strongswan 5.9.5-2ubuntu1 source package in Ubuntu
Changelog
strongswan (5.9.5-2ubuntu1) jammy; urgency=medium * Merge with Debian unstable. Remaining changes: - d/control: strongswan-starter hard-depends on strongswan-charon, therefore bump the dependency from Recommends to Depends. At the same time avoid a circular dependency by dropping strongswan-charon->strongswan-starter from Depends to Recommends as the binaries can work without the services but not vice versa. - re-add post-quantum encryption algorithm (NTRU) (LP #1863749) + d/control: mention plugins in package description + d/rules: enable ntru at build time + d/libstrongswan-extra-plugins.install: ship config and shared objects - Re-enable eap-{dynamic,peap} libcharon plugins (LP: 1878887) + d/control: update libcharon-extra-plugins description. + d/libcharon-extra-plugins.install: install .so and conf files. + d/rules: add plugins to the configuration arguments. - Remove conf files of plugins removed from libcharon-extra-plugins + The conf file of the following plugins were removed: eap-aka-3gpp2, eap-sim-file, eap-sim-pcsc, eap-sim, eap-simaka-pseudonym, eap-simaka-reauth, eap-simaka-sql, xauth-noauth. + Created d/libcharon-extra-plugins.maintscript to handle the removals properly. * Dropped patches included in new version: - debian/patches/CVE-2021-45079.patch - debian/patches/load-legacy-provider-in-openssl3.patch strongswan (5.9.5-2) unstable; urgency=medium * actually fix lintian overrides strongswan (5.9.5-1) unstable; urgency=medium * New upstream version 5.9.5 - eap-authenticator: Enforce failure if MSK generation fails Fix incorrect handling of Early EAP-Success Messages (CVE-2021-45079) * update lintian overrides to match RUNPATH -- Marc Deslauriers <email address hidden> Thu, 03 Feb 2022 10:49:49 -0500
Upload details
- Uploaded by:
- Marc Deslauriers
- Uploaded to:
- Jammy
- Original maintainer:
- Ubuntu Developers
- Architectures:
- any all
- Section:
- net
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
strongswan_5.9.5.orig.tar.bz2 | 4.5 MiB | 983e4ef4a4c6c9d69f5fe6707c7fe0b2b9a9291943bbf4e008faab6bf91c0bdd |
strongswan_5.9.5.orig.tar.bz2.asc | 659 bytes | 0421035baa56dbdd04ca969777463e0469804202d2848e151d94844415b36a5d |
strongswan_5.9.5-2ubuntu1.debian.tar.xz | 125.1 KiB | e1003d8030fe8d2361370da7848ef96108cb7d2920fd293532ac1fb3fa9da4e3 |
strongswan_5.9.5-2ubuntu1.dsc | 3.6 KiB | 5c00102e6dc5df0438b0eec208393f5364962a138c7b4794dbe1f350562c741a |
Available diffs
- diff from 5.9.4-1ubuntu4 to 5.9.5-2ubuntu1 (146.0 KiB)
Binary packages built by this source
- charon-cmd: standalone IPsec client
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
This package contains the charon-cmd command, which can be used as a client to
connect to a remote IKE daemon.
- charon-cmd-dbgsym: debug symbols for charon-cmd
- charon-systemd: strongSwan IPsec client, systemd support
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
This package contains the charon-systemd files.
- charon-systemd-dbgsym: debug symbols for charon-systemd
- libcharon-extauth-plugins: strongSwan charon library (extended authentication plugins)
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
This package provides extended authentication plugins for the charon library:
- eap-mschapv2 (EAP-MSCHAPv2 protocol handler using passwords/NT hashes)
Used for client side to connect to some VPN concentrators configured for
Windows 7+ and modern OSX/iOS using IKEv2 (identify with public key,
authenticate with MSCHAPv2).
- xauth-generic (Generic XAuth backend that provides passwords from
ipsec.secrets and other credential sets)
Used for the client side to connect to VPN concentrators configured for
Android and older OSX/iOS using IKEv1 and XAUTH (identify with public key,
authenticate with XAUTH password).
.
These are the "not always, but still more commonly used" plugins, for further
needs even more plugins can be found in the package libcharon-extra-plugins.
- libcharon-extauth-plugins-dbgsym: debug symbols for libcharon-extauth-plugins
- libcharon-extra-plugins: strongSwan charon library (extra plugins)
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
This package provides extra plugins for the charon library:
- addrblock (Narrow traffic selectors to RFC 3779 address blocks in X.509
certificates)
- certexpire (Export expiration dates of used certificates)
- eap-aka (Generic EAP-AKA protocol handler using different backends)
- eap-gtc (EAP-GTC protocol handler authenticating with XAuth backends)
- eap-identity (EAP-Identity identity exchange algorithm, to use with other
EAP protocols)
- eap-md5 (EAP-MD5 protocol handler using passwords)
- eap-radius (EAP server proxy plugin forwarding EAP conversations to a
RADIUS server)
- eap-tls (EAP-TLS protocol handler, to authenticate with certificates in
EAP)
- eap-tnc (EAP-TNC protocol handler, Trusted Network Connect in a TLS tunnel)
- eap-ttls (EAP-TTLS protocol handler, wraps other EAP methods securely)
- error-notify (Notification about errors via UNIX socket)
- ha (High-Availability clustering)
- kernel-libipsec (Userspace IPsec Backend with TUN devices)
- led (Let Linux LED subsystem LEDs blink on IKE activity)
- lookip (Virtual IP lookup facility using a UNIX socket)
- tnc (Trusted Network Connect)
- unity (Cisco Unity extensions for IKEv1)
- xauth-eap (XAuth backend that uses EAP methods to verify passwords)
- xauth-pam (XAuth backend that uses PAM modules to verify passwords)
- eap-dynamic (EAP proxy plugin that dynamically selects an EAP method
requested/supported by the client (since 5.0.1))
- eap-peap (EAP-PEAP protocol handler, wraps other EAP methods securely)
- libcharon-extra-plugins-dbgsym: debug symbols for libcharon-extra-plugins
- libstrongswan: strongSwan utility and crypto library
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
This package provides the underlying libraries of charon and other strongSwan
components. It is built in a modular way and is extendable through various
plugins.
.
Some default (as specified by the strongSwan projet) plugins are included.
For libstrongswan (cryptographic backends, URI fetchers and database layers):
- aes (AES-128/192/256 cipher software implementation)
- constraints (X.509 certificate advanced constraint checking)
- dnskey (Parse RFC 4034 public keys)
- drbg (NIST SP-800-90A Deterministic Random Bit Generator)
- fips-prf (PRF specified by FIPS, used by EAP-SIM/AKA algorithms)
- gmp (RSA/DH crypto backend based on libgmp)
- hmac (HMAC wrapper using various hashers)
- md5 (MD5 hasher software implementation)
- mgf1 (Mask Generation Functions based on the SHA-1, SHA-256 and SHA-512)
- nonce (Default nonce generation plugin)
- pem (PEM encoding/decoding routines)
- pgp (PGP encoding/decoding routines)
- pkcs1 (PKCS#1 encoding/decoding routines)
- pkcs8 (PKCS#8 decoding routines)
- pkcs12 (PKCS#12 decoding routines)
- pubkey (Wrapper to handle raw public keys as trusted certificates)
- random (RNG reading from /dev/[u]random)
- rc2 (RC2 cipher software implementation)
- revocation (X.509 CRL/OCSP revocation checking)
- sha1 (SHA1 hasher software implementation)
- sha2 (SHA256/SHA384/ SHA512 hasher software implementation)
- sshkey (SSH key decoding routines)
- x509 (Advanced X.509 plugin for parsing/generating X.509 certificates/CRLs
and OCSP messages)
- xcbc (XCBC wrapper using various ciphers)
- attr (Provides IKE attributes configured in strongswan.conf)
- kernel-netlink [linux] (IPsec/Networking kernel interface using Linux
Netlink)
- kernel-pfkey [kfreebsd] (IPsec kernel interface using PF_KEY)
- kernel-pfroute [kfreebsd] (Networking kernel interface using PF_ROUTE)
- resolve (Writes name servers received via IKE to a resolv.conf file or
installs them via resolvconf(8))
- libstrongswan-dbgsym: debug symbols for libstrongswan
- libstrongswan-extra-plugins: strongSwan utility and crypto library (extra plugins)
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
This package provides extra plugins for the strongSwan utility and
cryptographic library.
.
