diff options
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 327 |
1 files changed, 326 insertions, 1 deletions
@@ -1,3 +1,328 @@ +strongswan-5.1.0 +---------------- + +- Fixed a denial-of-service vulnerability triggered by specific XAuth usernames + and EAP identities (since 5.0.3), and PEM files (since 4.1.11). The crash + was caused by insufficient error handling in the is_asn1() function. + The vulnerability has been registered as CVE-2013-5018. + +- The new charon-cmd command line IKE client can establish road warrior + connections using IKEv1 or IKEv2 with different authentication profiles. + It does not depend on any configuration files and can be configured using a + few simple command line options. + +- The kernel-pfroute networking backend has been greatly improved. It now + can install virtual IPs on TUN devices on OS X and FreeBSD, allowing these + systems to act as a client in common road warrior scenarios. + +- The new kernel-libipsec plugin uses TUN devices and libipsec to provide IPsec + processing in userland on Linux, FreeBSD and Mac OS X. + +- The eap-radius plugin can now serve as an XAuth backend called xauth-radius, + directly verifying XAuth credentials using RADIUS User-Name/User-Password + attributes. This is more efficient than the existing xauth-eap+eap-radius + combination, and allows RADIUS servers without EAP support to act as AAA + backend for IKEv1. + +- The new osx-attr plugin installs configuration attributes (currently DNS + servers) via SystemConfiguration on Mac OS X. The keychain plugin provides + certificates from the OS X keychain service. + +- The sshkey plugin parses SSH public keys, which, together with the --agent + option for charon-cmd, allows the use of ssh-agent for authentication. + To configure SSH keys in ipsec.conf the left|rightrsasigkey options are + replaced with left|rightsigkey, which now take public keys in one of three + formats: SSH (RFC 4253, ssh: prefix), DNSKEY (RFC 3110, dns: prefix), and + PKCS#1 (the default, no prefix). + +- Extraction of certificates and private keys from PKCS#12 files is now provided + by the new pkcs12 plugin or the openssl plugin. charon-cmd (--p12) as well + as charon (via P12 token in ipsec.secrets) can make use of this. + +- IKEv2 can now negotiate transport mode and IPComp in NAT situations. + +- IKEv2 exchange initiators now properly close an established IKE or CHILD_SA + on error conditions using an additional exchange, keeping state in sync + between peers. + +- Using a SQL database interface a Trusted Network Connect (TNC) Policy Manager + can generate specific measurement workitems for an arbitrary number of + Integrity Measurement Verifiers (IMVs) based on the history of the VPN user + and/or device. + +- Several core classes in libstrongswan are now tested with unit tests. These + can be enabled with --enable-unit-tests and run with 'make check'. Coverage + reports can be generated with --enable-coverage and 'make coverage' (this + disables any optimization, so it should not be enabled when building + production releases). + +- The leak-detective developer tool has been greatly improved. It works much + faster/stabler with multiple threads, does not use deprecated malloc hooks + anymore and has been ported to OS X. + +- chunk_hash() is now based on SipHash-2-4 with a random key. This provides + better distribution and prevents hash flooding attacks when used with + hashtables. + +- All default plugins implement the get_features() method to define features + and their dependencies. The plugin loader has been improved, so that plugins + in a custom load statement can be ordered freely or to express preferences + without being affected by dependencies between plugin features. + +- A centralized thread can take care for watching multiple file descriptors + concurrently. This removes the need for a dedicated listener threads in + various plugins. The number of "reserved" threads for such tasks has been + reduced to about five, depending on the plugin configuration. + +- Plugins that can be controlled by a UNIX socket IPC mechanism gained network + transparency. Third party applications querying these plugins now can use + TCP connections from a different host. + +- libipsec now supports AES-GCM. + + +strongswan-5.0.4 +---------------- + +- Fixed a security vulnerability in the openssl plugin which was reported by + Kevin Wojtysiak. The vulnerability has been registered as CVE-2013-2944. + Before the fix, if the openssl plugin's ECDSA signature verification was used, + due to a misinterpretation of the error code returned by the OpenSSL + ECDSA_verify() function, an empty or zeroed signature was accepted as a + legitimate one. + +- The handling of a couple of other non-security relevant openssl return codes + was fixed as well. + +- The tnc_ifmap plugin now publishes virtual IPv4 and IPv6 addresses via its + TCG TNC IF-MAP 2.1 interface. + +- The charon.initiator_only option causes charon to ignore IKE initiation + requests. + +- The openssl plugin can now use the openssl-fips library. + + +strongswan-5.0.3 +---------------- + +- The new ipseckey plugin enables authentication based on trustworthy public + keys stored as IPSECKEY resource records in the DNS and protected by DNSSEC. + To do so it uses a DNSSEC enabled resolver, like the one provided by the new + unbound plugin, which is based on libldns and libunbound. Both plugins were + created by Reto Guadagnini. + +- Implemented the TCG TNC IF-IMV 1.4 draft making access requestor identities + available to an IMV. The OS IMV stores the AR