Bug#1109942: strongswan-charon: upgrade to 6.0.1-6 causes "key derivation failed" error with older versions

2025-08-16 Thread Yves-Alexis Perez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Wed, 2025-08-13 at 19:13 +0200, Tobias Brunner wrote:
> > [1]
> > https://github.com/strongswan/strongswan/commit/2dbeecfc029ba26647c756b0882bc6e85e2e6b64
> > [2]
> > https://github.com/strongswan/strongswan/commit/43b805b2daed48bdf835ca8eeb87b9b71a42781f
> 
> It might be a good idea to apply these two patches to 6.0.1 in trixie,
> in order to avoid that everybody has to install
> libstrongswan-extra-plugins just for the kdf plugin.

Thanks for the heads up Tobias, I'll try to prepare updated packages for
Trixie in the following weeks.

Regards,
- -- 
Yves-Alexis
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAmigUxUACgkQ3rYcyPpX
RFt8CwgA1Uu+K65YeauuQ4Bu4WG5OnfJ264aY7pelYlrvyXys8UPip5OfIVE/5aB
YGmF6APlO3lcFT3RoLKnG8c8pgmKA5XAm9aulhNub1tqHmTnCX9m0Gddv3jQdXCS
x4iRv4/zg4yxk0No66IKPnmQi3pNHWEWPNJXtnZZn8sRpDG/pIh/hLIxZ0zUIcZa
avjbJnPS/rWeVRzU4QleqUUjHhng7snrXu3rN8Xe8M9760bvbb9gytGTh9rMO+i5
zC4BsZ3ax8z9QC/j+aoNhAVP7drox/fp8E6v2j0YyYuWl+q1C7kP/NZJ+wCrpui6
EjQ1VFCf/zX0Ya6tPKveHMB6C8k/sQ==
=uXEc
-END PGP SIGNATURE-



Bug#1109942: strongswan-charon: upgrade to 6.0.1-6 causes "key derivation failed" error with older versions

2025-08-13 Thread Tobias Brunner
Dear Maintainers,

>> One of our servers got its strongswan-charon package upgraded from 
>> 6.0.1-5 to 6.0.1-6 last night. It has ipsec connections to another 
>> trixie machine that's still using 6.0.1-5 and to a bookworm machine 
>> that's using 5.9.8-5+deb12u1
>>
>> No changes to the configuration happened for a while. Since the upgrade 
>> happened, the host with 6.0.1-6 can't establish connection to the other 
>> two hosts anymore. If I start the connection manually I can see the 
>> followup output (peer IP replaced by 1.2.3.4; local IP replaced by 1.2.1.2):
>>
>> ipsec up connection-name
>> initiating IKE_SA connection-name[6] to 1.2.3.4
>> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) 
>> N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
>> sending packet: from 1.2.1.2[500] to 1.2.3.4[500] (972 bytes)
>> received packet: from 1.2.3.4[500] to 1.2.1.2[500] (280 bytes)
>> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) 
>> N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
>> selected proposal: 
>> IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
>> KDF_PRF with PRF_HMAC_SHA2_256 not supported
>> key derivation failed
>> establishing connection 'connection-name' failed
>>
>>
>> Is this an expected compatibility break or is that an unexpected regression?
> 
> If you have OpenSSL 3.5.1 installed, then this is unfortunately
> expected.  It requires the patches at [1] and [2], which were released
> with 6.0.2.
>
> Regards,
> Tobias
> 
> [1]
> https://github.com/strongswan/strongswan/commit/2dbeecfc029ba26647c756b0882bc6e85e2e6b64
> [2]
> https://github.com/strongswan/strongswan/commit/43b805b2daed48bdf835ca8eeb87b9b71a42781f

It might be a good idea to apply these two patches to 6.0.1 in trixie,
in order to avoid that everybody has to install
libstrongswan-extra-plugins just for the kdf plugin.

Also, the problem could technically also occur on bookworm as the
OpenSSL guys have backported their "fix" to 3.0.17 for some reason.  The
difference there is that the kdf plugin is installed by default via
libstrongswan package, while the openssl plugin is shipped separately in
libstrongswan-standard-plugins.  So it will only be a problem if the kdf
plugin is explicitly disabled in the config.

Regards,
Tobias



Bug#1109942: strongswan-charon: upgrade to 6.0.1-6 causes "key derivation failed" error with older versions

2025-08-04 Thread Harald Dunkel
FTR, the workaround is to install the libstrongswan-extra-plugins
package, including the kdf plugin.

Regards
Harri



Bug#1109942: strongswan-charon: upgrade to 6.0.1-6 causes "key derivation failed" error with older versions

2025-07-28 Thread Gabriel Filion

Close: 1109942
thanks


We ended up figuring out that the problem was on our side. I'm not sure 
what actually caused this situation, but a reboot fixed the problem.


So there was actually no issue with the contents of the strongswan 
package. sorry for the noise!



