diff options
author | Yves-Alexis Perez <corsac@debian.org> | 2019-01-02 10:45:36 +0100 |
---|---|---|
committer | Yves-Alexis Perez <corsac@debian.org> | 2019-01-02 11:07:05 +0100 |
commit | 918094fde55fa0dbfd59a5f88d576efb513a88db (patch) | |
tree | 61e31656c60a6cc928c50cd633568043673e2cbd /NEWS | |
parent | 69bc96f6b0b388d35e983f8d27224fa49d92918c (diff) | |
download | vyos-strongswan-918094fde55fa0dbfd59a5f88d576efb513a88db.tar.gz vyos-strongswan-918094fde55fa0dbfd59a5f88d576efb513a88db.zip |
New upstream version 5.7.2
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 58 |
1 files changed, 54 insertions, 4 deletions
@@ -1,3 +1,53 @@ +strongswan-5.7.2 +---------------- + +- Private key implementations may optionally provide a list of supported + signature schemes, which is used by the tpm plugin because for each key on a + TPM 2.0 the hash algorithm and for RSA also the padding scheme is predefined. + +- For RSA with PSS padding, the TPM 2.0 specification mandates the maximum salt + length (as defined by the length of the key and hash). However, if the TPM is + FIPS-168-4 compliant, the salt length equals the hash length. This is assumed + for FIPS-140-2 compliant TPMs, but if that's not the case, it might be + necessary to manually enable charon.plugins.tpm.fips_186_4 if the TPM doesn't + use the maximum salt length. + +- swanctl now accesses directories for credentials relative to swanctl.conf, in + particular, when it's loaded from a custom location via --file argument. The + base directory that's used if --file is not given is configurable at runtime + via SWANCTL_DIR environment variable. + +- With RADIUS Accounting enabled, the eap-radius plugin adds the session ID to + Access-Request messages, simplifying associating database entries for IP + leases and accounting with sessions. + +- IPs assigned by RADIUS servers are included in Accounting-Stop even if clients + don't claim them, allowing releasing them early on connection errors. + +- Selectors installed on transport mode SAs by the kernel-netlink plugin are + updated on IP address changes (e.g. via MOBIKE). + +- Added support for RSA signatures with SHA-256 and SHA-512 to the agent plugin. + For older versions of ssh/gpg-agent that only support SHA-1, IKEv2 signature + authentication has to be disabled via charon.signature_authentication. + +- The sshkey and agent plugins support Ed25519/Ed448 SSH keys and signatures. + +- The openssl plugin supports X25519/X448 Diffie-Hellman and Ed25519/Ed448 keys + and signatures when built against OpenSSL 1.1.1. + +- Ed25519, ChaCha20/Poly1305, SHA-3 and AES-CCM were added to the botan plugin. + +- The mysql plugin now properly handles database connections with transactions + under heavy load. + +- IP addresses in HA pools are now distributed evenly among all segments. + +- On newer FreeBSD kernels, the kernel-pfkey plugin reads the reqid directly + from SADB_ACQUIRE messages, i.e. not requiring previous policy installation by + the plugin, e.g. for compatibility with if_ipsec(4) VTIs. + + strongswan-5.7.1 ---------------- @@ -1031,7 +1081,7 @@ strongswan-5.0.3 charon-tkm does not result in the compromise of cryptographic keys. The extracted functionality has been implemented from scratch in a minimal TCB (trusted computing base) in the Ada programming language. Further information - can be found at http://www.codelabs.ch/tkm/. + can be found at https://www.codelabs.ch/tkm/. strongswan-5.0.2 ---------------- @@ -1169,7 +1219,7 @@ strongswan-5.0.0 pluto, but currently does not support AH or bundled AH+ESP SAs. Beside RSA/ECDSA, PSK and XAuth, charon also supports the Hybrid authentication mode. Information for interoperability and migration is available at - http://wiki.strongswan.org/projects/strongswan/wiki/CharonPlutoIKEv1. + https://wiki.strongswan.org/projects/strongswan/wiki/CharonPlutoIKEv1. - Charon's bus_t has been refactored so that loggers and other listeners are now handled separately. The single lock was previously cause for deadlocks @@ -1600,7 +1650,7 @@ strongswan-4.4.0 - The IKEv2 High Availability plugin has been integrated. It provides load sharing and failover capabilities in a cluster of currently two nodes, based on an extend ClusterIP kernel module. More information is available at - http://wiki.strongswan.org/projects/strongswan/wiki/HighAvailability. + https://wiki.strongswan.org/projects/strongswan/wiki/HighAvailability. The development of the High Availability functionality was sponsored by secunet Security Networks AG. @@ -2308,7 +2358,7 @@ strongswan-4.1.7 - Preview of strongSwan Manager, a web based configuration and monitoring application. It uses a new XML control interface to query the IKEv2 daemon - (see http://wiki.strongswan.org/wiki/Manager). + (see https://wiki.strongswan.org/wiki/Manager). - Experimental SQLite configuration backend which will provide the configuration interface for strongSwan Manager in future releases. |