identity together with the + device ID in the attest database. + +- The openssl plugin now uses the AES-NI accelerated version of AES-GCM + if the hardware supports it. + +- The eap-radius plugin can now assign virtual IPs to IKE clients using the + Framed-IP-Address attribute by using the "%radius" named pool in the + rightsourceip ipsec.conf option. Cisco Banner attributes are forwarded to + Unity-capable IKEv1 clients during mode config. charon now sends Interim + Accounting updates if requested by the RADIUS server, reports + sent/received packets in Accounting messages, and adds a Terminate-Cause + to Accounting-Stops. + +- The recently introduced "ipsec listcounters" command can report connection + specific counters by passing a connection name, and global or connection + counters can be reset by the "ipsec resetcounters" command. + +- The strongSwan libpttls library provides an experimental implementation of + PT-TLS (RFC 6876), a Posture Transport Protocol over TLS. + +- The charon systime-fix plugin can disable certificate lifetime checks on + embedded systems if the system time is obviously out of sync after bootup. + Certificates lifetimes get checked once the system time gets sane, closing + or reauthenticating connections using expired certificates. + +- The "ikedscp" ipsec.conf option can set DiffServ code points on outgoing + IKE packets. + +- The new xauth-noauth plugin allows to use basic RSA or PSK authentication with + clients that cannot be configured without XAuth authentication. The plugin + simply concludes the XAuth exchange successfully without actually performing + any authentication. Therefore, to use this backend it has to be selected + explicitly with rightauth2=xauth-noauth. + +- The new charon-tkm IKEv2 daemon delegates security critical operations to a + separate process. This has the benefit that the network facing daemon has no + knowledge of keying material used to protect child SAs. Thus subverting + charon-tkm does not result in the compromise of cryptographic keys. + The extracted functionality has been implemented from scratch in a minimal TCB + (trusted computing base) in the Ada programming language. Further information + can be found at http://www.codelabs.ch/tkm/. + +strongswan-5.0.2 +---------------- + +- Implemented all IETF Standard PA-TNC attributes and an OS IMC/IMV + pair using them to transfer operating system information. + +- The new "ipsec listcounters" command prints a list of global counter values + about received and sent IKE messages and rekeyings. + +- A new lookip plugin can perform fast lookup of tunnel information using a + clients virtual IP and can send notifications about established or deleted + tunnels. The "ipsec lookip" command can be used to query such information + or receive notifications. + +- The new error-notify plugin catches some common error conditions and allows + an external application to receive notifications for them over a UNIX socket. + +- IKE proposals can now use a PRF algorithm different to that defined for + integrity protection. If an algorithm with a "prf" prefix is defined + explicitly (such as prfsha1 or prfsha256), no implicit PRF algorithm based on + the integrity algorithm is added to the proposal. + +- The pkcs11 plugin can now load leftcert certificates from a smartcard for a + specific ipsec.conf conn section and cacert CA certificates for a specific ca + section. + +- The load-tester plugin gained additional options for certificate generation + and can load keys and multiple CA certificates from external files. It can + install a dedicated outer IP address for each tunnel and tunnel initiation + batches can be triggered and monitored externally using the + "ipsec load-tester" tool. + +- PKCS#7 container parsing has been modularized, and the openssl plugin + gained an alternative implementation to decrypt and verify such files. + In contrast to our own DER parser, OpenSSL can handle BER files, which is + required for interoperability of our scepclient with EJBCA. + +- Support for the proprietary IKEv1 fragmentation extension has been added. + Fragments are always handled on receipt but only sent if supported by the peer + and if enabled with the new fragmentation ipsec.conf option. + +- IKEv1 in charon can now parse certificates received in PKCS#7 containers and + supports NAT traversal as used by Windows clients. Patches courtesy of + Volker RĂ¼melin. + +- The new rdrand plugin provides a high quality / high performance random + source using the Intel rdrand instruction found on Ivy Bridge processors. + +- The integration test environment was updated and now uses KVM and reproducible + guest images based on Debian. + + +strongswan-5.0.1 +---------------- + +- Introduced the sending of the standard IETF Assessment Result + PA-TNC attribute by all strongSwan Integrity Measurement Verifiers. + +- Extended PTS Attestation IMC/IMV pair to provide full evidence of + the Linux IMA measurement process. All pertinent file information + of a Linux OS can be collected and stored in an SQL database. + +- The PA-TNC and PB-TNC protocols can now process huge data payloads + >64 kB by distributing PA-TNC attributes over multiple PA-TNC messages + and these messages over several PB-TNC batches. As long as no + consolidated recommandation from all IMVs can be obtained, the TNC + server requests more client data by sending an empty SDATA batch. + +- The rightgroups2 ipsec.conf option can require group membership during + a second authentication round, for example during XAuth authentication + against a RADIUS