Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

strongswan-ipsec-5.9.7-1.1 RPM for ppc64

From OpenSuSE Ports Tumbleweed for ppc64

Name: strongswan-ipsec Distribution: openSUSE Tumbleweed
Version: 5.9.7 Vendor: openSUSE
Release: 1.1 Build date: Tue Aug 2 22:18:40 2022
Group: Productivity/Networking/Security Build host: obs-power9-07
Size: 1531681 Source RPM: strongswan-5.9.7-1.1.src.rpm
Summary: IPsec-based VPN solution
StrongSwan is an IPsec-based VPN solution for Linux.

This package provides the /etc/init.d/ipsec service script and allows
to maintain both IKEv1 and IKEv2 using the /etc/ipsec.conf and the
/etc/ipsec.sectes files.






* Sat Jul 30 2022 Peter Conrad <>
  - Update to release 5.9.7
    * The IKEv2 key derivation is now delayed until the keys are
      actually needed to process or send the next message.
    * Inbound IKEv2 messages, in particular requests, are now
      processed differently.
    * The retransmission logic in the dhcp plugin has been fixed.
    * The connmark plugin now considers configured masks in
      installed firewall rules.
    * Child config selection has been fixed as responder in cases
      where multiple children use transport mode traffic selectors.
    * The outbound SA/policy is now also removed after IKEv1
      CHILD_SA rekeyings.
    * The openssl plugin supports AES and Camellia in CTR mode.
    * The AES-XCBC/CMAC PRFs are demoted in the default proposal
      (after HMAC-based PRFs) since they were never widely adopted.
    * The kdf plugin is now automatically enabled if any of the
      aesni, cmac or xcbc plugins are enabled, or if none of the
      plugins that directly provide HMAC-based KDFs are enabled.
* Sat Apr 30 2022 Jan Engelhardt <>
  - Update to release 5.9.6
    * Support for labeled IPsec with IKEv2
      (draft-ietf-ipsecme-labeled-ipsec) has been added. Two modes
      are currently supported.
    * The secrets used for generating COOKIE payloads are now
      switched based on a time limit (2 minutes) and not the
      previous usage limit (10'000 generated cookies).
    * Actively initiating duplicate CHILD_SAs within the same
      IKE_SA is now largely prevented.
    * If the source address is unknown when initiating an IKEv2 SA,
      a NAT situation is now forced for IPv4 (for IPv6, NAT-T is
      disabled) to avoid causing asymmetric enabling of
    * The main two steps of the IKEv2 key derivation (PRF/prf+)
      have been modularized. In particular, prf+ is now provided by
      a plugin.
  - Drop prf-plus-modularization.patch
* Wed Mar 16 2022 Marcus Meissner <>
  - prf-plus-modularization.patch: updated from upstream branch
    after certifier feedback, SKEYSEED generated via HKDF-Extract.
* Thu Mar 03 2022 Marcus Meissner <>
  - Added prf-plus-modularization.patch that outsources the IKE
    key derivation to openssl. (will be merged to 5.9.6)
  - package the kdf config, template and plugin
* Wed Jan 26 2022 Jan Engelhardt <>
  - Update to release 5.9.5
    * Fixed a vulnerability in the EAP client implementation
      (CVE-2021-45079 bsc#1194471).
    * libtpmtss may now establish a secure session via RSA OAEP
      public key encryption or an ephemeral ECDH key exchange,
    * When rekeying CHILD_SAs, the old outbound SA is now
      uninstalled earlier on the initiator/winner.
    * The openssl plugin now only announces the ECDH groups
      actually supported by OpenSSL (determined via
    * Added support for AES-CFB.
* Wed Nov 24 2021 Johannes Segitz <>
  - Added hardening to systemd service(s) (bsc#1181400). Added patch(es):
    * harden_strongswan.service.patch
* Mon Nov 22 2021 Bjørn Lie <>
  - Update to version 5.9.4:
    * Fixed a denial-of-service vulnerability in the gmp plugin that
      was caused by an integer overflow when processing RSASSA-PSS
      signatures with very large salt lengths. This vulnerability has
      been registered as CVE-2021-41990. Please refer to our blog for
      details. (bsc#1191367)
    * Fixed a denial-of-service vulnerability in the in-memory
      certificate cache if certificates are replaced and a very large
      random value caused an integer overflow. This vulnerability has
      been registered as CVE-2021-41991. Please refer to our blog for
