⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 changes

📁 ike协商阶段证书认证补丁 for freeswan
💻
📖 第 1 页 / 共 3 页
字号:
    "http": 160.85.106.10[@pulpo.strongsec.com]:6/80...%any:6/0  When an instance of these connection definitions is set up,  the corresponding eroutes are created automatically. The remaining  protocols and ports are either dropped by default or can be passed  in the clear outside the tunnel by setting up appropriate eroutes  manually (see Stephen's README.selectors for details).- Fixed a bug in the _updown.x509 script that uses iptables to  set up dynamical firewall rules supporting port and protocol  based filtering.Version 0.9.15--------------- For security reasons the shell metacharacters ', ", `, $, and \  are replaced by their octal escape values in the environment variables  $PLUTO_MY_ID and $PLUTO_PEER_ID that are made available in the  _updown script.Version 0.9.14--------------- In a connection definition an IP protocol and optionally  the source and/or destination ports can be specified. Example:  conn dhcp       right=%any       rightprotoport=udp/bootpc       left=%defaultroute       leftid=@pluto.strongsec.com       leftsubnet=0.0.0.0/0  #allows DHCP discovery broadcast       leftprotoport=udp/bootps       rekey=no       keylife=20s       rekeymargin=10s       auto=add  ipsec auto -status shows the following connection definition: "dhcp": 0.0.0.0/0===160.85.106.10[@pulpo.strongsec.com]:17/67...%any:17/68  Important: KLIPS does not enforce these protocol/port restrictions so  that always the whole IP traffic is tunneled! Currently the protoport  parameter can be used as directions for an ipchains or iptables based  firewall, only. By means of the new environment variables $PLUTO_MY_PROTOCOL,  $PLUTO_PEER_PROTOCOL, $PLUTO_MY_PORT, and $PLUTO_PEER_PORT, dynamical  firewall rules can be set up and released in a customized updown script  (see next point below).- The template utils/_updown.x509 can be used to dynamically insert and  delete firewall rules using iptables. The script also includes a facility  to log all established or disbanded VPN connections in a concise format.- The new parameter "strictcrlpolicy" enforces a strict CRL policy.  With the ipsec.conf setting  config setup       strictcrlpolicy=yes  a received peer certificate will not be accepted if the corresponding  CRL is either not found in /etc/ipsec.d/crls or if the nextUpdate  date of the current CRL is reached and no new CRL has been made  available. Please be aware of the severe consequences of setting  strictcrlpolicy=yes. All connections will come to a sudden standstill  if you forget to update the CRL in time. The default setting is  strictcrlpolicy=no.- The monitoring commands ipsec auto --listcerts | --listcacerts  now additionally list the size and the keyid of the RSA public key  contained in the certificate. The listing also indicates the possession  of a matching RSA private key.Version 0.9.13--------------- Bug fix: whack --debug-raw | --debug-crypt | --debug-parsing |                 --debug-emitting | --debug-control | --debug-klips |                 --debug-dns | --debug-private  caused a segmentation fault because more than 64 different command  line options had to be supported. This has been fixed by rising the  number of possible options to 128.Version 0.9.12--------------- Good news for network administrators who must manage dozens  of roadwarriors behind NAT boxes with IPsec passthrough. Instead  of defining each connection individually    conn rw1  	right=%any	rightsubnet=10.0.1.5/32   conn rw2 	right=%any	rightsubnet=10.0.1.42/32   a single connection definition is now sufficient to handle   Virtual IPs:  conn rw  	right=%any	rightsubnetwithin=10.0.1.0/24  This feature has been developed by Mario Strasser and is a first  step towards full support of the "DHCP-over-IPsec" internet draft.- Good news for user who run both X.509 based tunnels  and connections to unpatched FreeS/WAN peers requiring  raw RSA keys. With the new parameter 'nocrsend' in  the config setup section of ipsec.conf    config setup:  	nocrsend=yes  no X.509 certificate requests will be sent to the peers.  Standard FreeS/WAN boxes are known to choke on certificate  requests and also PGPnet when run with OpenPGP certificates  will panic when it gets a X.509 CR. The nocrsend=yes setting  will help in both cases. The default setting is nocrsend=no.- The comparison of two distinguished names (DNs) has been refined.  