server. + +- The xauth-pam backend can authenticate IKEv1 XAuth and Hybrid authenticated + clients against any PAM service. The IKEv2 eap-gtc plugin does not use + PAM directly anymore, but can use any XAuth backend to verify credentials, + including xauth-pam. + +- The new unity plugin brings support for some parts of the IKEv1 Cisco Unity + Extension. As client, charon narrows traffic selectors to the received + Split-Include attributes and automatically installs IPsec bypass policies + for received Local-LAN attributes. As server, charon sends Split-Include + attributes for leftsubnet definitions containing multiple subnets to Unity- + aware clients. + +- An EAP-Nak payload is returned by clients if the gateway requests an EAP + method that the client does not support. Clients can also request a specific + EAP method by configuring that method with leftauth. + +- The eap-dynamic plugin handles EAP-Nak payloads returned by clients and uses + these to select a different EAP method supported/requested by the client. + The plugin initially requests the first registered method or the first method + configured with charon.plugins.eap-dynamic.preferred. + +- The new left/rightdns options specify connection specific DNS servers to + request/respond in IKEv2 configuration payloads or IKEv2 mode config. leftdns + can be any (comma separated) combination of %config4 and %config6 to request + multiple servers, both for IPv4 and IPv6. rightdns takes a list of DNS server + IP addresses to return. + +- The left/rightsourceip options now accept multiple addresses or pools. + leftsourceip can be any (comma separated) combination of %config4, %config6 + or fixed IP addresses to request. rightsourceip accepts multiple explicitly + specified or referenced named pools. + +- Multiple connections can now share a single address pool when they use the + same definition in one of the rightsourceip pools. + +- The options charon.interfaces_ignore and charon.interfaces_use allow one to + configure the network interfaces used by the daemon. + +- The kernel-netlink plugin supports the charon.install_virtual_ip_on option, + which specifies the interface on which virtual IP addresses will be installed. + If it is not specified the current behavior of using the outbound interface + is preserved. + +- The kernel-netlink plugin tries to keep the current source address when + looking for valid routes to reach other hosts. + +- The autotools build has been migrated to use a config.h header. strongSwan + development headers will get installed during "make install" if + --with-dev-headers has been passed to ./configure. + +- All crypto primitives gained return values for most operations, allowing + crypto backends to fail, for example when using hardware accelerators. + + +strongswan-5.0.0 +---------------- + +- The charon IKE daemon gained experimental support for the IKEv1 protocol. + Pluto has been removed from the 5.x series, and unless strongSwan is + configured with --disable-ikev1 or --disable-ikev2, charon handles both + keying protocols. The feature-set of IKEv1 in charon is almost on par with + pluto, but currently does not support AH or bundled AH+ESP SAs. Beside + RSA/ECDSA, PSK and XAuth, charon also supports the Hybrid authentication + mode. Informations for interoperability and migration is available at + http://wiki.strongswan.org/projects/strongswan/wiki/CharonPlutoIKEv1. + +- Charon's bus_t has been refactored so that loggers and other listeners are + now handled separately. The single lock was previously cause for deadlocks + if extensive listeners, such as the one provided by the updown plugin, wanted + to acquire locks that were held by other threads which in turn tried to log + messages, and thus were waiting to acquire the same lock currently held by + the thread calling the listener. + The implemented changes also allow the use of a read/write-lock for the + loggers which increases performance if multiple loggers are registered. + Besides several interface changes this last bit also changes the semantics + for loggers as these may now be called by multiple threads at the same time. + +- Source routes are reinstalled if interfaces are reactivated or IP addresses + reappear. + +- The thread pool (processor_t) now has more control over the lifecycle of + a job (see job.h for details). In particular, it now controls the destruction + of jobs after execution and the cancellation of jobs during shutdown. Due to + these changes the requeueing feature, previously available to callback_job_t + only, is now available to all jobs (in addition to a new rescheduling + feature). + +- In addition to trustchain key strength definitions for different public key + systems, the rightauth option now takes a list of signature hash algorithms + considered save for trustchain validation. For example, the setting + rightauth=rsa-2048-ecdsa-256-sha256-sha384-sha512 requires a trustchain + that uses at least RSA-2048 or ECDSA-256 keys and certificate signatures + using SHA-256 or better. + + strongswan-4.6.4 ---------------- @@ -260,7 +585,7 @@ strongswan-4.5.1 ./configure switch. - The new libstrongswan constraints plugin provides advanced X.509 constraint - checking. In additon to X.509 pathLen constraints, the plugin checks for + checking. In addition to X.509 pathLen constraints, the plugin checks for nameConstraints and certificatePolicies, including policyMappings and policyConstraints. The x509 certificate plugin and the pki tool have been enhanced to support these extensions. The new left/rightcertpolicy ipsec.conf |