Re: [Swan-dev] Libreswan signing key (907E790F25C1E8E561CD73B585FF4B43B30FC6F9)

2022-05-25 Thread Paul Wouters
I actually worked on that for an hour two days ago and failed to get rid of all 
the sha1’s. So we postponed this and will generate a new key 

Sent using a virtual keyboard on a phone

> On May 25, 2022, at 18:49, Daniel Kahn Gillmor  wrote:
> 
> Hi folks--
> 
> I just noticed that the self-sigs over the libreswan signing key and its
> subkey binding signature are all made using SHA1.
> 
> As SHA1 is further deprecated, this makes the certificate difficult to
> use, since the self-sig is what asserts signing capabilities from the
> primary key -- if the self-sig is considerd invalid because of, say, an
> implementation declining to accept SHA-1 digests, then the primary key
> isn't considered signing-capable, which means that signatures made by it
> won't be considered valid.
> 
> the digest used in the subkey-binding signature is relevant if you want
> to be able to receive encrypted mail (e.g. security bug reports).
> 
> To fix this, just re-issue the self-sigs and subkey binding signatures
> with a stronger digest (at least SHA2-256).
> 
> If you're using a modern version of GnuPG that has access to the secret
> key, the arcane command to do that is probably something like:
> 
>   gpg --cert-digest-algo sha256 --quick-set-expire 
> 907E790F25C1E8E561CD73B585FF4B43B30FC6F9 0
>   gpg --cert-digest-algo sha256 --quick-set-expire 
> 907E790F25C1E8E561CD73B585FF4B43B30FC6F9 0 '*'
> 
> and then re-export and re-publish the OpenPGP certificate wherever it's
> published (at least in LIBRESWAN-GPG-KEY.txt in the git repo).
> 
> The first line updates the expiration date and re-issues the self-sig
> for the primary key, the second handles the subkey binding signature.
> 
> Note that leaving the expiration date unset (the "0" above) might itself
> be problematic if you ever lose control over the key and you don't have
> any revocation certificate handy, but that's a separate question.  i'd
> recommend setting an expiration date of "2y" (instead of "0" above), and
> then just repeat this process every time you have a release.  Since
> releases come out in a less-than-2-year cadence, this should be fine.
> 
> But i'd be happy for now with just a primary key with a non-SHA1
> self-sig.
> 
> Thanks for maintaining libreswan!
> 
>   --dkg 
> 
> PS here's the diagnosis:
> 
> The "sig:.*:2:" lines are SHA1 signatures here:
> 
> 0 dkg@alice:~$ gpg --with-colons --check-sigs 
> 907E790F25C1E8E561CD73B585FF4B43B30FC6F9 
> tru::1:1652480124:1691085522:3:1:5
> pub:-:4096:1:85FF4B43B30FC6F9:1357089367:::-:::scESC::23::0:
> fpr:907E790F25C1E8E561CD73B585FF4B43B30FC6F9:
> uid:-1357089367::ED0B44951C7DD5295C3DDEF9C67942731B01068E::Libreswan 
> (Signing Key) ::0:
> sig:!::1:85FF4B43B30FC6F9:1357089367Libreswan (Signing Key) 
> :13x:2:
> sig:?::1:E71806A6B5CC27E1:1357192633:10x:8:
> sig:!::1:C30040228501D2EC:1357583027:10x:2:
> sig:!::1:467564B7505DA62B:1420472842:10x:2:
> sig:!::1:62D3582FE0FD94D2:1418273023:10x:8:
> sig:?::1:CCD2ED94D21739E9:1490035473:155310747310l::0EE5BE979282D80B9F7540F1CCD2ED94D21739E9:::10:
> sub:-:4096:1:43CD400C70C28757:1357089367::e::23:
> fpr:1CF137415217927923F01BB943CD400C70C28757:
> sig:!::1:85FF4B43B30FC6F9:1357089367Libreswan (Signing Key) 
> :18x:2:
> 0 dkg@alice:~$ 
> ___
> Swan-dev mailing list
> Swan-dev@lists.libreswan.org
> https://lists.libreswan.org/mailman/listinfo/swan-dev


signature.asc
Description: Binary data
___
Swan-dev mailing list
Swan-dev@lists.libreswan.org
https://lists.libreswan.org/mailman/listinfo/swan-dev


[Swan-dev] Libreswan signing key (907E790F25C1E8E561CD73B585FF4B43B30FC6F9)

2022-05-25 Thread Daniel Kahn Gillmor
Hi folks--

I just noticed that the self-sigs over the libreswan signing key and its
subkey binding signature are all made using SHA1.

As SHA1 is further deprecated, this makes the certificate difficult to
use, since the self-sig is what asserts signing capabilities from the
primary key -- if the self-sig is considerd invalid because of, say, an
implementation declining to accept SHA-1 digests, then the primary key
isn't considered signing-capable, which means that signatures made by it
won't be considered valid.

the digest used in the subkey-binding signature is relevant if you want
to be able to receive encrypted mail (e.g. security bug reports).

To fix this, just re-issue the self-sigs and subkey binding signatures
with a stronger digest (at least SHA2-256).

If you're using a modern version of GnuPG that has access to the secret
key, the arcane command to do that is probably something like:

   gpg --cert-digest-algo sha256 --quick-set-expire 
907E790F25C1E8E561CD73B585FF4B43B30FC6F9 0
   gpg --cert-digest-algo sha256 --quick-set-expire 
907E790F25C1E8E561CD73B585FF4B43B30FC6F9 0 '*'

and then re-export and re-publish the OpenPGP certificate wherever it's
published (at least in LIBRESWAN-GPG-KEY.txt in the git repo).

The first line updates the expiration date and re-issues the self-sig
for the primary key, the second handles the subkey binding signature.

Note that leaving the expiration date unset (the "0" above) might itself
be problematic if you ever lose control over the key and you don't have
any revocation certificate handy, but that's a separate question.  i'd
recommend setting an expiration date of "2y" (instead of "0" above), and
then just repeat this process every time you have a release.  Since
releases come out in a less-than-2-year cadence, this should be fine.

But i'd be happy for now with just a primary key with a non-SHA1
self-sig.

Thanks for maintaining libreswan!

   --dkg 

PS here's the diagnosis:

The "sig:.*:2:" lines are SHA1 signatures here:

0 dkg@alice:~$ gpg --with-colons --check-sigs 
907E790F25C1E8E561CD73B585FF4B43B30FC6F9 
tru::1:1652480124:1691085522:3:1:5
pub:-:4096:1:85FF4B43B30FC6F9:1357089367:::-:::scESC::23::0:
fpr:907E790F25C1E8E561CD73B585FF4B43B30FC6F9:
uid:-1357089367::ED0B44951C7DD5295C3DDEF9C67942731B01068E::Libreswan 
(Signing Key) ::0:
sig:!::1:85FF4B43B30FC6F9:1357089367Libreswan (Signing Key) 
:13x:2:
sig:?::1:E71806A6B5CC27E1:1357192633:10x:8:
sig:!::1:C30040228501D2EC:1357583027:10x:2:
sig:!::1:467564B7505DA62B:1420472842:10x:2:
sig:!::1:62D3582FE0FD94D2:1418273023:10x:8:
sig:?::1:CCD2ED94D21739E9:1490035473:155310747310l::0EE5BE979282D80B9F7540F1CCD2ED94D21739E9:::10:
sub:-:4096:1:43CD400C70C28757:1357089367::e::23:
fpr:1CF137415217927923F01BB943CD400C70C28757:
sig:!::1:85FF4B43B30FC6F9:1357089367Libreswan (Signing Key) 
:18x:2:
0 dkg@alice:~$ 


signature.asc
Description: PGP signature
___
Swan-dev mailing list
Swan-dev@lists.libreswan.org
https://lists.libreswan.org/mailman/listinfo/swan-dev


[Swan-dev] [Swan-announce] libreswan-4.7 released, bufix release and EAPTLS support

2022-05-25 Thread The Libreswan Team



-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


The Libreswan Project has released libreswan 4.7

This release adds support for EAPTLS, FreeBSD/NetBSD fixes, and
fixes an interop issue with Android 12.

This latest version of libreswan can be downloaded from:

https://download.libreswan.org/libreswan-4.7.tar.gz
https://download.libreswan.org/libreswan-4.7.tar.gz.asc

The full changelog is available at: https://download.libreswan.org/CHANGES

Please report bugs either via one of the mailinglists or at our github
bug tracker:

https://lists.libreswan.org/
https://github.com/libreswan/libreswan/issues

Binary packages for RHEL/CentOS can be found at:
https://download.libreswan.org/binaries/

Binary packages for Fedora and Debian should be available in their
respective repositories a few days after this release.

See also https://libreswan.org/

v4.7 (May 24, 2022)
* IKEv2: EAPTLS support [Timo Teräs / Andrew]
* IKEv2: EAPONLY support [Andrew]
* IKEv2: fix interop when IPCOMP+transport-mode [Andrew]
* IKEv2: fix race between new IKE SA and liveness [Andrew]
* IKEv2: fix interop with Android 12 + certificates [Andrew]
* IKEv1: reject IKEv2 only authby=secret+rsasig [Andrew]
* config: end keywords with no left/right prefix are applied to both ends
* kernel: fix double delete of kernel policy when tearing down SA [Andrew]
* kernel: fix deleting policy when an XFRMi FD ID; github/618 [Andrew]
* kernel: general cleanups [Andrew]
* _stackmanager / pluto: support Ubuntu 18.04 LTS kernels [Paul]
* FreeBSD: libreswan builds out-of-the-box [Andrew]
* BSD: Add IPv6 support (tested on NetBSD)
* building: fix build on fedora rawhide [Paul]
* internals: initiate IKEv2 CREATE_CHILD_SA exchange using IKE SA [Andrew]
* internals: _updown.bsdkame renamed to _updown.bsd

-BEGIN PGP SIGNATURE-

iQJHBAEBCgAxFiEEkH55DyXB6OVhzXO1hf9LQ7MPxvkFAmKNZU4THHRlYW1AbGli
cmVzd2FuLm9yZwAKCRCF/0tDsw/G+R9+D/wJ5Uu+B52FRaNFg7eLVt5BaUUV41RZ
Sn/SajvO2bp4/4z/uMvBdS9GM/kZQOQGy3wAb0vXKrPsFC8duOt11zcAZBZAIdtn
5H8xbsua1moYVkNV6iTUL5sE4KrxNHjU4H2TNbPfS6RkZmxg1baLHkEvtvDpWfYk
JPDqLK53xykOug2OlyEfby07OCkqcLy0u8RdncHkcPzleiDZ4GKq5Xpm5OjrCplN
9roPz/rfNXmkCP6CCYAGJ0UFObhNx6evmlTISlp6FRCFqgiDAGh7QAu/FuB6jMVj
BwKKR6mOHRifLQ4TqOZHhDCw093tvP2/ILzTUg8eVG1bwY1ZkQwjza0MxmdX0GRD
lJJGbh6xWf5KzUt15aHChOJYVwSt6zQZfTZyEny1JgFdrAtkDqlw9AeA2P/jD+86
w/yb8um7AKGgpbqdbilyxLYwE1PHq4ZTB9u/K2p02/3atHP7nny2Brc9EtVcRi+B
GH10ozz3XBR+k+vT5w/yBGItbj4uifyYuaq4SbMFtNx7KdqKnZ/61HKShW/6Io9C
unwS0wB03iNSc8oVC2ND9jkwFdnLSghXP97SVUA8UuWoUmLYqLOTDGSWimL4h26F
NrSabXUwO/6PA/yzpfMUaRkRmnDM/sflRbqcDxjwZDvQMFZjrpdGD+f8OKryL8/Y
aifVQk9hA3hWTw==
=WRxr
-END PGP SIGNATURE-
___
Swan-announce mailing list
swan-annou...@lists.libreswan.org
https://lists.libreswan.org/mailman/listinfo/swan-announce
___
Swan-dev mailing list
Swan-dev@lists.libreswan.org
https://lists.libreswan.org/mailman/listinfo/swan-dev


Re: [Swan-dev] Libreswan basic questions

2022-05-25 Thread Paul Wouters
On May 24, 2022, at 20:34, Balaji Thoguluva  wrote:
> 
> 
> Thanks Paul.
> 
> Further question.
> 
> Suppose I have a socket descriptor already created for a local interface 
> which can be used to send and receive IKE packets to an external IKE peer. 
> 
> Can pluto daemon be configured with the specific socket descriptor (per IPsec 
> connection configuration) that can be used by pluto to send and receive IKE 
> packets?

That is currently not supported. I believe a few years ago someone wrote a 
socket activation systemd patch but it was not accepted.

Paul
___
Swan-dev mailing list
Swan-dev@lists.libreswan.org
https://lists.libreswan.org/mailman/listinfo/swan-dev