diff options
Diffstat (limited to 'debian/NEWS')
-rw-r--r-- | debian/NEWS | 111 |
1 files changed, 111 insertions, 0 deletions
diff --git a/debian/NEWS b/debian/NEWS new file mode 100644 index 000000000..70ac0349b --- /dev/null +++ b/debian/NEWS @@ -0,0 +1,111 @@ +strongswan (5.6.2-1) unstable; urgency=medium + + Starting 5.6.1, several algorithms were removed from the default ESP/AH and + IKEv2 proposals in compliance with RFC 8221[1] and RFC 8247[2], + respectively. + . + Removed from the default ESP/AH proposal were the 3DES and Blowfish + encryption algorithms and the HMAC-MD5 integrity algorithm. + . + From the IKEv2 default proposal the HMAC-MD5 integrity algorithm and the + MODP-1024 Diffie-Hellman group were removed (the latter is significant for + Windows clients in their default configuration). + . + These algorithms may still be used in custom proposals and MODP-2048 can be + enabled manually on Windows 7 clients [3]. + . + [1] https://tools.ietf.org/html/rfc8221 + [2] https://tools.ietf.org/html/rfc8247 + [3] https://wiki.strongswan.org/projects/strongswan/wiki/Windows7#AES-256-CBC-and-MODP2048 + + -- Yves-Alexis Perez <corsac@debian.org> Tue, 20 Feb 2018 12:27:00 +0100 + +strongswan (5.1.2-1) unstable; urgency=medium + + Starting 5.1.2, strongSwan natively support a configuration directory (in + /etc/strongswan.d/). This replaces the /etc/strongswan.conf.d/ configuration + directly which was added in 5.1.1-1. + . + More information can be found on the strongswan.d configuration mechanism on + the upstream commit [1] and user documentation [2]. + . + In Debian, these configurations directories are especially use to easily + toggle the loading of the various plugins shipped with the Debian packages. + Upstream defaults to load the plugins, and this can be overridden by + changing the files in /etc/strongswan.d. As those latter files are tracked + as configuration files, modifications won't be reverted when the package is + upgraded. Default settings for the plugins can be found in the templates dir + in the /usr/share/strongswan/templates/config folder. + . + [1]: http://wiki.strongswan.org/projects/strongswan/repository/revisions/55015036183c47692c2e2349a4c59bf00c107986 + [2]: http://wiki.strongswan.org/projects/strongswan/wiki/StrongswanDirectory + + -- Yves-Alexis Perez <corsac@debian.org> Wed, 12 Mar 2014 10:31:44 +0100 + +strongswan (5.1.1-2+splitplugins) experimental; urgency=medium + + In 5.1.1-2 package, few plugins have been split from the main libstrongswan + package. The plugins are now in following packages: + - libstrongswan: main/default plugins, as defined by the strongSwan + project + - libstrongswan-standard-plugins: non default but useful plugins (agent, + gcm and openssl) + - libstrongswan-extra-plugins: more scarcely used plugins + - libcharon-extra-plugins: more scarecely used plugins for the charon + daemon + + WARNING: this is an experimental release of the packaging, use at your own + risk. + + -- Yves-Alexis Perez <corsac@debian.org> Sun, 02 Feb 2014 20:05:15 +0100 + +strongswan (5.1.0-1) unstable; urgency=low + + Starting with strongSwan 5, the IKEv1 daemon (pluto) is gone, and the charon + daemon is now able to handle both IKEv1 and IKEv2 protocols. + + There should be no issue for previous charon users, but for pluto users that + means they need to re-configure strongSwan in order to use charon. Some + migration help can be found on the strongSwan website at + http://wiki.strongswan.org/projects/strongswan/wiki/CharonPlutoIKEv1 and in + some IKEv1 configuration examples at + http://wiki.strongswan.org/projects/strongswan/wiki/IKEv1Examples. + + -- Yves-Alexis Perez <corsac@debian.org> Mon, 30 Sep 2013 20:43:03 +0200 + +strongswan (4.5.0-1) unstable; urgency=low + + Starting with strongswan 4.5.0 upstream, the IKEv2 protocol is now the + default. This can easily be changed using the keyexchange=ikev1 config + option (either in the respective "conn" section or by putting it in the + "default" section and therefore applying it to all existing connections). + + The IKEv2 protocol has less overhead, more features (e.g. NAT-Traversal by + default, MOBIKE, Mobile IPv6), and provides better error messages in case + the connection can not be established. It is therefore highly recommended + to use it when the other side also supports it. + + Addtionally, strongswan 4.5.0-1 now enables support for NAT Traversal in + combination with IPsec transport mode (the support for this has existed + for a long time, but was disabled due to security concerns). This is + required e.g. to let mobile phone clients (notably Android, iPhone) + connect to an L2TP/IPsec gateway using strongswan. The security + implications as described in the original README.NAT-Traversal file from + the openswan distribution are: + + * Transport Mode can't be used without NAT in the IPSec layer. Otherwise, + all packets for the NAT device (including all hosts behind it) would be + sent to the NAT-T Client. This would create a sort of blackhole between + the peer which is not behind NAT and the NAT device. + + * In Tunnel Mode with roadwarriors, we CAN'T accept any IP address, + otherwise, an evil roadwarrior could redirect all trafic for one host + (including a host on the private network) to himself. That's why, you have + to specify the private IP in the configuration file, use virtual IP + management, or DHCP-over-IPSec. + + -- Rene Mayrhofer <rmayr@debian.org> Sun, 28 Nov 2010 13:16:00 +0200 + +Local variables: +mode: debian-changelog +End: |