Version 5.1.1 » History » Version 2
Version 1 (Tobias Brunner, 01.08.2013 10:07) → Version 2/3 (Tobias Brunner, 01.11.2013 13:43)
h1. Version 5.1.1
* Fixed a denial-of-service vulnerability and potential authorization bypass
triggered by a crafted @ID_DER_ASN1_DN@ ID payload. The cause is an insufficient
length check when comparing such identities. The vulnerability has been
registered as "CVE-2013-6075":http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2013-6075.
Refer to "our blog":http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-(cve-2013-6075).html for details.
* Fixed a denial-of-service vulnerability triggered by a crafted IKEv1
fragmentation payload. The cause is a NULL pointer dereference. The
vulnerability has been registered as "CVE-2013-6076":http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2013-6076.
Refer to "our blog":http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-(cve-2013-6076).html for details.
* The lean stand-alone _pt-tls-client_ can set up a "RFC 6876":https://tools.ietf.org/html/rfc6876 PT-TLS session
with a strongSwan policy enforcement point which uses the _tnc-pdp_ charon
plugin.
* The new TCG TNC SWID IMC/IMV pair supports targeted SWID requests for either
full SWID Tag or concise SWID Tag ID inventories.
* The XAuth backend in [[EAPRadius|eap-radius]] now supports multiple XAuth exchanges for
different credential types and display messages. All user input gets
concatenated and verified with a single User-Password RADIUS attribute on
the AAA. With an AAA supporting it, one for example can implement
Password+Token authentication with proper dialogs on iOS and OS X clients.
* charon supports IKEv1 Mode Config exchange in push mode. The [[ipsec.conf]]
modeconfig=push option enables it for both client and server, the same way
as pluto used it.
* Using the _ah_ [[ipsec.conf]] keyword on both IKEv1 and IKEv2 connections,
charon can negotiate and install Security Associations integrity-protected by
the Authentication Header protocol. Supported are plain AH(+IPComp) SAs only,
but not the deprecated RFC 2401 style ESP+AH bundles.
* The generation of initialization vectors for IKE and ESP (when using libipsec)
is now modularized and IVs for e.g. AES-GCM are now correctly allocated
sequentially, while other algorithms like AES-CBC still use random IVs.
* The _left_ and _right_ options in [[ipsec.conf]] can take multiple address ranges
and subnets. This allows connection matching against a larger set of
addresses, for example to use a different connection for clients connecting
from an internal network.
* For all those who have a queasy feeling about will be the NIST elliptic curve set,
the Brainpool curves introduced next minor release, see "Roadmap":http://wiki.strongswan.org/projects/strongswan/roadmap for use with IKE by "RFC 6932":https://tools.ietf.org/html/rfc6932 might be a
more trustworthy alternative.
* The [[kernel-libipsec]] userland IPsec backend now supports usage statistics,
volume based rekeying and accepts ESPv3 style TFC padded packets.
* With two new [[strongswan.conf]] options _fwmarks_ can be used to implement
[[kernel-libipsec#Host-to-Host-Tunnels|host-to-host tunnels with kernel-libipsec]].
* _libipsec_ now properly calculates padding length especially for AES-GCM.
* _load-tester_ supports transport mode connections and more complex traffic
selectors, including such using unique ports for each tunnel.
* The new _dnscert_ plugin provides support for authentication via CERT RRs that
are protected via DNSSEC. The plugin was created by Ruslan N. Marchenko.
* The [[EAPRadius|eap-radius]] plugin supports forwarding of several Cisco Unity specific
RADIUS attributes in corresponding configuration payloads.
* The [[ipsecpki|ipsec pki]] utility and its subcommands all received man pages.
The command itself is now installed in $prefix/bin by default. So the _ipsec_
prefix is now optional.
* [[IpsecPkiPub|pki --pub]] is able to convert public keys to other formats (e.g. DNSKEY or SSH).
* Database transactions are now abstracted and implemented by the two backends.
If you use MySQL make sure all tables use the InnoDB engine.
* libstrongswan now can provide an experimental custom implementation of the
printf family functions based updates on klibc if neither Vstr nor glibc style printf
hooks are available. This can avoid the Vstr dependency on some systems at
the cost of slower and less complete printf functions.
* Handling of ICMP[v6] has been improved. For instance, traffic selectors with
specific ICMP message type and code can now be configured in [[ipsec.conf]]
and are properly installed in the kernel.
* IKEv1 reauthentication should be more stable with third-party peers (commit:ee99f37e, commit:d2e4dd75).
* Fixes a regression in [[5.1.0]] that caused a segmentation fault when reestablishing
CHILD_SAs due to _closeaction=restart|hold_ (commit:e42ab08a).
* Fixes a regression in [[5.1.0]] that caused IP addresses on ignored, down or loopback
interfaces to get ignored when searching for an address contained in the local traffic
selector (commit:d7ae0b254).
* The calculation of the ESN bitmap length in the _kernel-netlink_ plugin was fixed (commit:e001cc2b).
* When removing configs via _stroke_ plugin (e.g. with @ipsec update/reload@) matching
peer configs are not removed anymore, if they are still used by other child configs (commit:791fde16).
* reqids of established CHILD_SAs are reused when routing connections via _stroke_ plugin (commit:32fef0c6).