Included plugins are:
- af-alg [linux] (AF_ALG Linux crypto API interface, provides
ciphers/hashers/ hmac/xcbc)
- ccm (CCM cipher mode wrapper)
- cmac (CMAC cipher mode wrapper)
- ctr (CTR cipher mode wrapper)
- curl (libcurl based HTTP/FTP fetcher)
- curve25519 (support for Diffie-Hellman group 31 using Curve25519 and
support for the Ed25519 digital signature algorithm for IKEv2)
- gcrypt (Crypto backend based on libgcrypt, provides
RSA/DH/ciphers/ hashers/ rng)
- ldap (LDAP fetching plugin based on libldap)
- ntru (key exchanged based on post-quantum computer NTRU)
- padlock (VIA padlock crypto backend, provides AES128/SHA1)
- pkcs11 (PKCS#11 smartcard backend)
- rdrand (High quality / high performance random source using the Intel
rdrand instruction found on Ivy Bridge processors)
- test-vectors (Set of test vectors for various algorithms)
.
Also included is the libtpmtss library adding support for TPM plugin
(https://wiki.strongswa n.org/projects/ strongswan/ wiki/TpmPlugin)
- libstrongswan-extra-plugins-dbgsym: debug symbols for libstrongswan-extra-plugins
- libstrongswan-standard-plugins: strongSwan utility and crypto library (standard plugins)
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
This package provides some common plugins for the strongSwan utility and
cryptograhic library.
.
Included plugins are:
- agent (RSA/ECDSA private key backend connecting to SSH-Agent)
- gcm (GCM cipher mode wrapper)
- openssl (Crypto backend based on OpenSSL, provides
RSA/ECDSA/DH/ ECDH/ciphers/ hashers/ HMAC/X. 509/CRL/ RNG)
- libstrongswan-standard-plugins-dbgsym: debug symbols for libstrongswan-standard-plugins
- strongswan: IPsec VPN solution metapackage
The strongSwan VPN suite uses the native IPsec stack in the standard Linux
kernel. It supports both the IKEv1 and IKEv2 protocols.
.
This metapackage installs the packages required to maintain IKEv1 and IKEv2
connections via ipsec.conf or ipsec.secrets.
- strongswan-charon: strongSwan Internet Key Exchange daemon
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
charon is an IPsec IKEv2 daemon which can act as an initiator or a responder.
It is written from scratch using a fully multi-threaded design and a modular
architecture. Various plugins can provide additional functionality.
- strongswan-charon-dbgsym: debug symbols for strongswan-charon
- strongswan-libcharon: strongSwan charon library
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
This package contains the charon library, used by IKE client like
strongswan-charon, strongswan-charon- cmd or strongswan-nm as well as standard
plugins:
- socket-default
- counters
- bypass-lan (disabled by default)
.
On Linux, it also contains the xfrmi binary which can be used on Linux 4.19+
to create XFRM interfaces (for more information, see
https://wiki.strongswa n.org/projects/ strongswan/ wiki/RouteBased VPN)
- strongswan-libcharon-dbgsym: debug symbols for strongswan-libcharon
- strongswan-nm: strongSwan plugin to interact with NetworkManager
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
This plugin provides an interface which allows NetworkManager to configure
and control the IKEv2 daemon directly through D-Bus. It is designed to work
in conjunction with the network-manager- strongswan package, providing
a simple graphical frontend to configure IPsec based VPNs.
- strongswan-nm-dbgsym: debug symbols for strongswan-nm
- strongswan-pki: strongSwan IPsec client, pki command
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
This package contains the pki tool which allows on to run a simple public key
infrastructure.
- strongswan-pki-dbgsym: debug symbols for strongswan-pki
- strongswan-scepclient: strongSwan IPsec client, SCEP client
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
This package contains the SCEP client, an implementation of the Cisco System's
Simple Certificate Enrollment Protocol (SCEP).
- strongswan-scepclient-dbgsym: debug symbols for strongswan-scepclient
- strongswan-starter: strongSwan daemon starter and configuration file parser
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
The starter and the associated "ipsec" script control the charon daemon from
the command line. It parses ipsec.conf and loads the configurations to the
daemon.
- strongswan-starter-dbgsym: debug symbols for strongswan-starter
- strongswan-swanctl: strongSwan IPsec client, swanctl command
The strongSwan VPN suite uses the native IPsec stack in the standard
Linux kernel. It supports both the IKEv1 and IKEv2 protocols.
.
This package contains the swanctl interface, used to configure a running
charon daemon
- strongswan-swanctl-dbgsym: debug symbols for strongswan-swanctl