On 2025-07-28 01:58, Tobias Brunner wrote:

Hi Gabriel,


One of our servers got its strongswan-charon package upgraded from
6.0.1-5 to 6.0.1-6 last night. It has ipsec connections to another
trixie machine that's still using 6.0.1-5 and to a bookworm machine
that's using 5.9.8-5+deb12u1

No changes to the configuration happened for a while. Since the upgrade
happened, the host with 6.0.1-6 can't establish connection to the other
two hosts anymore. If I start the connection manually I can see the
followup output (peer IP replaced by 1.2.3.4; local IP replaced by 1.2.1.2):

ipsec up connection-name
initiating IKE_SA connection-name[6] to 1.2.3.4
generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP)
N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
sending packet: from 1.2.1.2[500] to 1.2.3.4[500] (972 bytes)
received packet: from 1.2.3.4[500] to 1.2.1.2[500] (280 bytes)
parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP)
N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
selected proposal:
IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
KDF_PRF with PRF_HMAC_SHA2_256 not supported
key derivation failed
establishing connection 'connection-name' failed


Is this an expected compatibility break or is that an unexpected regression?


If you have OpenSSL 3.5.1 installed, then this is unfortunately
expected.  It requires the patches at [1] and [2], which were released
with 6.0.2.

Regards,
Tobias

[1]
https://github.com/strongswan/strongswan/commit/2dbeecfc029ba26647c756b0882bc6e85e2e6b64
[2]
https://github.com/strongswan/strongswan/commit/43b805b2daed48bdf835ca8eeb87b9b71a42781f




Bug#1109942: strongswan-charon: upgrade to 6.0.1-6 causes "key derivation failed" error with older versions

2025-07-27 Thread Tobias Brunner
Hi Gabriel,

> One of our servers got its strongswan-charon package upgraded from 
> 6.0.1-5 to 6.0.1-6 last night. It has ipsec connections to another 
> trixie machine that's still using 6.0.1-5 and to a bookworm machine 
> that's using 5.9.8-5+deb12u1
> 
> No changes to the configuration happened for a while. Since the upgrade 
> happened, the host with 6.0.1-6 can't establish connection to the other 
> two hosts anymore. If I start the connection manually I can see the 
> followup output (peer IP replaced by 1.2.3.4; local IP replaced by 1.2.1.2):
> 
> ipsec up connection-name
> initiating IKE_SA connection-name[6] to 1.2.3.4
> generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) 
> N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
> sending packet: from 1.2.1.2[500] to 1.2.3.4[500] (972 bytes)
> received packet: from 1.2.3.4[500] to 1.2.1.2[500] (280 bytes)
> parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) 
> N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
> selected proposal: 
> IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256
> KDF_PRF with PRF_HMAC_SHA2_256 not supported
> key derivation failed
> establishing connection 'connection-name' failed
> 
> 
> Is this an expected compatibility break or is that an unexpected regression?

If you have OpenSSL 3.5.1 installed, then this is unfortunately
expected.  It requires the patches at [1] and [2], which were released
with 6.0.2.

Regards,
Tobias

[1]
https://github.com/strongswan/strongswan/commit/2dbeecfc029ba26647c756b0882bc6e85e2e6b64
[2]
https://github.com/strongswan/strongswan/commit/43b805b2daed48bdf835ca8eeb87b9b71a42781f



Bug#1109942: strongswan-charon: upgrade to 6.0.1-6 causes "key derivation failed" error with older versions

2025-07-26 Thread Gabriel Filion

Package: strongswan-charon
Version: 6.0.1-6
Severity: important

Hello!

One of our servers got its strongswan-charon package upgraded from 
6.0.1-5 to 6.0.1-6 last night. It has ipsec connections to another 
trixie machine that's still using 6.0.1-5 and to a bookworm machine 
that's using 5.9.8-5+deb12u1


No changes to the configuration happened for a while. Since the upgrade 
happened, the host with 6.0.1-6 can't establish connection to the other 
two hosts anymore. If I start the connection manually I can see the 
followup output (peer IP replaced by 1.2.3.4; local IP replaced by 1.2.1.2):


ipsec up connection-name
initiating IKE_SA connection-name[6] to 1.2.3.4
generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) 
N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]

sending packet: from 1.2.1.2[500] to 1.2.3.4[500] (972 bytes)
received packet: from 1.2.3.4[500] to 1.2.1.2[500] (280 bytes)
parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) 
N(FRAG_SUP) N(HASH_ALG) N(CHDLESS_SUP) N(MULT_AUTH) ]
selected proposal: 
IKE:AES_CBC_128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256

KDF_PRF with PRF_HMAC_SHA2_256 not supported
key derivation failed
establishing connection 'connection-name' failed


Is this an expected compatibility break or is that an unexpected regression?


-- System Information:
Debian Release: 13.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.12.38+deb13-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8), LANGUAGE 
not set

Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages strongswan-charon depends on:
ii  debconf [debconf-2.0]  1.5.91
ii  iproute2   6.15.0-1
ii  libc6  2.41-10
pn  libstrongswan  
pn  strongswan-libcharon   
pn  strongswan-starter 

strongswan-charon recommends no packages.

strongswan-charon suggests no packages.