]> git.ipfire.org Git - thirdparty/strongswan.git/log
thirdparty/strongswan.git
17 hours agogithub: Continue crypto tests even if OpenSSL tests fail devel master
Tobias Brunner [Thu, 9 Apr 2026 07:25:23 +0000 (09:25 +0200)] 
github: Continue crypto tests even if OpenSSL tests fail

These can sometimes fail because of sync issues with Ubuntu debug symbol
packages, let other crypto tests continue.

17 hours agoUse wolfSSL 5.9.1 for tests
Tobias Brunner [Thu, 9 Apr 2026 06:53:26 +0000 (08:53 +0200)] 
Use wolfSSL 5.9.1 for tests

17 hours agounit-tests: Use longer input for ECDSA tests
Tobias Brunner [Thu, 9 Apr 2026 07:45:27 +0000 (09:45 +0200)] 
unit-tests: Use longer input for ECDSA tests

wolfSSL 5.9.1 starts to enforce a minimum (and maximum) length for the
hash when signing.  Since we'll always require SHA-1, use 20 bytes as
input in the tests to succeed with SIGN_ECDSA_WITH_NULL.

35 hours agofuzz: Remove unnecessary calls to set plugin dirs
Tobias Brunner [Wed, 11 Feb 2026 10:31:24 +0000 (11:31 +0100)] 
fuzz: Remove unnecessary calls to set plugin dirs

All the plugins are linked statically into the binaries, so there
is no reason to set the directories that are only required when loading
them from files.

35 hours agofuzz: Create fuzzers with default and custom crypto plugins
Tobias Brunner [Wed, 11 Feb 2026 10:14:53 +0000 (11:14 +0100)] 
fuzz: Create fuzzers with default and custom crypto plugins

The pa_tnc fuzzer does not rely on any plugins and the pb_tnc fuzzer is
a bit special in that it does use code from the tnccs-20 plugin, but that
doesn't actually have to be loaded as such. The fuzzer directly calls
statically linked code from the plugin.

2 days agogithub: Update actions so they don't use deprecated Node.js 20
Tobias Brunner [Tue, 7 Apr 2026 16:57:40 +0000 (18:57 +0200)] 
github: Update actions so they don't use deprecated Node.js 20

7 days agotls-server: Avoid allocating large buffer for cipher suites on stack
Tobias Brunner [Wed, 1 Apr 2026 16:27:07 +0000 (18:27 +0200)] 
tls-server: Avoid allocating large buffer for cipher suites on stack

The `cipher_suites` field has a 16-bit length field, so up to 32k 2-byte
cipher suites could technically be proposed.  With `tls_cipher_suite_t`
typically being 4 bytes wide, the necessary allocation for the temporary
array can be up to 128 KiB.  Even though this should be fine on typical
systems, we avoid potentially overflowing the stack by using malloc()
instead of alloca().

7 days agolibipsec: Reject policies for anything but ESP tunnel mode
Tobias Brunner [Fri, 27 Mar 2026 11:35:10 +0000 (12:35 +0100)] 
libipsec: Reject policies for anything but ESP tunnel mode

This is only relevant for trap policies as similar SAs are already
rejected when negotiated.

7 days agotrap-manager: Ignore acquires without selectors for wildcard traps
Tobias Brunner [Fri, 27 Mar 2026 11:28:22 +0000 (12:28 +0100)] 
trap-manager: Ignore acquires without selectors for wildcard traps

We need to know the actual destination address to process these.

7 days agoike-init: Remove redundant check for more key exchanges during rekeying
Tobias Brunner [Fri, 27 Mar 2026 11:07:19 +0000 (12:07 +0100)] 
ike-init: Remove redundant check for more key exchanges during rekeying

We only call derive_keys() after a successful key_exchange_done() call
during rekeying, so this will always return FALSE.

7 days agoopenssl: Handle EdDSA keys from engines special again
Tobias Brunner [Fri, 27 Mar 2026 10:04:54 +0000 (11:04 +0100)] 
openssl: Handle EdDSA keys from engines special again

Fixes: 052a93955332 ("openssl: Add support for Ed25519 via AWS-LC")
7 days agocertreq: Avoid OOB read when enumerating hashes in OCSP CERTREQ
Tobias Brunner [Wed, 25 Mar 2026 17:49:45 +0000 (18:49 +0100)] 
certreq: Avoid OOB read when enumerating hashes in OCSP CERTREQ

These certificate requests also contain SHA-1 hashes, which is assumed
in `ike_cert_pre.c::process_certreq()` when enumerating key IDs.

Because the parser allocates a separate chunk for the data and the
enumerator doesn't read beyond that chunk's length after the first
iteration, only lengths between 1 and 19 are problematic (0 doesn't
cause an enumeration because chunk_empty is assigned).

Whether the OOB read then can cause a segmentation fault depends on the
allocator, its alignment rules, and its minimum overhead.  For instance,
with glibc on a typical 64-bit system (8 bytes for pointers and size_t),
the alignment is 16 bytes and the minimum allocated size is 32 bytes,
with typically 24 that are technically available for data, even if only
0 bytes are allocated (as returned by `malloc_usable_size()`).  So with
an allocation between 1 and 19, we can always safely read 20 bytes.

Assuming that other allocators behave similar for small allocations, it
seems unlikely that this causes a crash.

Fixes: 15612b3a4243 ("Add support for IKEv2 OCSP extensions (RFC 4806)")
7 days agovici: Prevent uninitialized memory access if VICI_LIST_ITEM is too short
Tobias Brunner [Wed, 25 Mar 2026 08:56:06 +0000 (09:56 +0100)] 
vici: Prevent uninitialized memory access if VICI_LIST_ITEM is too short

If there is only a single length byte, `value` is not changed and points
to uninitialized data.

7 days agotnccs_11: Avoid crash if TNCCS-ReasonStrings is empty or only contains empty nodes
Tobias Brunner [Wed, 25 Mar 2026 08:51:31 +0000 (09:51 +0100)] 
tnccs_11: Avoid crash if TNCCS-ReasonStrings is empty or only contains empty nodes

`xmlNodeGetContent()` returns `NULL` if `child` is `NULL`, which causes
a segmentation fault in `chunk_from_str()`.

Fixes: ec1eab03195b ("fixed XML parsing of TNCCS 1.1 ReasonString message")
7 days agoeap-sim: Prevent infinite loop if version list contains more than one entry
Tobias Brunner [Wed, 25 Mar 2026 08:42:15 +0000 (09:42 +0100)] 
eap-sim: Prevent infinite loop if version list contains more than one entry

Fixes: ac4dd5439b22 ("Migrated EAP-SIM to libsimaka, separated server/peer implementations")
7 days agorevocation: Fix memory leak if nonce in OCSP response doesn't match
Tobias Brunner [Mon, 23 Mar 2026 18:03:58 +0000 (19:03 +0100)] 
revocation: Fix memory leak if nonce in OCSP response doesn't match

7 days agomessage: Drop fragments with total fragment count lower than before
Tobias Brunner [Mon, 23 Mar 2026 17:58:18 +0000 (18:58 +0100)] 
message: Drop fragments with total fragment count lower than before

The RFC only allows that the number of fragments increases (if the
sender reduces the MTU).

Not enforcing this before could cause early reassembly as the trigger was
that the number of received fragments matches the total count of the
current packet (which was a bit weird anyway).  Only an active MITM could
trigger this as individual fragments are encrypted and authenticated.

7 days agocredential-factory: Enforce an upper limit when creating nested credentials
Tobias Brunner [Fri, 20 Mar 2026 16:20:55 +0000 (17:20 +0100)] 
credential-factory: Enforce an upper limit when creating nested credentials

This mainly intended as defense-in-depth measure to avoid parsing
massively nested structures that could cause a call stack overflow due
to the massive recursion.  In particular PKCS#7 signed data is prone to
this as these can be nested basically infinitely.  When used in IKEv1 via
ENC_PKCS7_WRAPPED_X509 CERT payloads, our default of 10000 bytes for IKE
messages guards against this, but that's configurable and there might be
a chance for some bug that triggers problematic recursive parsing for
smaller input.

The upper limit is chosen arbitrarily, but there are currently no known
cases that require a depth of more than 10 levels.

7 days agotls-peer: Ensure TLS 1.3 CertificateRequest structure is valid
Tobias Brunner [Fri, 20 Mar 2026 15:05:27 +0000 (16:05 +0100)] 
tls-peer: Ensure TLS 1.3 CertificateRequest structure is valid

If nothing was read from the message, the previous code could result in
a crash depending on where `ext.ptr` pointed to, as determined by the
current stack contents.  Since TLS 1.3 is still disabled by default and
this is usually used for TLS-based EAP methods after validating the
IKEv2 server's certificate, the real world impact seems relatively low.

Fixes: 9ef46cfaf917 ("tls-peer: Mutual authentication support for TLS 1.3")
7 days agolibsimaka: Prevent out-of-bounds read when parsing attributes with actual length...
Tobias Brunner [Fri, 20 Mar 2026 14:48:41 +0000 (15:48 +0100)] 
libsimaka: Prevent out-of-bounds read when parsing attributes with actual length field

These attributes contain a 16-bit length field for the actual length of
the data in bits or bytes, as compared to the length in 4-byte blocks in
the attribute header.  The previous code didn't correctly account for the
length of the fixed header (4 bytes) when it compared the parsed length
to the length in the header.  This could cause an out-of-bounds read of
up to four bytes beyond the end of the attribute/message.

Fixes: f8330d03953b ("Added a libsimaka library with shared message handling code for EAP-SIM/AKA")
7 days agonm: Ignore all .gmo files
Tobias Brunner [Thu, 2 Apr 2026 05:54:04 +0000 (07:54 +0200)] 
nm: Ignore all .gmo files

8 days agodhcp: Use correct getter for boolean force_server_address option
Tobias Brunner [Wed, 1 Apr 2026 12:01:02 +0000 (14:01 +0200)] 
dhcp: Use correct getter for boolean force_server_address option

8 days agoopenssl: Fix return value if returning EdDSA public key fails
Tobias Brunner [Wed, 1 Apr 2026 11:49:08 +0000 (13:49 +0200)] 
openssl: Fix return value if returning EdDSA public key fails

8 days agoUse Botan 3.11.1 for tests
Tobias Brunner [Wed, 1 Apr 2026 07:07:26 +0000 (09:07 +0200)] 
Use Botan 3.11.1 for tests

8 days agonm: Add Georgian translation
Ekaterine Papava [Wed, 1 Apr 2026 10:22:39 +0000 (12:22 +0200)] 
nm: Add Georgian translation

Closes strongswan/strongswan#3041

Signed-off-by: Ekaterine Papava <papava.e@gtu.ge>
2 weeks agoIgnore tarball checksums and signatures
Andreas Steffen [Mon, 23 Mar 2026 16:24:53 +0000 (17:24 +0100)] 
Ignore tarball checksums and signatures

2 weeks agoVersion bump to 6.0.5 6.0.5
Andreas Steffen [Mon, 23 Mar 2026 12:41:52 +0000 (13:41 +0100)] 
Version bump to 6.0.5

2 weeks agoNEWS: Add info about CVE-2026-25075
Tobias Brunner [Fri, 20 Mar 2026 15:28:20 +0000 (16:28 +0100)] 
NEWS: Add info about CVE-2026-25075

3 weeks agoeap-ttls: Prevent crash if AVP length header field is invalid
Tobias Brunner [Thu, 5 Mar 2026 11:43:12 +0000 (12:43 +0100)] 
eap-ttls: Prevent crash if AVP length header field is invalid

The length field in the AVP header includes the 8 bytes of the header
itself.  Not checking for that and later subtracting it causes an
integer underflow that usually triggers a crash when accessing a
NULL pointer that resulted from the failing chunk_alloc() call because
of the high value.

The attempted allocations for invalid lengths (0-7) are 0xfffffff8,
0xfffffffc, or 0x100000000 (0 on 32-bit hosts), so this doesn't result
in a buffer overflow even if the allocation succeeds.

Fixes: 79f2102cb442 ("implemented server side support for EAP-TTLS")
Fixes: CVE-2026-25075
3 weeks agoUse wolfSSL 5.9.0 for tests
Tobias Brunner [Thu, 19 Mar 2026 08:18:08 +0000 (09:18 +0100)] 
Use wolfSSL 5.9.0 for tests

3 weeks agoconf: Install charon-specific snippets also when charon itself is not built
Tobias Brunner [Tue, 17 Mar 2026 07:27:37 +0000 (08:27 +0100)] 
conf: Install charon-specific snippets also when charon itself is not built

To make the default strongswan.conf, with `load_modular` enabled, work
if charon itself is not built, we enable generating the charon-specific
snippets also for the two other daemons that fall back on reading
options from the `charon` section.

3 weeks agoconf: Generate and install config snippets also for charon-cmd and charon-nm
Tobias Brunner [Tue, 10 Mar 2026 16:43:08 +0000 (17:43 +0100)] 
conf: Generate and install config snippets also for charon-cmd and charon-nm

This allows easier customization for distributions (e.g. disable some
plugins by default).

3 weeks agogithub: Use AWS-LC 1.70.0 for tests
Tobias Brunner [Mon, 16 Mar 2026 10:35:55 +0000 (11:35 +0100)] 
github: Use AWS-LC 1.70.0 for tests

3 weeks agofuzz: Add dependency to fuzz RADIUS message parsing
Arthur Chan [Wed, 11 Mar 2026 22:57:49 +0000 (22:57 +0000)] 
fuzz: Add dependency to fuzz RADIUS message parsing

Due to the static build, libcharon will depend on libradius as soon as
eap-radius is enabled even if not actually used.  So in order to avoid
breaking the build of fuzz_ike when enabling this in CIFuzz, enable
it now before adding the actual fuzzer.

Closes strongswan/strongswan#3028

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>
3 weeks agovici: Prevent uninitialized memory access when finding VICI_END in message
Tobias Brunner [Fri, 13 Mar 2026 08:35:28 +0000 (09:35 +0100)] 
vici: Prevent uninitialized memory access when finding VICI_END in message

VICI_END (7) shouldn't be encoded in a message.  However, if we encounter
it, we should at least set `out` accordingly so callers can abort the
enumeration.  By not doing so previously and returning TRUE, callers
might access the possibly uninitialized name/value arguments passed to
the enumerator.

3 weeks agogmp: Reject public keys with public exponent e < 3
Tobias Brunner [Wed, 11 Mar 2026 17:16:53 +0000 (18:16 +0100)] 
gmp: Reject public keys with public exponent e < 3

This ensures that we don't load a key with e=1, which basically renders
RSA into a no-op.  Since keys are universally generated with e=65537 and
no reputable CA will sign keys with e=1, allowing this before didn't have
any real world impact.

