Project

General

Profile

Version 5.3.3 » History » Version 2

Tobias Brunner, 07.09.2015 11:22

1 1 Tobias Brunner
h1. Version 5.3.3
2 1 Tobias Brunner
3 2 Tobias Brunner
* Added support for the ChaCha20/Poly1305 AEAD cipher specified in "RFC 7539":https://tools.ietf.org/html/rfc7539 and
4 2 Tobias Brunner
  "RFC 7634":https://tools.ietf.org/html/rfc7634 using the _chacha20poly1305_ [[IKEv2CipherSuites|ike/esp proposal keyword]].
5 2 Tobias Brunner
  The new _chapoly_ plugin implements the cipher, if possible SSE-accelerated on x86/x64
6 2 Tobias Brunner
  architectures. It is usable both in IKEv2 and the strongSwan _libipsec_ ESP backend.
7 2 Tobias Brunner
  On Linux 4.2 or newer the _kernel-netlink_ plugin can configure the cipher for ESP SAs.
8 2 Tobias Brunner
9 2 Tobias Brunner
* The [[vici]]/[[swanctl]] interface now supports the configuration of auxiliary certification
10 2 Tobias Brunner
  authority information as CRL and OCSP URIs.
11 2 Tobias Brunner
 
12 2 Tobias Brunner
* In the [[bliss]] plugin the c_indices derivation using a SHA-512 based random oracle
13 2 Tobias Brunner
  has been fixed, generalized and standardized by employing the MGF1 mask generation
14 2 Tobias Brunner
  function with SHA-512. As a consequence BLISS signatures unsing the improved oracle
15 2 Tobias Brunner
  are not compatible with the earlier implementation.
16 2 Tobias Brunner
17 2 Tobias Brunner
* Support for _auto=route_ with _right=%any_ for transport mode connections has been
18 2 Tobias Brunner
  added (refer to #196-6 for details and some examples).
19 2 Tobias Brunner
20 2 Tobias Brunner
* The starter daemon does not flush IPsec policies and SAs anymore when it is stopped.
21 2 Tobias Brunner
  Already existing duplicate policies are now overwritten by the IKE daemon when it
22 2 Tobias Brunner
  installs its policies (commit:695112d7b8, commit:dc2fa791e4).  Usually, there shouldn't be any
23 2 Tobias Brunner
  leftovers after the IKE daemon has been properly terminated, but if it crashes the kernel
24 2 Tobias Brunner
  state won't be cleaned up.  Because earlier releases couldn't handle already existing
25 2 Tobias Brunner
  duplicate policies in the kernel, the starter daemon flushed them during shutdown so
26 2 Tobias Brunner
  the daemon would find a clean slate when was restarted.  Since existing policies are not
27 2 Tobias Brunner
  a problem anymore this is no longer necessary.  And in situations where _installpolicies=no_
28 2 Tobias Brunner
  is used policies shouldn't be flushed blindly anyway.
29 2 Tobias Brunner
30 2 Tobias Brunner
* [[JobPriority#IKE_SA_INIT-dropping|Init limits]] can now optionally be enforced when initiating SAs via [[VICI]]. For this IKE_SAs
31 2 Tobias Brunner
  initiated by the daemon are now also counted as half-open SAs, which, as a side-effect,
32 2 Tobias Brunner
  fixes the status output while connecting (e.g. in [[ipseccommand|ipsec status]]).
33 2 Tobias Brunner
34 2 Tobias Brunner
* Symmetric configuration of EAP methods in left|rightauth is now possible when mutual
35 2 Tobias Brunner
  EAP-only authentication is used (previously, the client had to configure _rightauth=eap_
36 2 Tobias Brunner
  or rightauth=any, which prevented it from using this same config as responder).
37 2 Tobias Brunner
38 2 Tobias Brunner
* The initiator flag in the IKEv2 header is compared again (wasn't the case since version:5.0.0) and
39 2 Tobias Brunner
  packets that have the flag set incorrectly are again ignored (commit:47a340e1f7, commit:5fee79d854).
40 2 Tobias Brunner
41 2 Tobias Brunner
* Implemented a demo Hardcopy Device IMC/IMV pair based on the "Hardcopy Device Health
42 2 Tobias Brunner
  Assessment Trusted Network Connect Binding" (HCD-TNC) document drafted by the IEEE
43 2 Tobias Brunner
  Printer Working Group (PWG), see [[HCD-IMC]] and [[HCD-IMV]].
44 2 Tobias Brunner
45 2 Tobias Brunner
* Fixed IF-M segmentation which failed in the presence of multiple small attributes in front
46 2 Tobias Brunner
  of a huge attribute to be segmented (commit:10f25a3dd9).
47 2 Tobias Brunner
48 2 Tobias Brunner
* Refcounting for allocated reqids has been fixed for situations where make-before-break
49 2 Tobias Brunner
  reauthentication is used and CHILD_SAs have already been rekeyed (commit:3665adef19).
50 2 Tobias Brunner