Boths DNs are now split into their set of relative distinguished  names (RDNs). The individual RDN strings are then compared with  each other irrespective of the ASN.1 string type they were coded  in. If both RDNs are of ASN.1 type printableString which is usually  the case when no special characters are used then the strings  will be converted to upper case before comparison. The same applies  to an IA5String-coded Email field. One restriction remains:  The relative order of the RDNs must be the same in both DNs.  This fix will help e.g. with X.509 certificates based on certificate  requests issued by SSH Sentinel v3.x. Due to a different encoding  of RDNs containing special characters, valid connection definitions  could not be found by  Pluto.- "make install" now creates the /etc/ipsec.d directory and its  sub directories cacerts, crls, and private. This feature was  announced for version 0.9.10 but somehow got lost in the  final patch.Version 0.9.11--------------- When multi-tier X.509 hierarchical trust chains are used,  Windows XP sends its certificate plus any intermediate CA  certificates wrapped in a PKCS#7 signedData structure.  Pluto is now able to parse received certificates of type  CERT_PKCS7_WRAPPED_X509. In a first step all intermediate  CA certificates are added to the chained list of cacerts  rejecting self-signed root CA certificates. In a second  step the host or user certificate contained in the PKCS#7  structure is verified along the trust chain up to the  self-signed root CA certificate which must be present  in /etc/ipsec.d/cacerts and which is loaded statically  when Pluto starts up.- The monitoring functions ipsec auto --listcerts, --listcacerts  and --listcrls now also feature a timestamp logging  the exact time when a certificate or CRL was last loaded.Version 0.9.10--------------- Multiple certificates and corresponding multiple private keys  for the local FreeS/WAN host are now supported. Assuming that the  local side is "left", the parameter leftcert= indicates the  certificate to be sent to the peer.  A leftcert entry in the conn %default section provides a default  certificate so that /etc/x509cert.der is not needed anymore.  Examples:  conn %default       left=%defaultroute       leftcert=myCert1.pem  conn rw1       right=%any       rightid=@peer1.domain1       # leftid is the DN of myCert1  conn rw2       right=%any       rightid=@peer2.domain2       leftcert=myCert2.pem       # leftid is the DN of myCert2  conn rw3       right=%any       rightid=@peer3.domain1       leftid=@myid.domain1       # leftid is myid.domain1 and must be a subjectAltName         contained in myCert1  The certificates are loaded relative to /etc/ipsec.d or from  an arbitrary absolute path. The corresponding private keys  are loaded via ipsec.secrets:  : RSA myKey1.pem "<optional passphrase>"  : RSA myKey2.pem "<optional passphrase>"  Based on the public key contained in the leftcert certificate  the corresponding private key is found automatically.- Due to the support of multiple certificates and corresponding  private keys, configuration has become much simpler. Therefore  a large part of the README has been rewritten. Still, backward  compatibility to previous versions of the patch has been  maintained.- Since x509.c has grown quite significantly over the last few  versions, it has been split into asn1.c, pkcs.c and x509.c,  accompanied by the corresponding header files asn1.h, pkcs.h  and x509.h.- The ASN.1 parser now tolerates UTCTIME and GENERALIZEDTIME  objects with nonzero time zone offsets and missing seconds  field (DER coding requires both Zulu time and a seconds field,  so in a proper certificate these special cases should never  occur). Thanks go to Jochen Eisinger for his patch.- Adopted the new FreeS/WAN keyid for RSA public keys, consisting  of 9 base64 digits. Used in ipsec auto --listpubkeys.- "make install" now creates the /etc/ipsec.d directory and its  sub directories cacerts, crls, and private.Version 0.9.9-------------- When Pluto wants to use an expired public key in the public key  cache in order to check a signature, then the expired key is now  deleted from the chained list and the setup of the connection is  prevented.- No certificate request is sent if the public key of the connection  has been preloaded using rightrsasigkey=0x.... This makes  interoperability with non-X.509 enabled FreeS/WAN clients possible  because they choke on certificate requests.- Created the environment variables $PLUTO_MY_ID and $PLUTO_PEER_ID  which can be accessed in the updown script. Use in ID based firewalling  policies or for logging purposes.- Added the distinguished name attribute [Siemens] Trust Center Global  ID (TCGID=) having the OID 1.3.6.1.4.1.1201.1.1.2.2.75Version 0.9.8-------------- PKCS#1 RSA private key files can now be read directly by  Pluto, thereby eliminating the need to extract the private  key using the fswcert tool. As a consequence fswcert is not bundled  with the X.509 patch any more but is still available as a  separate distribution from http://www.strongsec.com/freeswan/.  RSA private key files are declared in /etc/ipsec.secrets in  the form    : RSA myKey.pem  as a PEM file or with    : RSA freeswanKey.der  as a DER file. If the private key has been encrypted with 3DES  and protected with a passphrase then with the notation    : RSA pulpoKey.pem "This is my passphrase"  the key file is automatically decrypted. Be careful to make  /etc/ipsec.secrets root readable only.  Relative pathnames are looked up in the directory /etc/ipsec.d/private.  Absolute pathnames like e.g./usr/ssl/private/pulpoKey.pem are also  possible. If not protected by a passphrase be sure to make key  files root readable only.- Distinguished Names in ipsec.conf can now be written without  the preceding '@' character. The new notation is    leftid="C=CH, O=strongSec GmbH, CN=pulpo.strongsec.com"  or alternatively    leftid="/C=CH/O=strongSec GmbH/CN=pulpo.strongsec.com"  The old notation    leftid="@C=CH, O=strongSec GmbH, CN=pulpo.strongsec.com"  or alternatively    leftid="@/C=CH/O=strongSec GmbH/CN=pulpo.strongsec.com"  will also be supported, thus ensuring that existing configuration  files can still be used.- leftcert and rightcert can now be used together with leftid and  rightid, if you want to specify a subjectAltName instead of the  default subject distinguished name of the certificate. Example:  conn use_ID_DER_ASN1_DN       right=%any       rightcert=peerCert.pem  or  conn use_ID_FQDN       right=%any       rightid=@peer.host       rightcert=peerCert.pem  Of course the ID_FQDN peer.host must exist as a DNS subjectAltName  extension in the certificate "peerCert.pem", otherwise the subject DN  is automatically assumed.- A certificate can now contain an unlimited amount of subjectAltNames  either of the same type or of various types.- crlDistributionPoints are now parsed in certificates. This is  a further step towards support of dynamic CRL updates.Version 0.9.7-------------- Fixed both a bug and a memory leak in send_delete(), the  function responsible for sending delete notifications. Both  patches were contributed by D. Hugh Redelmeier. Thanks!Version 0.9.6-------------- The following monitoring functions are now available:  ipsec auto --listpubkeys  #lists all installed public keys  ipsec auto --listcacerts  #lists all installed cacerts  ipsec auto --listcrls     #lists all installed crls  all three commands can be used with the option --utc  which causes all dates to be represented in UTC time  instead of the default local time. The expiration date of cacerts  and crls is checked and a warning is issued some time  (30 days for cacerts / 7 days for crls) before imminent expiry.- Dates extracted from certificates and CRLs (e.g. validity,  next update,revocation dates) are now represented as standard  time_t objects.- The three patches to the pluto directory, utils/auto and  utils/_confread, respectively, have been merged into a  single patch "freeswan.diff" that can be applied to the  freeswan top directory.- The script utils/auto does not generate a whack message for  leftrsasigkey=%cert and/or rightrsasigkey=%cert anymore,  since no RSA keys must be stored in the chained list of  public keys before the actual connection is negotiated.- Locally stored host certificates defined in ipsec.conf are now  loaded by pluto. The fswcert tool is not used by utils/_confread  anymore.- Bug fix: Everytime a certificate was received during IKE Main Phase,  the validated public key is inserted into a chained list of  public keys without prior deletion of the already existing copy.  This behaviour leads caused a memory leak in version 0.9.5, but only  in combination with freeswan-1.93 or the snapshot.Version 0.9.5-------------- Bug fix: When a roadwarrior set up multiple IPsec SAs,  rekeying was impossible since the ID was missing in the  roadwarrior instances. Fixed in rw_instantiate() in ipsec_doi.c.Version 0.9.4-------------- Support of several subnets in certificate based roadwarrior  connections. Example  conn rw1	right=%any	leftsubnet=10.0.1.0/24	auto=add  conn rw2	right=%any	leftsubnet=10.0.2.0/24	auto=add  conn rw3  	right=%any	rightsubnet=10.0.3.0/24	leftsubnet=10.0.1.0/24	auto=add- Support of ISO-8859-1 character set in distinguished names (DNs).  In the example  rightid="@C=CH, O=strongSec GmbH, OU=@*#

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -