Version 5.3.3 » History » Version 2
Tobias Brunner, 07.09.2015 11:22
1 | 1 | Tobias Brunner | h1. Version 5.3.3 |
---|---|---|---|
2 | 1 | Tobias Brunner | |
3 | 2 | Tobias Brunner | * Added support for the ChaCha20/Poly1305 AEAD cipher specified in "RFC 7539":https://tools.ietf.org/html/rfc7539 and |
4 | 2 | Tobias Brunner | "RFC 7634":https://tools.ietf.org/html/rfc7634 using the _chacha20poly1305_ [[IKEv2CipherSuites|ike/esp proposal keyword]]. |
5 | 2 | Tobias Brunner | The new _chapoly_ plugin implements the cipher, if possible SSE-accelerated on x86/x64 |
6 | 2 | Tobias Brunner | architectures. It is usable both in IKEv2 and the strongSwan _libipsec_ ESP backend. |
7 | 2 | Tobias Brunner | On Linux 4.2 or newer the _kernel-netlink_ plugin can configure the cipher for ESP SAs. |
8 | 2 | Tobias Brunner | |
9 | 2 | Tobias Brunner | * The [[vici]]/[[swanctl]] interface now supports the configuration of auxiliary certification |
10 | 2 | Tobias Brunner | authority information as CRL and OCSP URIs. |
11 | 2 | Tobias Brunner | |
12 | 2 | Tobias Brunner | * In the [[bliss]] plugin the c_indices derivation using a SHA-512 based random oracle |
13 | 2 | Tobias Brunner | has been fixed, generalized and standardized by employing the MGF1 mask generation |
14 | 2 | Tobias Brunner | function with SHA-512. As a consequence BLISS signatures unsing the improved oracle |
15 | 2 | Tobias Brunner | are not compatible with the earlier implementation. |
16 | 2 | Tobias Brunner | |
17 | 2 | Tobias Brunner | * Support for _auto=route_ with _right=%any_ for transport mode connections has been |
18 | 2 | Tobias Brunner | added (refer to #196-6 for details and some examples). |
19 | 2 | Tobias Brunner | |
20 | 2 | Tobias Brunner | * The starter daemon does not flush IPsec policies and SAs anymore when it is stopped. |
21 | 2 | Tobias Brunner | Already existing duplicate policies are now overwritten by the IKE daemon when it |
22 | 2 | Tobias Brunner | installs its policies (commit:695112d7b8, commit:dc2fa791e4). Usually, there shouldn't be any |
23 | 2 | Tobias Brunner | leftovers after the IKE daemon has been properly terminated, but if it crashes the kernel |
24 | 2 | Tobias Brunner | state won't be cleaned up. Because earlier releases couldn't handle already existing |
25 | 2 | Tobias Brunner | duplicate policies in the kernel, the starter daemon flushed them during shutdown so |
26 | 2 | Tobias Brunner | the daemon would find a clean slate when was restarted. Since existing policies are not |
27 | 2 | Tobias Brunner | a problem anymore this is no longer necessary. And in situations where _installpolicies=no_ |
28 | 2 | Tobias Brunner | is used policies shouldn't be flushed blindly anyway. |
29 | 2 | Tobias Brunner | |
30 | 2 | Tobias Brunner | * [[JobPriority#IKE_SA_INIT-dropping|Init limits]] can now optionally be enforced when initiating SAs via [[VICI]]. For this IKE_SAs |
31 | 2 | Tobias Brunner | initiated by the daemon are now also counted as half-open SAs, which, as a side-effect, |
32 | 2 | Tobias Brunner | fixes the status output while connecting (e.g. in [[ipseccommand|ipsec status]]). |
33 | 2 | Tobias Brunner | |
34 | 2 | Tobias Brunner | * Symmetric configuration of EAP methods in left|rightauth is now possible when mutual |
35 | 2 | Tobias Brunner | EAP-only authentication is used (previously, the client had to configure _rightauth=eap_ |
36 | 2 | Tobias Brunner | or rightauth=any, which prevented it from using this same config as responder). |
37 | 2 | Tobias Brunner | |
38 | 2 | Tobias Brunner | * The initiator flag in the IKEv2 header is compared again (wasn't the case since version:5.0.0) and |
39 | 2 | Tobias Brunner | packets that have the flag set incorrectly are again ignored (commit:47a340e1f7, commit:5fee79d854). |
40 | 2 | Tobias Brunner | |
41 | 2 | Tobias Brunner | * Implemented a demo Hardcopy Device IMC/IMV pair based on the "Hardcopy Device Health |
42 | 2 | Tobias Brunner | Assessment Trusted Network Connect Binding" (HCD-TNC) document drafted by the IEEE |
43 | 2 | Tobias Brunner | Printer Working Group (PWG), see [[HCD-IMC]] and [[HCD-IMV]]. |
44 | 2 | Tobias Brunner | |
45 | 2 | Tobias Brunner | * Fixed IF-M segmentation which failed in the presence of multiple small attributes in front |
46 | 2 | Tobias Brunner | of a huge attribute to be segmented (commit:10f25a3dd9). |
47 | 2 | Tobias Brunner | |
48 | 2 | Tobias Brunner | * Refcounting for allocated reqids has been fixed for situations where make-before-break |
49 | 2 | Tobias Brunner | reauthentication is used and CHILD_SAs have already been rekeyed (commit:3665adef19). |
50 | 2 | Tobias Brunner | |