51 2 Tobias Brunner
* Fixed a crash when retrying CHILD_SA rekeying due to a DH group mismatch (commit:1729df9275).
52 2 Tobias Brunner
53 2 Tobias Brunner
* If multiple CA certificates are set in [[swanctl.conf]] (_connections.<conn>.remote<suffix>.cacerts_)
54 2 Tobias Brunner
  it is now enough if the certificate chain contains at least one of them, not all (commit:774c8c3847).
55 2 Tobias Brunner
56 2 Tobias Brunner
* Referring to a CA certificate in [[ipsecdirectorycacerts|ipsec.d/cacerts]] in a [[CaSection|ca section]] does not cause duplicate
57 2 Tobias Brunner
  certificate requests anymore (was the case since version:5.3.0, #842-10).  CA certificates are
58 2 Tobias Brunner
  now atomically reloaded by [[Ipseccommand#Reread-Commands|ipsec rereadcacerts]] so unchanged certificates are always
59 2 Tobias Brunner
  available. The command now also reloads certificates referenced in CA sections.
60 2 Tobias Brunner
61 2 Tobias Brunner
* Inbound IKEv1 messages are now handled with different job priorities (commit:a5c07be058).
62 2 Tobias Brunner
63 2 Tobias Brunner
* When strongSwan creates ASN.1 DN identities from strings, it now uses UTF8String
64 2 Tobias Brunner
  instead of T61String to encode RDNs that contain characters outside the character set
65 2 Tobias Brunner
  of PrintableString.
66 2 Tobias Brunner
67 2 Tobias Brunner
* The new [[ipsecpkidn|pki --dn]] command extracts subject DistinguishedNames from certificates,
68 2 Tobias Brunner
  which is useful if the [[IdentityParsing|automatic identity parsing]] is unable to produce the correct
69 2 Tobias Brunner
  binary ASN.1 encoding of the DN from its string representation.
70 2 Tobias Brunner
71 2 Tobias Brunner
* To implement IPv6 NDP proxying via [[updown]] script (e.g. via @ip -6 neigh add proxy@)
72 2 Tobias Brunner
  the virtual IPs assigned to a client are now passed to the script (#1008).
73 2 Tobias Brunner
74 2 Tobias Brunner
* RADIUS Accounting Start messages are now correctly triggered for IKEv1 SAs when clients
75 2 Tobias Brunner
  don't do any Mode Config or XAuth exchanges during reauthentication (#937).
76 2 Tobias Brunner
77 2 Tobias Brunner
* Support for the Framed-IPv6-Address and DNS-Server-IPv6-Address RADIUS attributes has
78 2 Tobias Brunner
  been added. Virtual IPv6 addresses are now sent in Framed-IPv6-Address attributes in
79 2 Tobias Brunner
  RADIUS Accounting messages (#1001).
80 2 Tobias Brunner
81 2 Tobias Brunner
* Some fixes went into the [[HighAvailability|HA plugin]] and related code: The jhash() function was updated
82 2 Tobias Brunner
  for Linux 4.1+ (commit:93caf23e1b), NAT keepalives (commit:edaba56ec7) and CHILD_SA rekeying
83 2 Tobias Brunner
  (commit:e095d87bb6) are now disabled for passive SAs, and the remote address is synced
84 2 Tobias Brunner
  when an SA is first added (commit:3434709460).  Also, the use of AEAD  algorithms in CHILD_SAs
85 2 Tobias Brunner
  has been fixed (#1051) and the control FIFO is recreated if it is no FIFO (commit:fffee7c759).
86 2 Tobias Brunner
87 2 Tobias Brunner
* The buffer size for the Netlink receive buffer has been changed, the default is now the same
88 2 Tobias Brunner
  as in the kernel (commit:a6896b6149, commit:197de6e66b).
89 2 Tobias Brunner
90 2 Tobias Brunner
* In particular for hosts with lots of routes an alternative faster source address lookup may be
91 2 Tobias Brunner
  used by setting _charon.plugins.kernel-netlink.fwmark=!<mark>_ (commit:6bd1216e7a).
92 2 Tobias Brunner
93 2 Tobias Brunner
* The _kernel-pfkey_ plugin now can configure AES-GCM, which is supported on FreeBSD 11.
94 2 Tobias Brunner
95 2 Tobias Brunner
* Fixed some potential race conditions during shutdown of the daemon (#1014).
96 2 Tobias Brunner
97 2 Tobias Brunner
* Address resolution has been improved: If a local address is configured we use the same
98 2 Tobias Brunner
  address family when resolving the remote address (#993).  If the remote address resolves
99 2 Tobias Brunner
  to %any during reauthentication or when reestablishing an SA we keep the current
100 2 Tobias Brunner
  address (#1027).
101 2 Tobias Brunner
102 2 Tobias Brunner
* A new option allows disabling the side-swapping based on the addresses/hostnames in
103 2 Tobias Brunner
  _left|right_, when the _stroke_ plugin loads a config from [[ipsec.conf]].