4 weeks agoVersion bump to 6.0.5dr1 6.0.5dr1
Andreas Steffen [Mon, 23 Feb 2026 19:02:58 +0000 (20:02 +0100)] 
Version bump to 6.0.5dr1

5 weeks agogithub: Use AWS-LC 1.69.0 for tests
Tobias Brunner [Wed, 4 Mar 2026 15:30:48 +0000 (16:30 +0100)] 
github: Use AWS-LC 1.69.0 for tests

5 weeks agostring: Fix -Werror=discarded-qualifiers with GCC 15
Dustin Kirkland [Thu, 26 Feb 2026 17:25:27 +0000 (11:25 -0600)] 
string: Fix -Werror=discarded-qualifiers with GCC 15

GCC 15 tightened its built-in declarations for strchr() and strstr() so
that they now propagate const from their first argument, triggering
-Werror=discarded-qualifiers on three assignments in string.c:

  translate():
    char *match = strchr(from, *pos)
    `from` is const char *, so the result of strchr() is const char *.
    `match` is only used for pointer arithmetic (match - from), so
    declaring it const char * is correct and safe.

  strreplace():
    found = strstr(str, search)         [line ~73]
    found = strstr(pos, search)         [line ~89, while condition]
    `str`/`pos` are derived from a const char * parameter, so strstr()
    returns const char *. `found` is used as a mutable char * later
    (pos = found + slen), consistent with the existing (char*) casts
    already used throughout this function for the same reason.
    Add explicit (char*) casts to match the established pattern.

Closes strongswan/strongswan#3015

5 weeks agoNEWS: Add news for 6.0.5
Tobias Brunner [Tue, 3 Mar 2026 13:58:16 +0000 (14:58 +0100)] 
NEWS: Add news for 6.0.5

5 weeks agoUse distinct identifier for "command" group in pki/swanctl to fix apidoc
Tobias Brunner [Mon, 2 Mar 2026 15:42:38 +0000 (16:42 +0100)] 
Use distinct identifier for "command" group in pki/swanctl to fix apidoc

5 weeks agoFixed some typos, courtesy of codespell
Tobias Brunner [Mon, 2 Mar 2026 15:30:12 +0000 (16:30 +0100)] 
Fixed some typos, courtesy of codespell

6 weeks agoswanctl: Check for conflicts with existing and shared options when registering commands
Tobias Brunner [Mon, 23 Feb 2026 10:20:19 +0000 (11:20 +0100)] 
swanctl: Check for conflicts with existing and shared options when registering commands

6 weeks agopki: Avoid conflict between --verify and --debug
Tobias Brunner [Mon, 23 Feb 2026 10:19:35 +0000 (11:19 +0100)] 
pki: Avoid conflict between --verify and --debug

Add shared options to the man page.

6 weeks agoswanctl: Check for conflicts with shared options when registering commands
Tobias Brunner [Mon, 23 Feb 2026 10:13:55 +0000 (11:13 +0100)] 
swanctl: Check for conflicts with shared options when registering commands

Also suppress errors when pre-processing shared options (this was missing
here but already used in pki).

6 weeks agoswanctl: Avoid conflict between --uninstall and --uri
Tobias Brunner [Mon, 23 Feb 2026 10:03:52 +0000 (11:03 +0100)] 
swanctl: Avoid conflict between --uninstall and --uri

Also update the man page (including the -V change in the previous commit
and documenting the global options).

6 weeks agoswanctl: Assigned -V to --version since -v is now used for global --debug
Andreas Steffen [Sun, 22 Feb 2026 09:22:19 +0000 (10:22 +0100)] 
swanctl: Assigned -V to --version since -v is now used for global --debug

6 weeks agostream: Clarify that some methods must not be called from callbacks
Tobias Brunner [Mon, 16 Feb 2026 11:05:34 +0000 (12:05 +0100)] 
stream: Clarify that some methods must not be called from callbacks

6 weeks agowhitelist: Fix deadlock when handling client disconnection
seantywork [Sun, 15 Feb 2026 09:40:49 +0000 (09:40 +0000)] 
whitelist: Fix deadlock when handling client disconnection

Calling stream_t::destroy from the stream_t::on_read callback will
block the thread in watcher_t::remove because the FD is currently "in
callback".  A similar issue was fixed in the lookip plugin with
961409b66858 ("lookip: Disconnect asynchronously to avoid dead-locking
watcher unregistration").

Fixes: 85ebf6abd441 ("whitelist: Add error handling to socket reads and fix a memory leak")
6 weeks agokernel-netlink: Don't fallback to peer address as gateway/nexthop
Tobias Brunner [Fri, 29 Nov 2024 13:57:31 +0000 (14:57 +0100)] 
kernel-netlink: Don't fallback to peer address as gateway/nexthop

This doesn't really seem useful (perhaps it was before we started to
configure the outbound interface on our routes). And it can actually
cause the route installation to fail e.g. for routes over point-to-point
interfaces where we'd get "Error: Nexthop has invalid gateway" errors.

Note that we can't return NULL if we find an interface as e.g. the updown
plugin uses this method to determine the outbound interface (it ignores
the nexthop), which it passes to the script.  If we returned NULL, it
would pass "unknown" instead, which would cause the firewall rules to
mismatch.  While it seems that 0.0.0.0/:: is ignored as nexthop by the
kernel on the installed route, I still explicitly ignore such addresses
to avoid any unintended side-effects.

The automatic route installation in the ikev2/shunt-manual-prio scenario
had to be disabled on the clients.  The reason is that the route in table
220 won't have a nexthop set (the peers are directly connected), so when
trying to reach alice or venus via SSH, which matches the port-specific
bypass policies for which we don't install throw routes, the hosts will
do ARP requests for the target IPs instead of routing the packets via
moon.

Closes strongswan/strongswan#2548

6 weeks agovici: Document attributes for additional KE methods in list-sa event
Tobias Brunner [Fri, 20 Feb 2026 10:53:15 +0000 (11:53 +0100)] 
vici: Document attributes for additional KE methods in list-sa event

6 weeks agogithub: Replace action for TKM tests with direct "docker run" call
Tobias Brunner [Fri, 20 Feb 2026 11:34:04 +0000 (12:34 +0100)] 
github: Replace action for TKM tests with direct "docker run" call

The action causes errors because it is not compatible to the Docker
version used in the runner images.  Unfortunately, it doesn't seem
maintained anymore.  The action is simple enough, though, so instead of
switching to a fork, we just use "docker run" directly.

7 weeks agogithub: Add a link to the docs in the new issue config
Tobias Brunner [Tue, 17 Feb 2026 09:18:10 +0000 (10:18 +0100)] 
github: Add a link to the docs in the new issue config

Also reword the discussion link description a bit.

8 weeks agoMerge branch 'icmp-forwarding'
Tobias Brunner [Thu, 12 Feb 2026 15:21:46 +0000 (16:21 +0100)] 
Merge branch 'icmp-forwarding'

Adds support for ICMP error forwarding that the kernel supports properly
since v6.9 (it still sends locally generated errors from the wrong source
IP, though).

8 weeks agotesting: Add scenarios to test ICMP forwarding
Tobias Brunner [Thu, 15 Jan 2026 10:04:05 +0000 (11:04 +0100)] 
testing: Add scenarios to test ICMP forwarding

8 weeks agovici: Make ICMP forwarding configurable
Tobias Brunner [Mon, 7 Feb 2022 13:48:49 +0000 (14:48 +0100)] 
vici: Make ICMP forwarding configurable

8 weeks agochild-sa: Enable ICMP forwarding on SA and policies if configured
Tobias Brunner [Mon, 7 Feb 2022 13:35:39 +0000 (14:35 +0100)] 
child-sa: Enable ICMP forwarding on SA and policies if configured

8 weeks agochild-cfg: Add flag to enable ICMP forwarding
Tobias Brunner [Mon, 7 Feb 2022 13:21:43 +0000 (14:21 +0100)] 
child-cfg: Add flag to enable ICMP forwarding

8 weeks agokernel-netlink: Enable ICMP forwarding on inbound SA and out/fwd policies
Tobias Brunner [Mon, 7 Feb 2022 13:21:01 +0000 (14:21 +0100)] 
kernel-netlink: Enable ICMP forwarding on inbound SA and out/fwd policies

8 weeks agokernel-ipsec: Add flags to enable ICMP error forwarding
Tobias Brunner [Mon, 7 Feb 2022 13:20:39 +0000 (14:20 +0100)] 
kernel-ipsec: Add flags to enable ICMP error forwarding

For the Linux kernel, this has to be enabled on the inbound SA and the
out and fwd policies.

8 weeks agoipsec-types: Add a proper hash function for ipsec_sa_cfg_t
Tobias Brunner [Mon, 7 Feb 2022 13:28:19 +0000 (14:28 +0100)] 
ipsec-types: Add a proper hash function for ipsec_sa_cfg_t

While 3c1290510366 ("ipsec: Add function to compare two ipsec_sa_cfg_t
instances") added a comparison function to avoid issues with non-zeroed
padding, hashes were still calculated using chunk_hash().

8 weeks agobus: Prevent redundant down event on rekeyed CHILD_SA delete timeout
Martin Willi [Thu, 12 Feb 2026 07:53:01 +0000 (08:53 +0100)] 
bus: Prevent redundant down event on rekeyed CHILD_SA delete timeout

If a CHILD_SA is rekeyed using a CREATE_CHILD_SA request, a subsequent
DELETE for the old CHILD_SA may time out. Before sending this DELETE,
a CHILD_REKEYED state CHILD_SA set from child_rekey::process_i() is
immediately set to CHILD_DELETING from child_delete::build_i(). If the
IKE_SA dies due to a retransmission timeout of this DELETE, a redundant
child-down event is issued for the rekeyed CHILD_SA that has already seen a
child-rekey event.

A reproducer shows the following log and events:

    [CFG] vici rekey CHILD_SA #533
    [IKE] establishing CHILD_SA XXX{534} reqid 20
    [ENC] generating CREATE_CHILD_SA request 0 [ N(REKEY_SA) SA No KE TSi TSr ]
    [ENC] parsed CREATE_CHILD_SA response 0 [ SA No TSi TSr ]
    [IKE] rekeyed CHILD_SA XXX{533} with SPIs ca997de6_i cd27d4fe_o with XXX{534} with SPIs ced1cd01_i c460a7c9_o
     Event: child-rekey
      [OLD SA] state: REKEYING, spi-in: ca997de6
      [NEW SA] state: INSTALLED, spi-in: ced1cd01
    [IKE] closing CHILD_SA XXX{533} with SPIs ca997de6_i (352 bytes) cd27d4fe_o (264 bytes) and TS 0.0.0.0/0 === 10.11.9.40/29
    [IKE] sending DELETE for ESP CHILD_SA with SPI ca997de6
    [ENC] generating INFORMATIONAL request 1 [ D ]
    [IKE] retransmit 1 of request with message ID 1
    [IKE] retransmit 2 of request with message ID 1
    [IKE] retransmit 3 of request with message ID 1
    [IKE] retransmit 4 of request with message ID 1
    [IKE] giving up after 4 retransmits
     Event: child-updown
      [SA] state: DELETING, spi-in: ca997de6
     Event: child-updown
      [SA] state: INSTALLED, spi-in: ced1cd01

To prevent the redundant child-down event for the successfully rekeyed CHILD_SA,
check if a DELETING CHILD_SA has already removed its outbound state due to
having been rekeyed before issuing the child-down event.

Add a new exchange test exercising that a delete timeout after rekeying does
not cause a duplicate child-down event.

8 weeks agoRemove accidentally committed libtool script
Tobias Brunner [Mon, 9 Feb 2026 15:04:23 +0000 (16:04 +0100)] 
Remove accidentally committed libtool script

Fixes: 3e5a528aec09 ("tpm: Auto-detection of legacy TPM 2.0 devices")
2 months agoMerge branch 'swanctl-plugins'
Tobias Brunner [Fri, 6 Feb 2026 15:10:50 +0000 (16:10 +0100)] 
Merge branch 'swanctl-plugins'

Uses a separate default plugin list for swanctl (instead of just loading
all of libstrongswan's plugins) to avoid some side-effects of loaded but
unused plugins.  The load statements in the regression tests have been
updated accordingly.

A new configure option for maintainers of distributions that ship
plugins in separate packages changes the message if a plugin is not
found and reduces its log level.  This confused users of tools that don't
use modular plugin loading (e.g. pki or swanctl).

Also changes command line handling in pki and swanctl so that the shared
options can be passed before the actual command and that the debug level
also affects library/plugin initialization.

References strongswan/strongswan#2971

2 months agoswanctl: Add global --debug, --options and --uri arguments
Tobias Brunner [Fri, 30 Jan 2026 11:20:05 +0000 (12:20 +0100)] 
swanctl: Add global --debug, --options and --uri arguments

Similarly to the previous commit for pki, this allows setting these
options before the command, and by pre-parsing them we can see log
messages during the initialization.

2 months agodebug: Add helper to get the current default log level for a group
Tobias Brunner [Fri, 30 Jan 2026 11:44:53 +0000 (12:44 +0100)] 
debug: Add helper to get the current default log level for a group

2 months agopki: Add global --debug and --options arguments
Tobias Brunner [Thu, 29 Jan 2026 16:32:03 +0000 (17:32 +0100)] 
pki: Add global --debug and --options arguments

This allows setting the log level before initializing the library and
loading the plugins, as well as having the top-level command itself in
an options file.

2 months agoplugin-loader: Add option to change log message if plugin is not found
Tobias Brunner [Wed, 28 Jan 2026 14:45:23 +0000 (15:45 +0100)] 
plugin-loader: Add option to change log message if plugin is not found

Distributions like Debian/Ubuntu ship the plugins in multiple packages
that are not all installed by default.  When running tools like pki or
swanctl, which don't use modular loading with config snippets by default,
there are errors in the output if these packages and plugins are
currently not available.  In order to not alarm users, this change adds
a configure option that package maintainers can use.  It causes the log
level of the message to increase and also adds a note that mentions that
plugins are potentially available in other packages (which should be the
case unless the user tried to load a plugin, e.g. via load statement,
that is not actually built and shipped by the package maintainers).

2 months agotesting: Remove unused revocation and constraints plugins for swanctl
Tobias Brunner [Mon, 5 Jan 2026 16:23:06 +0000 (17:23 +0100)] 
testing: Remove unused revocation and constraints plugins for swanctl

swanctl doesn't do any (online) certificate validation, it just parses
and or decrypts them and passes them on to the daemon.

2 months agoswanctl: Use a custom default plugin list
Tobias Brunner [Mon, 5 Jan 2026 15:32:02 +0000 (16:32 +0100)] 
swanctl: Use a custom default plugin list

Loading all libstrongswan plugins isn't necessary as the tool only uses
the plugins to parse/decrypt credentials.  So it's similar to pki, but
it doesn't do (online) certificate validation, access tokens, or need
access to databases.

While it's usually not an issue to load unnecessary plugins, one thing
that came up recently are the new capabilities required by the agent
plugin.  Since Debian's AppArmor policy for swanctl doesn't grant them,
this produces an error message that might confuse users.

