[Bug 1448870] Re: Certificate policies cause rejections

2016-02-18 Thread Launchpad Bug Tracker
This bug was fixed in the package strongswan - 5.3.5-1ubuntu1

---
strongswan (5.3.5-1ubuntu1) xenial; urgency=medium

  * debian/{rules,control,libstrongswan-extra-plugins.install}
Enable bliss plugin
  * debian/{rules,control,libstrongswan-extra-plugins.install}
Enable chapoly plugin
  * debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch
Upstream suggests to not load this plugin by default as it has
some limitations.
https://wiki.strongswan.org/projects/strongswan/wiki/Kernel-libipsec
  * debian/patches/increase-bliss-test-timeout.patch
Under QEMU/KVM for autopkgtest bliss test takes a bit longer then default
  * Update Apparmor profiles
- usr.lib.ipsec.charon
  - add capability audit_write for xauth-pam (LP: #1470277)
  - add capability dac_override (needed by agent plugin)
  - allow priv dropping (LP: #1333655)
  - allow caching CRLs (LP: #1505222)
  - allow rw access to /dev/net/tun for kernel-libipsec (LP: #1309594)
- usr.lib.ipsec.stroke
  - allow priv dropping (LP: #1333655)
  - add local include
- usr.lib.ipsec.lookip
  - add local include
  * Merge from Debian, which includes fixes for all previous CVEs
Fixes (LP: #1330504, #1451091, #1448870, #1470277)
Remaining changes:
  * debian/control
- Lower dpkg-dev to 1.16.1 from 1.16.2 to enable backporting to Precise
- Update Maintainer for Ubuntu
- Add build-deps
  - dh-apparmor
  - iptables-dev
  - libjson0-dev
  - libldns-dev
  - libmysqlclient-dev
  - libpcsclite-dev
  - libsoup2.4-dev
  - libtspi-dev
  - libunbound-dev
- Drop build-deps
  - libfcgi-dev
  - clearsilver-dev
- Create virtual packages for all strongswan-plugin-* for dist-upgrade
- Set XS-Testsuite: autopkgtest
  * debian/rules:
- Enforcing DEB_BUILD_OPTIONS=nostrip for library integrity checking.
- Set TESTS_REDUCED_KEYLENGTHS to one generate smallest key-lengths in
  tests.
- Change init/systemd program name to strongswan
- Install AppArmor profiles
- Removed pieces on 'patching ipsec.conf' on build.
- Enablement of features per Ubuntu current config suggested from
  upstream recommendation
- Unpack and sort enabled features to one-per-line
- Disable duplicheck as per
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718291#10
- Disable libfast (--disable-fast):
  Requires dropping medsrv, medcli plugins which depend on libfast
- Add configure options
  --with-tss=trousers
- Remove configure options:
  --enable-ha (requires special kernel)
  --enable-unit-test (unit tests run by default)
- Drop logcheck install
  * debian/tests/*
- Add DEP8 test for strongswan service and plugins
  * debian/strongswan-starter.strongswan.service
- Add new systemd file instead of patching upstream
  * debian/strongswan-starter.links
- removed, use Ubuntu systemd file instead of linking to upstream
  * debian/usr.lib.ipsec.{charon, lookip, stroke}
- added AppArmor profiles for charon, lookip and stroke
  * debian/libcharon-extra-plugins.install
- Add plugins
  - kernel-libipsec.{so, lib, conf, apparmor}
- Remove plugins
  - libstrongswan-ha.so
- Relocate plugins
  - libstrongswan-tnc-tnccs.so (strongswan-tnc-base.install)
  * debian/libstrongswan-extra-plugins.install
- Add plugins (so, lib, conf)
  - acert
  - attr-sql
  - coupling
  - dnscert
  - fips-prf
  - gmp
  - ipseckey
  - load-tester
  - mysql
  - ntru
  - radattr
  - soup
  - sqlite
  - sql
  - systime-fix
  - unbound
  - whitelist
- Relocate plugins (so, lib, conf)
  - ccm (libstrongswan.install)
  - test-vectors (libstrongswan.install)
  * debian/libstrongswan.install
- Sort sections
- Add plugins (so, lib, conf)
  - libchecksum
  - ccm
  - eap-identity
  - md4
  - test-vectors
  * debian/strongswan-charon.install
- Add AppArmor profile for charon
  * debian/strongswan-starter.install
- Add tools, manpages, conf
  - openac
  - pool
  - _updown_espmark
- Add AppArmor profile for stroke
  * debian/strongswan-tnc-base.install
- Add new subpackage for TNC
- remove non-existent (dropped in 5.2.1) libpts library files
  * debian/strongswan-tnc-client.install
- Add new subpackage for TNC
  * debian/strongswan-tnc-ifmap.install
- Add new subpackage for TNC
  * debian/strongswan-tnc-pdp.install
- Add new subpackage for TN

[Bug 1448870] Re: Certificate policies cause rejections

2016-01-07 Thread Simon Déziel
This is upstream bug https://wiki.strongswan.org/issues/453 which was
fixed with the 5.2.2 release.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to strongswan in Ubuntu.
https://bugs.launchpad.net/bugs/1448870

Title:
  Certificate policies cause rejections

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/strongswan/+bug/1448870/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1448870] Re: Certificate policies cause rejections

2015-04-27 Thread Ubuntu Foundations Team Bug Bot
The attachment "0001-constraints-Don-t-reject-certificates-with-
invalid-c.patch" seems to be a patch.  If it isn't, please remove the
"patch" flag from the attachment, remove the "patch" tag, and if you are
a member of the ~ubuntu-reviewers, unsubscribe the team.

[This is an automated message performed by a Launchpad user owned by
~brian-murray, for any issues please contact him.]

** Tags added: patch

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to strongswan in Ubuntu.
https://bugs.launchpad.net/bugs/1448870

Title:
  Certificate policies cause rejections

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/strongswan/+bug/1448870/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1448870] Re: Certificate policies cause rejections

2015-04-27 Thread Richard Laager
** Description changed:

  If a certificate has a policy, strongswan rejects it unless every
  certificate up the chain has the same policy. For certificates issued by
  CAs today, this is not a valid assumption. This assumption results in my
  Ubuntu laptop being unable to connect to my workplace VPN (which is
  actually also Ubuntu strongswan, but that's irrelevant).
  
  The attached patch from upstream git fixes the problem by changing the
  validation behavior. From the upstream commit message:
  
  --
  
  Instead of rejecting the certificate completely if a certificate has a
  policy OID that is actually not allowed by the issuer CA, we accept it.
  However, the certificate policy itself is still considered invalid, and
  is not returned in the auth config resulting from trust chain
  operations.
  
  A user must make sure to rely on the returned auth config certificate
  policies instead of the policies contained in the certificate; even if
  the certificate is valid, the policy OID itself in the certificate are
  not to be trusted anymore.
  
  --
  
  This patch applies exactly from upstream to strongswan in Vivid. It can
  be trivially backported to Precise (which I've done and tested). I did
- not test any versions in the middle.
+ not specifically test it on any versions in the middle.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to strongswan in Ubuntu.
https://bugs.launchpad.net/bugs/1448870

Title:
  Certificate policies cause rejections

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/strongswan/+bug/1448870/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs