Version 5.6.2 » History » Version 2
« Previous -
Version 2/5
(diff) -
Next » -
Current version
Tobias Brunner, 13.02.2018 15:24
News for 5.6.2
Version 5.6.2¶
- When rekeying IKEv2 IKE_SAs the previously negotiated DH group will be reused, instead of using
the first configured group, which avoids an additional exchange if the peer previously selected a
different DH group viaINVALID_KE_PAYLOAD
notify. The same is also done when rekeying CHILD_SAs
except for the first rekeying of the CHILD_SA that was created with the IKE_SA, where no DH group
was negotiated yet.
Also, the selected DH group is moved to the front in all proposals that contain it and all proposals
that don't are moved to the back in order to convey the preference for this group to the peer.
- Handling of MOBIKE task queuing has been improved. In particular, the response to an address update
(with NAT-D payloads) is not ignored anymore if only an address list update or DPD is queued as that
could prevent updating the UDP encapsulation in the kernel.
- On Linux, roam events may optionally be triggered by changes to the routing rules, which can be
useful if routing rules (instead of e.g. route metrics) are used to switch from one to another
interface (i.e. from one to another routing table). Since routing rules are currently not evaluated
when doing route lookups this is only useful if the kernel-based route lookup is used (commit:4664992f7d).
- The fallback drop policies installed to avoid traffic leaks when replacing addresses in installed policies
are now replaced by temporary drop policies, which also prevent acquires because we currently delete and
reinstall IPsec SAs to update their addresses (commit:35ef1b032d).
- Access X.509 certificates held in non-volatile storage of a TPM 2.0 referenced via the NV index.
- Adding the --keyid parameter to pki --print allows to print private keys or certificates stored in a
smartcard or a TPM 2.0.
- Fixed proposal selection if a DH group is configured in the local ESP proposal and
charon.prefer_configured_proposals is disabled (commit:d058fd3c32).
- The lookup for PSK secrets for IKEv1 has been improved for certain scenarios (see #2497 for details).
- MSKs received via RADIUS are now padded to 64 bytes to avoid compatibility issues with EAP-MSCHAPv2
and PRFs that have a block size < 64 bytes (e.g. AES-XCBC-PRF-128, see commit:73cbce6013).
- The
tpm_extendpcr
command line tool extends a digest into a TPM PCR.
- Ported the NetworkManager backend from the deprecated libnm-glib to libnm.