2 months agoconfigure: Load ldap plugin in pki
Tobias Brunner [Mon, 5 Jan 2026 15:27:01 +0000 (16:27 +0100)] 
configure: Load ldap plugin in pki

It's a fetcher plugin used for online certificate validation.

2 months agostream-service-unix: Remove unnecessary execute permission from sockets
Tobias Brunner [Thu, 15 Jan 2026 14:14:32 +0000 (15:14 +0100)] 
stream-service-unix: Remove unnecessary execute permission from sockets

References strongswan/strongswan#2983

2 months agofuzz-ike: Initialize libcharon as logging will cause crashes otherwise
Tobias Brunner [Fri, 6 Feb 2026 07:12:52 +0000 (08:12 +0100)] 
fuzz-ike: Initialize libcharon as logging will cause crashes otherwise

The bus.h header file redirects DBG* macros to the bus but that won't be
available unless libcharon is initialized.

2 months agotesting: Add a reauthentication to ikev2/dhcp-static-client-id
Tobias Brunner [Thu, 5 Feb 2026 16:53:58 +0000 (17:53 +0100)] 
testing: Add a reauthentication to ikev2/dhcp-static-client-id

This verifies that we don't release the lease when the old SA is
deleted during the reauthentication.

2 months agodhcp: Don't release the address via DHCP if it's still used
Tobias Brunner [Thu, 18 Dec 2025 14:51:02 +0000 (15:51 +0100)] 
dhcp: Don't release the address via DHCP if it's still used

This is useful during make-before-break reauthentication, where the
new SA is created before the old one is terminated and the virtual IP
gets released.

This also changes the hash() and equals() functions to avoid potential
collisions.

References strongswan/strongswan#2967

2 months agoMerge branch 'cifuzz'
Tobias Brunner [Wed, 4 Feb 2026 11:38:37 +0000 (12:38 +0100)] 
Merge branch 'cifuzz'

Add CIFuzz on GitHub.

Closes strongswan/strongswan#2993

2 months agogithub: Also run UBSan with CIFuzz
Tobias Brunner [Fri, 30 Jan 2026 14:06:14 +0000 (15:06 +0100)] 
github: Also run UBSan with CIFuzz

2 months agogithub: Add latest CIFuzz
Arthur Chan [Thu, 29 Jan 2026 08:33:30 +0000 (08:33 +0000)] 
github: Add latest CIFuzz

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>
2 months agopubkey-authenticator: Avoid conflict with config switch based on EAP-Identity
Tobias Brunner [Thu, 8 Jan 2026 07:59:11 +0000 (08:59 +0100)] 
pubkey-authenticator: Avoid conflict with config switch based on EAP-Identity

The referenced commit ignored that INVALID_ARG was returned by this
authenticator if an unsupported signature scheme is encountered.  This
caused a crash in find_alternative_eap_cfg() as no EAP identity is
stored in the current auth config.

Since we don't distinguish the situation outside of the authenticator,
we can just return FAILED.

Closes strongswan/strongswan#2979

Fixes: 2f2e4abe3c52 ("ikev2: Add support to switch peer configs based on EAP-Identities")
2 months agogithub: Use AWS-LC 1.67.0 for tests
Tobias Brunner [Wed, 28 Jan 2026 10:30:30 +0000 (11:30 +0100)] 
github: Use AWS-LC 1.67.0 for tests

2 months agogithub: Use OpenSSL 3.6.1 for tests
Tobias Brunner [Wed, 28 Jan 2026 10:27:53 +0000 (11:27 +0100)] 
github: Use OpenSSL 3.6.1 for tests

2 months agoike-init: Simplify adding extension notifies to IKE_SA_INIT
Tobias Brunner [Mon, 20 Oct 2025 15:45:39 +0000 (17:45 +0200)] 
ike-init: Simplify adding extension notifies to IKE_SA_INIT

2 months agooss-fuzz: Add new fuzzer for libcharon IKE message parser
Arthur Chan [Wed, 21 Jan 2026 05:13:26 +0000 (05:13 +0000)] 
oss-fuzz: Add new fuzzer for libcharon IKE message parser

Closes strongswan/strongswan#2988

Signed-off-by: Arthur Chan <arthur.chan@adalogics.com>
2 months agoappveyor: Reduce runtime by using lld instead of ld
Tobias Brunner [Tue, 20 Jan 2026 14:21:12 +0000 (15:21 +0100)] 
appveyor: Reduce runtime by using lld instead of ld

In particular with the 2019 image, the time required often exceeded the
maximum of 60 minutes.  Using lld reduces the runtime quite a bit (it's
still close to the limit, though).

This doesn't work with the old OpenSSL version we use with the 2015
image (that libeay32.lib file just doesn't seem to work), so continue
to use ld (the build on that image is the quickest anyway).

2 months agoarray: Handle recursive calls to array_sort() if qsort_r() is not supported
Tobias Brunner [Tue, 20 Jan 2026 09:58:01 +0000 (10:58 +0100)] 
array: Handle recursive calls to array_sort() if qsort_r() is not supported

Such a recursive call occurs when sorting the array of Child SAs inside
an IKE SA that causes comparisons of the child configs and their
proposals, which in turn creates a merged array of all transform types
and that uses array_sort() and array_bsearch().

