segfault in crl fetching git master f5b17dc [Andrew, Tuomo]
       #314: IPv6 default route is deleted by mistake
       #318: vti interface gets down on previous initiator if roles switch [Tuomo]
       #320: nsspassword file location is half implemented
       #328: Addcon crash on duplicit "left" or "leftid" keys in conn config [Stepan Broz]
    
  • v3.24

    5392ddba · bump version to 3.24 ·
    v3.24 (June 26, 2018)
    * IKEv2: MOBIKE Initiator support (RFC 4555) [Antony]
    * IKEv2: Support for IKE SA rekeying RFC7296 1.3.2, initiator [Antony]
    * IKEv2: Support for IPsec SA rekeying RFC7296 1.3.3, initiator [Antony]
    * IKEv2: Support for IKE SA reauth=yes|no RFC7296  2.8.3 [Antony]
    * IKEv2: Temporarilly disable Liveness/DPD when MOBIKE kick in [Antony]
    * IKEv2: No longer allow contradicting esp= and pfs= options [Andrew]
    * IKEv2: PPK support for authby=rsasig [Vukasin Karadzic]
    * IKEv2: IANA INTERNAL_DNSSEC_TA allocation added [Paul]
    * IKEv2: Add PPK support to authby=rsasig [Vukasin]
    * IKEv2: Don't calculate NO_PPK_AUTH when the POLICY is INSIST [Vukasin]
    * IKEv2: fix PPK when responder is ppk=no but has a valid PPKID [Paul/Vukasin]
    * IKEv2: Support for protoport based Opportunistic IPsec [Paul]
    * IKEv2: Support multiple authby values (eg authby=rsasig,null) [Paul]
    * IKEv2: Support for AUTHNULL fallback via private use Notify [Vukasin]
    * IKEv2: Fix v3.23 regression causing liveness check to always fail [Tuomo]
    * IKEv2: Support for Microsoft rekey bug: ms-dh-downgrade=yes|no [Andrew/Paul]
    * IKEv2: Allow switching between OE instances with different protoports [Paul]
    * IKEv2: process INITIAL_CONTACT and delete old states from a connection [Paul]
    * IKEv2: Only retransmit fragments on receiving first fragment [Andrew]
    * IKEv2: When sending fragments, also update st_msgid_lastreplied [Paul]
    * IKEv2: Encrypt IKE_AUTH reply when authenticaion failed [Andrew]
    * IKEv2: Fix handling of corrupt encrypted packets [Andrew]
    * IKEv2: Do not call ISAKMP_SA_established() during CREATE_CHILD_SA [Paul]
    * IKEv2: When receiving Initial Contact, delete old IPsec SA's [Paul]
    * IKEv2: Harden IP triggered OE with new dns-match-id=yes|no [AntonyPaul]
    * IKEv2: Add PRF/INTEG support for AES_XCBC / AES_CMAC [Andrew]
    * IKEv2: permit DH=none (as in esp=aes;none,aes;dh22) [Andrew]
    * IKEv1: Prevent crashes with IKEv1 mistakenly allowing narrowing=yes [Paul]
    * IKEv1: DPD was not getting scheduled (bug introduced in 3.23) [Paul]
    * IKEv1: modecfg_send_set() must not ignore failure of modecfg_resp() [Hugh]
    * X509: Extend support for wildcard certs matching remote peer ID [Paul/Hugh]
    * X509: Support PKCS7 for Microsoft interop with intermediate certs [Andrew]
    * X509: Handle CRL fetching in separate thread [Andrew]
    * pluto: Obsoleted connaddrfamily= (fixes 6in4 and 4in6) [Paul]
    * pluto: New hostaddrfamily= and clientaddrfamily= (only needed w DNS) [Paul]
    * pluto: Cleanup of state/md passing code [Andrew]
    * pluto: Allow switching back from wrong instance to template conn [Paul]
    * pluto: disentangle IKEv1 and IKEv2 packet sending code [Andrew]
    * pluto: Allow rightsubnets= without leftsubnet(s)= [Paul]
    * pluto: don't share IP leases for authby=secret (in case of group ID) [Paul]
    * pluto: Parser bug prevented 4in6 config [mhuntxu at github, Daniel M. Weeks]
    * pluto: Find and delete old connection/states with same ID [Paul/Hugh]
    * pluto: traffic log (and updown) line had in/out bytes swapped [Paul/Tuomo]
    * pluto: Fix memory/fd leaks found by Coverity and in cert code [Hugh/Andrew]
    * pluto: Improve SPD longest prefix to priority calculation [Andrew/Paul/Hugh]
    * addconn: Fix auto=route and auto=start processing [Paul]
    * whack/auto: Ensure all status and list commands return no error code [Paul]
    * KLIPS: Replace deprecated blkcipher with skcipher crypto API [Tijs Van Buggenhout]
    * FIPS: Support new NIST ACVP protocol with cavp tool cmdline args [Andrew]
    * FIPS: Don't attempt HMAC integrity test on rsasigkey (rhbz#1544143) [Paul]
    * FIPS: Don't allow RSA keys < 3072 [Matt/Paul]
    * FIPS: Enable our PRF aes_xcbc wrapper on NSS hash code in FIPS mode [Andrew]
    * FIPS: Raise minimum RSA key length allowed to 3072 [Paul]
    * CAVP: Add -<acvp-key> <acvp-value> and -json(output) options to CAVP [Andrew]
    * portexcludes: new command ipsec portexcludes (see portexcludes.conf) [Paul]
    * _updown.netkey: fix deleting routes when half routes are used [Tuomo]
    * _updown.netkey: don't delete VTI interfaces until we can refcount [Tuomo]
    * _updown.netkey: fix unroute: "need at least a destination address" [Tuomo]
    * _updown.netkey: don't do proxyarp for direct host-host tunnels [Tuomo]
    * _updown.netkey: force routing if we don't have route to remote network [Tuomo]
    * _unbound-hook: Pass all IPSECKEY's to pluto, not just the first [Paul]
    * contrib/python-swan: module to check if trafic get be encrypted [Kim]
    * contrib/c-swan: example code to check if trafic get be encrypted [Kim]
    * building: added USE_GLIBC_KERN_FLIP_HEADERS (default off) [Paul]
    * building: when ElectricFence enabled, add extra system calls to seccomp [Andrew]
    * ipsec: add checknss option --settrusts to reset CA trusts in nss db [Tuomo]
    * _updown.netkey: force routing when necessary for IPsec to work [Tuomo]
    * _updown.netkey: do not proxyarp for host-host tunnels [Tuomo]
    * look: sort XFRM output by priority [Andrew]
    * Bugtracker bugs fixed:
       #311: segfault in crl fetching git master f5b17dc [Andrew, Tuomo]
       #314: IPv6 default route is deleted by mistake
       #318: vti interface gets down on previous initiator if roles switch [Tuomo]
       #320: nsspassword file location is half implemented
       #328: Addcon crash on duplicit "left" or "leftid" keys in conn config [Stepan Broz]
    
  • debian/3.23-6

    423f9182 · prepare debian release ·
    libreswan Debian release 3.23-6