51 | 2 | Tobias Brunner | * Fixed a crash when retrying CHILD_SA rekeying due to a DH group mismatch (commit:1729df9275). |
52 | 2 | Tobias Brunner | |
53 | 2 | Tobias Brunner | * If multiple CA certificates are set in [[swanctl.conf]] (_connections.<conn>.remote<suffix>.cacerts_) |
54 | 2 | Tobias Brunner | it is now enough if the certificate chain contains at least one of them, not all (commit:774c8c3847). |
55 | 2 | Tobias Brunner | |
56 | 2 | Tobias Brunner | * Referring to a CA certificate in [[ipsecdirectorycacerts|ipsec.d/cacerts]] in a [[CaSection|ca section]] does not cause duplicate |
57 | 2 | Tobias Brunner | certificate requests anymore (was the case since version:5.3.0, #842-10). CA certificates are |
58 | 2 | Tobias Brunner | now atomically reloaded by [[Ipseccommand#Reread-Commands|ipsec rereadcacerts]] so unchanged certificates are always |
59 | 2 | Tobias Brunner | available. The command now also reloads certificates referenced in CA sections. |
60 | 2 | Tobias Brunner | |
61 | 2 | Tobias Brunner | * Inbound IKEv1 messages are now handled with different job priorities (commit:a5c07be058). |
62 | 2 | Tobias Brunner | |
63 | 2 | Tobias Brunner | * When strongSwan creates ASN.1 DN identities from strings, it now uses UTF8String |
64 | 2 | Tobias Brunner | instead of T61String to encode RDNs that contain characters outside the character set |
65 | 2 | Tobias Brunner | of PrintableString. |
66 | 2 | Tobias Brunner | |
67 | 2 | Tobias Brunner | * The new [[ipsecpkidn|pki --dn]] command extracts subject DistinguishedNames from certificates, |
68 | 2 | Tobias Brunner | which is useful if the [[IdentityParsing|automatic identity parsing]] is unable to produce the correct |
69 | 2 | Tobias Brunner | binary ASN.1 encoding of the DN from its string representation. |
70 | 2 | Tobias Brunner | |
71 | 2 | Tobias Brunner | * To implement IPv6 NDP proxying via [[updown]] script (e.g. via @ip -6 neigh add proxy@) |
72 | 2 | Tobias Brunner | the virtual IPs assigned to a client are now passed to the script (#1008). |
73 | 2 | Tobias Brunner | |
74 | 2 | Tobias Brunner | * RADIUS Accounting Start messages are now correctly triggered for IKEv1 SAs when clients |
75 | 2 | Tobias Brunner | don't do any Mode Config or XAuth exchanges during reauthentication (#937). |
76 | 2 | Tobias Brunner | |
77 | 2 | Tobias Brunner | * Support for the Framed-IPv6-Address and DNS-Server-IPv6-Address RADIUS attributes has |
78 | 2 | Tobias Brunner | been added. Virtual IPv6 addresses are now sent in Framed-IPv6-Address attributes in |
79 | 2 | Tobias Brunner | RADIUS Accounting messages (#1001). |
80 | 2 | Tobias Brunner | |
81 | 2 | Tobias Brunner | * Some fixes went into the [[HighAvailability|HA plugin]] and related code: The jhash() function was updated |
82 | 2 | Tobias Brunner | for Linux 4.1+ (commit:93caf23e1b), NAT keepalives (commit:edaba56ec7) and CHILD_SA rekeying |
83 | 2 | Tobias Brunner | (commit:e095d87bb6) are now disabled for passive SAs, and the remote address is synced |
84 | 2 | Tobias Brunner | when an SA is first added (commit:3434709460). Also, the use of AEAD algorithms in CHILD_SAs |
85 | 2 | Tobias Brunner | has been fixed (#1051) and the control FIFO is recreated if it is no FIFO (commit:fffee7c759). |
86 | 2 | Tobias Brunner | |
87 | 2 | Tobias Brunner | * The buffer size for the Netlink receive buffer has been changed, the default is now the same |
88 | 2 | Tobias Brunner | as in the kernel (commit:a6896b6149, commit:197de6e66b). |
89 | 2 | Tobias Brunner | |
90 | 2 | Tobias Brunner | * In particular for hosts with lots of routes an alternative faster source address lookup may be |
91 | 2 | Tobias Brunner | used by setting _charon.plugins.kernel-netlink.fwmark=!<mark>_ (commit:6bd1216e7a). |
92 | 2 | Tobias Brunner | |
93 | 2 | Tobias Brunner | * The _kernel-pfkey_ plugin now can configure AES-GCM, which is supported on FreeBSD 11. |
94 | 2 | Tobias Brunner | |
95 | 2 | Tobias Brunner | * Fixed some potential race conditions during shutdown of the daemon (#1014). |
96 | 2 | Tobias Brunner | |
97 | 2 | Tobias Brunner | * Address resolution has been improved: If a local address is configured we use the same |
98 | 2 | Tobias Brunner | address family when resolving the remote address (#993). If the remote address resolves |
99 | 2 | Tobias Brunner | to %any during reauthentication or when reestablishing an SA we keep the current |
100 | 2 | Tobias Brunner | address (#1027). |
101 | 2 | Tobias Brunner | |
102 | 2 | Tobias Brunner | * A new option allows disabling the side-swapping based on the addresses/hostnames in |
103 | 2 | Tobias Brunner | _left|right_, when the _stroke_ plugin loads a config from [[ipsec.conf]]. |