Closes strongswan/strongswan#2926

Fixes: 8e7f379f716c ("ike-sa: Sort CHILD_SAs by CPU ID")
2 months agocharon-cmd: Add support for childless IKE SA initiation
Tobias Brunner [Tue, 9 Dec 2025 09:08:35 +0000 (10:08 +0100)] 
charon-cmd: Add support for childless IKE SA initiation

References strongswan/strongswan#1594

2 months agocharon-cmd: Only use loose identity matching if no IDr is configured
Tobias Brunner [Thu, 2 Oct 2025 08:47:36 +0000 (10:47 +0200)] 
charon-cmd: Only use loose identity matching if no IDr is configured

2 months agocharon-cmd: Add support for PSK authentication with IKEv2
Tobias Brunner [Thu, 22 May 2025 09:30:42 +0000 (11:30 +0200)] 
charon-cmd: Add support for PSK authentication with IKEv2

Can be useful for testing purposes (e.g. some public test servers use
PSKs).

3 months agotrap-manager: Use latest seq when creating an acquire entry
Jean-François Hren [Mon, 5 Jan 2026 08:50:53 +0000 (09:50 +0100)] 
trap-manager: Use latest seq when creating an acquire entry

Closes strongswan/strongswan#2975

Fixes: 79815b4e675a ("trap-manager: Set seq. no. for CHILD_SAs not initiated by an acquire")
3 months agoidentification: Add support for organizationIdentifier in DNs
Tobias Brunner [Mon, 5 Jan 2026 09:50:24 +0000 (10:50 +0100)] 
identification: Add support for organizationIdentifier in DNs

These are e.g. used in eIDAS certificates.

3 months agoagent: Fix compiler warning when building with clang 6.0.4
Tobias Brunner [Fri, 12 Dec 2025 14:59:38 +0000 (15:59 +0100)] 
agent: Fix compiler warning when building with clang

Fixes: 8b467ad39a76 ("agent: Add option to open socket as specific user")
3 months agoip-packet: Fix compiler warning seen on FreeBSD 15
Tobias Brunner [Fri, 12 Dec 2025 07:10:13 +0000 (08:10 +0100)] 
ip-packet: Fix compiler warning seen on FreeBSD 15

We explicitly use untoh16() so this warning isn't relevant:

  ip_packet.c:313:42: error: taking address of packed member 'ip_len' of class or structure 'ip' may result in an unaligned pointer value [-Werror,-Waddress-of-packed-member]

3 months agocirrus: Use FreeBSD 15.0 and 14.3
Tobias Brunner [Thu, 11 Dec 2025 16:36:00 +0000 (17:36 +0100)] 
cirrus: Use FreeBSD 15.0 and 14.3

3 months agoUse Botan 3.10.0 for tests
Tobias Brunner [Thu, 11 Dec 2025 16:25:12 +0000 (17:25 +0100)] 
Use Botan 3.10.0 for tests

Clean up leak-detective whitelist for newer Botan versions but add
`botan_private_key_load` as `botan_privkey_load*` won't show up anymore
without bfd-backtraces due to inlining if we don't call it directly.

Ref: https://github.com/randombit/botan/discussions/4868

3 months agogithub: Use AWS-LC 1.65.1 for tests
Tobias Brunner [Tue, 2 Dec 2025 08:10:37 +0000 (09:10 +0100)] 
github: Use AWS-LC 1.65.1 for tests

3 months agonm: Version bump to 1.6.4
Tobias Brunner [Fri, 12 Dec 2025 14:35:57 +0000 (15:35 +0100)] 
nm: Version bump to 1.6.4

3 months agoVersion bump to 6.0.4
Andreas Steffen [Fri, 12 Dec 2025 14:32:29 +0000 (15:32 +0100)] 
Version bump to 6.0.4

3 months agoNEWS: Add news for 6.0.4
Tobias Brunner [Wed, 10 Dec 2025 17:33:49 +0000 (18:33 +0100)] 
NEWS: Add news for 6.0.4

3 months agonm: Pass back the username auth-dialog runs as to access ssh-agent socket
Tobias Brunner [Thu, 4 Dec 2025 12:56:31 +0000 (13:56 +0100)] 
nm: Pass back the username auth-dialog runs as to access ssh-agent socket

This ensures we access the socket as user who NM ran the auth-dialog for,
especially for system-wide connections where the connection does not
mention a user.

We also make sure we don't use the cached socket and user of a previous
connection attempt, because system-wide connections might be used by
different users.

3 months agocharon-nm: Pass configured user when connecting to SSH/GPG agent
Tobias Brunner [Tue, 2 Dec 2025 15:17:36 +0000 (16:17 +0100)] 
charon-nm: Pass configured user when connecting to SSH/GPG agent

This prevents an attack similar to the one fixed previously where a
user passes the path to credentials of another user, in this case the
path to the agent socket of that user.