      details. (bsc#1191435)
    * Fixed a related flaw that caused the daemon to accept and cache
      an infinite number of versions of a valid certificate by
      modifying the parameters in the signatureAlgorithm field of the
      outer X.509 Certificate structure.
    * AUTH_LIFETIME notifies are now only sent by a responder if it
      can't reauthenticate the IKE_SA itself due to asymmetric
      authentication (i.e. EAP) or the use of virtual IPs.
    * Several corner cases with reauthentication have been fixed
      (48fbe1d, 36161fe, 0d373e2).
    * Serial number generation in several pki sub-commands has been
      fixed so they don't start with an unintended zero byte.
    * Loading SSH public keys via vici has been improved.
    * Shared secrets, PEM files, vici messages, PF_KEY messages,
      swanctl configs and other data is properly wiped from memory.
    * Use a longer dummy key to initialize HMAC instances in the
      openssl plugin in case it's used in FIPS-mode.
    * The --enable-tpm option now implies --enable-tss-tss2 as the
      plugin doesn't do anything without a TSS 2.0.
    * libtpmtss is initialized in all programs and libraries that use
    * Migrated testing scripts to Python 3.
* Mon Sep 27 2021 Bjørn Lie <>
  - Update to version 5.9.3:
    * Added AES-ECB, SHA-3 and SHAKE-256 support to the wolfssl
    * Added AES-CCM support to the openssl plugin (#353 bsc#1185363).
    * The x509 and the openssl plugins now consider the
      authorityKeyIdentifier, if available, before verifying
      signatures, which avoids unnecessary signature verifications
      after a CA key rollover if both CA certificates are loaded.
      The openssl plugin now does the same also for CRLs (the x509
      plugin already did).
    * The pkcs11 plugin better handles optional attributes like
      CKA_TRUSTED, which previously depended on a version check.
    * The NetworkManager backend (charon-nm) now supports using SANs
      as client identities, not only full DNs (#437).
    * charon-tkm now handles IKE encryption.
    * Send a MOBIKE update again if a a change in the NAT mappings is
      detected but the endpoints stay the same (e143a7d).
    * A deadlock in the HA plugin introduced with 5.9.2 has been
      fixed (#456).
    * DSCP values are now also set for NAT keepalives.
    * The ike_derived_keys() hook now receives more keys but in a
      different order (4e29d6f).
    * Converted most of the test case scenarios to the vici
  - Replace libsoup-devel with pkgconfig(libsoup-2.4) BuildRequires,
    as this is what really checks for. Needed as libsoup-3.0 is
  - 5.9.1
    - README: added a missing " to pki example command (bsc#1167880)
    - fixed a libgcrypt call in FIPS mode (bsc#1180801)
* Mon Sep 07 2020 Jan Engelhardt <>
  - Update to release 5.9.0
    * Prefer AEAD algorithms for ESP; this puts AES-GCM in a default
      AEAD proposal in front of the previous default proposal.
    * If a connection fails after getting redirected, we now
      restart connecting to the original host, not the one
      redirected to.
    * For peers that don't send the EAP_ONLY_AUTHENTICATION notify
      but still expect to use EAP-only authentication, the
      charon.force_eap_only_authentication option can be enabled to
      force this type of authentication even on non-compliant
    * IPv6 virtual IPs are now always enumerated, ignoring the
      charon.prefer_temporary_addrs setting, which should fix route
      installation if the latter is enabled.
* Tue Sep 01 2020 Jan Engelhardt <>
  - Enable bypass-lan strongswan plugin
* Fri May 01 2020 Bjørn Lie <>
  - Update to version 5.8.4:
    * In IKEv1 Quick Mode make sure that a proposal exists before
      determining lifetimes (fixes a crash due to a null-pointer
      dereference in 5.8.3).
    * OpenSSL currently doesn't support squeezing bytes out of a
      SHAKE128/256 XOF (support was added with 5.8.3) multiple times.
      Unfortunately, EVP_DigestFinalXOF() completely resets the
      context and later calls not simply fail, they cause a
      null-pointer dereference in libcrypto. c5c1898d73 fixes the
      crash at the cost of repeating initializing the whole state and
      allocating too much data for subsequent calls (hopefully, once
