Minor Release


11 issues   (11 closed — 0 open)

Version 5.6.2

  • Fixed a DoS vulnerability in the parser for PKCS#1 RSASSA-PSS signatures that was caused by insufficient
    input validation. One of the configurable parameters in algorithm identifier structures for RSASSA-PSS
    signatures is the mask generation function (MGF). Only MGF1 is currently specified for this purpose.
    However, this in turn takes itself a parameter that specifies the underlying hash function. strongSwan's
    parser did not correctly handle the case of this parameter being absent, causing an undefined data read.
    This vulnerability has been registered as CVE-2018-6459.
    Please refer to our blog for details.
  • When rekeying IKEv2 IKE_SAs the previously negotiated DH group will be reused, instead of using
    the first configured group, which avoids an additional exchange if the peer previously selected a
    different DH group via INVALID_KE_PAYLOAD notify. The same is also done when rekeying CHILD_SAs
    except for the first rekeying of the CHILD_SA that was created with the IKE_SA, where no DH group
    was negotiated yet.
    Also, the selected DH group is moved to the front in all sent proposals that contain it and all proposals
    that don't are moved to the back in order to convey the preference for this group to the peer.
  • Handling of MOBIKE task queuing has been improved. In particular, the response to an address update
    (with NAT-D payloads) is not ignored anymore if only an address list update or DPD is queued as that
    could prevent updating the UDP encapsulation in the kernel.
  • On Linux, roam events may optionally be triggered by changes to the routing rules, which can be
    useful if routing rules (instead of e.g. route metrics) are used to switch from one to another
    interface (i.e. from one to another routing table). Since routing rules are currently not evaluated
    when doing route lookups this is only useful if the kernel-based route lookup is used (4664992f7d).
  • The fallback drop policies installed to avoid traffic leaks when replacing addresses in installed policies
    are now replaced by temporary drop policies, which also prevent acquires because we currently delete and
    reinstall IPsec SAs to update their addresses (35ef1b032d).
  • Access X.509 certificates held in non-volatile storage of a TPM 2.0 referenced via the NV index.
  • Adding the --keyid parameter to pki --print allows to print private keys or certificates stored in a
    smartcard or a TPM 2.0.
  • Fixed proposal selection if a peer incorrectly sends DH groups in the ESP proposal during IKE_AUTH and
    also if a DH group is configured in the local ESP proposal and charon.prefer_configured_proposals is
    disabled (d058fd3c32).
  • The lookup for PSK secrets for IKEv1 has been improved for certain scenarios (see #2497 for details).
  • MSKs received via RADIUS are now padded to 64 bytes to avoid compatibility issues with EAP-MSCHAPv2
    and PRFs that have a block size < 64 bytes (e.g. AES-XCBC-PRF-128, see 73cbce6013).
  • The tpm_extendpcr command line tool extends a digest into a TPM PCR.
  • Ported the NetworkManager backend from the deprecated libnm-glib to libnm.
  • The save-keys debugging/development plugin saves IKE and/or ESP keys to files compatible with Wireshark.
Issues by