* The value for @xfrm_acq_expires@ can now be configured via [[strongswan.conf]] (commit:255b9dac).
release date.
* Fixed a denial-of-service vulnerability and potential authorization bypass
triggered by a crafted @ID_DER_ASN1_DN@ ID payload. The cause is an insufficient
length check when comparing such identities. The vulnerability has been
registered as "CVE-2013-6075":http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2013-6075.
Refer to "our blog":http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-(cve-2013-6075).html for details.
* Fixed a denial-of-service vulnerability triggered by a crafted IKEv1
fragmentation payload. The cause is a NULL pointer dereference. The
vulnerability has been registered as "CVE-2013-6076":http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2013-6076.
Refer to "our blog":http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-(cve-2013-6076).html for details.
* The lean stand-alone _pt-tls-client_ can set up a "RFC 6876":https://tools.ietf.org/html/rfc6876 PT-TLS session
with a strongSwan policy enforcement point which uses the _tnc-pdp_ charon
plugin.
* The new TCG TNC SWID IMC/IMV pair supports targeted SWID requests for either
full SWID Tag or concise SWID Tag ID inventories.
* The XAuth backend in [[EAPRadius|eap-radius]] now supports multiple XAuth exchanges for
different credential types and display messages. All user input gets
concatenated and verified with a single User-Password RADIUS attribute on
the AAA. With an AAA supporting it, one for example can implement
Password+Token authentication with proper dialogs on iOS and OS X clients.
* charon supports IKEv1 Mode Config exchange in push mode. The [[ipsec.conf]]
modeconfig=push option enables it for both client and server, the same way
as pluto used it.
* Using the _ah_ [[ipsec.conf]] keyword on both IKEv1 and IKEv2 connections,
charon can negotiate and install Security Associations integrity-protected by
the Authentication Header protocol. Supported are plain AH(+IPComp) SAs only,
but not the deprecated RFC 2401 style ESP+AH bundles.
* The generation of initialization vectors for IKE and ESP (when using libipsec)
is now modularized and IVs for e.g. AES-GCM are now correctly allocated
sequentially, while other algorithms like AES-CBC still use random IVs.
* The _left_ and _right_ options in [[ipsec.conf]] can take multiple address ranges
and subnets. This allows connection matching against a larger set of
addresses, for example to use a different connection for clients connecting
from an internal network.
* For all those who have a queasy feeling about will be the NIST elliptic curve set,
the Brainpool curves introduced next minor release, see "Roadmap":http://wiki.strongswan.org/projects/strongswan/roadmap for use with IKE by "RFC 6932":https://tools.ietf.org/html/rfc6932 might be a
more trustworthy alternative.
* The [[kernel-libipsec]] userland IPsec backend now supports usage statistics,
volume based rekeying and accepts ESPv3 style TFC padded packets.
* With two new [[strongswan.conf]] options _fwmarks_ can be used to implement
[[kernel-libipsec#Host-to-Host-Tunnels|host-to-host tunnels with kernel-libipsec]].
* _libipsec_ now properly calculates padding length especially for AES-GCM.
* _load-tester_ supports transport mode connections and more complex traffic
selectors, including such using unique ports for each tunnel.
* The new _dnscert_ plugin provides support for authentication via CERT RRs that
are protected via DNSSEC. The plugin was created by Ruslan N. Marchenko.
* The [[EAPRadius|eap-radius]] plugin supports forwarding of several Cisco Unity specific
RADIUS attributes in corresponding configuration payloads.
* The [[ipsecpki|ipsec pki]] utility and its subcommands all received man pages.
The command itself is now installed in $prefix/bin by default. So the _ipsec_
prefix is now optional.
* [[IpsecPkiPub|pki --pub]] is able to convert public keys to other formats (e.g. DNSKEY or SSH).
* Database transactions are now abstracted and implemented by the two backends.
If you use MySQL make sure all tables use the InnoDB engine.
* libstrongswan now can provide an experimental custom implementation of the
printf family functions based updates on klibc if neither Vstr nor glibc style printf
hooks are available. This can avoid the Vstr dependency on some systems at
the cost of slower and less complete printf functions.
* Handling of ICMP[v6] has been improved. For instance, traffic selectors with
specific ICMP message type and code can now be configured in [[ipsec.conf]]
and are properly installed in the kernel.
* IKEv1 reauthentication should be more stable with third-party peers (commit:ee99f37e, commit:d2e4dd75).
* Fixes a regression in [[5.1.0]] that caused a segmentation fault when reestablishing
CHILD_SAs due to _closeaction=restart|hold_ (commit:e42ab08a).
* Fixes a regression in [[5.1.0]] that caused IP addresses on ignored, down or loopback
interfaces to get ignored when searching for an address contained in the local traffic
selector (commit:d7ae0b254).
* The calculation of the ESN bitmap length in the _kernel-netlink_ plugin was fixed (commit:e001cc2b).
* When removing configs via _stroke_ plugin (e.g. with @ipsec update/reload@) matching
peer configs are not removed anymore, if they are still used by other child configs (commit:791fde16).
* reqids of established CHILD_SAs are reused when routing connections via _stroke_ plugin (commit:32fef0c6).
* The value for @xfrm_acq_expires@ can now be configured via [[strongswan.conf]] (commit:255b9dac).
release date.