      the OpenSSL issue 7894 is resolved we can implement this more
    * On 32-bit platforms, reading arbitrary 32-bit integers from
      config files (e.g. for charon.spi_min/max) has been fixed.
    * charon-nm now allows using fixed source ports.
  - Changes from version 5.8.3:
    * Updates for the NM plugin (and backend, which has to be updated
      to be compatible):
      + EAP-TLS authentication (#2097)
      + Certificate source (file, agent, smartcard) is selectable
      + Add support to configure local and remote identities (#2581)
      + Support configuring a custom server port (#625)
      + Show hint regarding password storage policy
      + Replaced the term "gateway" with "server"
      + Fixes build issues due to use of deprecated GLib
      + Updated Glade file to GTK 3.2
    * The NM backend now supports reauthentication and redirection.
    * Previously used reqids are now reallocated, which works around
      an issue on FreeBSD where the kernel doesn't allow the daemon
      to use reqids > 16383 (#2315).
    * On Linux, throw type routes are installed in table 220 for
      passthrough policies. The kernel will then fall back on routes
      in routing tables with lower priorities for matching traffic.
      This way, they require less information (e.g. no interface or
      source IP) and can be installed earlier and are not affected by
    * For IKEv1, the lifetimes of the actually selected transform are
      returned to the initiator, which is an issue if the peer uses
      different lifetimes for different transforms (#3329). We now
      also return the correct transform and proposal IDs (proposal ID
      was always 0, transform ID 1). IKE_SAs are now not
      re-established anymore (e.g. after several retransmits) if a
      deletion has been queued (#3335).
    * Added support for Ed448 keys and certificates via openssl
      plugin and pki tool.
    * Added support for SHA-3 and SHAKE128/256 in the openssl plugin.
    * The use of algorithm IDs from the private use range can now be
      enabled globally, to use them even if no strongSwan vendor ID
      was exchanged (05e373aeb0).
    * Fixed a compiler issue that may have caused invalid keyUsage
      extensions in certificates (#3249).
    * A lot of spelling fixes.
    * Fixed several reported issues.
  - Drop 0006-Resolve-multiple-definition-of-swanctl_dir.patch: Fixed
* Tue Mar 31 2020 Madhu Mohan Nelemane <>
  - Fix to resolve multiple definitions for swanctl_dir (bsc#1164493)
    [+ 0006-Resolve-multiple-definition-of-swanctl_dir.patch ]
* Mon Feb 17 2020 Johannes Kastl <>
  - move file %{_datadir}/dbus-1/system.d/nm-strongswan-service.conf
    to strongswan-nm subpackage, as it is needed for the
    NetworkManager plugin that uses strongswan-nm, not
    This fixes the following error:
    Failed to initialize a plugin instance: Connection ":1.153" is not
    allowed to own the service "org.freedesktop.NetworkManager.strongswan"
    due to security policies in the configuration file
* Thu Jan 30 2020 Bjørn Lie <>
  - Drop upstream fixed patches:
    * strongswan_modprobe_syslog.patch
    * strongswan_fipsfilter.patch
    * 0006-fix-compilation-error-by-adding-stdint.h.patch
* Sun Jan 26 2020 Jan Engelhardt <>
  - Replace %__-type macro indirections. Update homepage URL to https.
* Mon Jan 06 2020 Bjørn Lie <>
  - Update to version 5.8.2 (jsc#SLE-11370):
    * The systemd service units have changed their name.
      "strongswan" is now "strongswan-starter", and
      "strongswan-swanctl" is now "strongswan".
      After installation, you need to `systemctl disable` the old
      name and `systemctl enable`+start the new one.
    * Fix CVE-2018-17540, CVE-2018-16151 and CVE-2018-16152.
    * boo#1109845 and boo#1107874.
  - Please check included NEWS file for info on what other changes
    that have been done in versions 5.8.2, 5.8.1 5.8.0, 5.7.2, 5.7.1
    and 5.7.0.
  - Rebase strongswan_ipsec_service.patch.
  - Disable patches that need rebase or dropping:
    * strongswan_modprobe_syslog.patch
    * 0006-fix-compilation-error-by-adding-stdint.h.patch
  - Add conditional pkgconfig(libsystemd) BuildRequires: New



Generated by rpm2html 1.8.1

Fabrice Bellet, Sun Oct 9 10:32:30 2022