- Issued:
- 2014-10-13
- Updated:
- 2014-10-13
RHBA-2014:1588 - Bug Fix Advisory
Synopsis
openswan bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated openswan packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 6.
Description
Openswan is a free implementation of Internet Protocol Security (IPsec) and
Internet Key Exchange (IKE). IPsec uses strong cryptography to provide both
authentication and encryption services that allow to build secure tunnels
through untrusted networks.
This update fixes the following bugs:
- When using the protoport option in combination with the type=passthrough
setting to exclude traffic from encryption, an incorrect inverse policy was
installed and the exclusion was not successful. Now, the correct policy is
installed in the described situation. (BZ#739949)
- Starting multiple connections with the leftsubnets= or auto=start options led
to a crypto overload and subsequent restart of Openswan. The pluto cryptohelper
has been fixed to prevent the overload. (BZ#834397)
- The ikev2=insist setting was not enforced on the responder side, allowing an
IKEv1 connection to be established instead. This bug has been fixed and
ikev2=insist is no longer ignored. (BZ#970279)
- This update fixes multiple lingering states after reestablishing IKEv2 keys.
(BZ#970349)
- This update enforces the limits set with esp, phase1alg, and andphase2alg
options. Previously, any algorithm of the default set (aes, 3des, sha1, md5) was
always allowed, regardless of the above options. (BZ#988106)
- IKEv2 delete payloads were not always properly delivered to the remote
peer, leaving the remote endpoint with lingering unused connections. Now, IKEv2
delete payloads are delivered as expected. (BZ#993124)
- This update modifies the rightid=%fromcert option to load IDs from the local
certificate when set for the local end, and from the certificate delivered by
the remote peer when set for the peer end. (BZ#1002708)
- The "ipsec ikeping" command did not recognize the --exchangenum option. This
option is now recognized correctly. (BZ#1019746)
- This update fixes a crash of the IKE pluto daemon when using the SHA2
encryption family with the ike= option with IKEv2. (BZ#1021961)
- Openswan no longer drops various privileges too soon, which prevented it from
reading configuration files in directories not owned by root. (BZ#1041576)
- The IKE pluto daemon occasionally crashed and restarted when referencing
missing IKEv2 payloads. The Openswan's state machine has been updated to reject
packets with missing payloads. (BZ#1050340)
- This update fixes the compatibility problems with older versions of Cisco VPN
introduced in the previous update of the openswan packages. (BZ#1070356)
- After restarting the remote endpoint, the sourceip option was not properly
reset in the local route entry. This bug has been fixed. (BZ#1088656)
- If there was no NSS database available, the IKE pluto daemon
created a nonfunctional replacement. A missing NSS database is now created
before the pluto daemon starts and in the %post phase of the package install,
which fixes this bug. (BZ#1092913)
- The "ipsec newhostkey" command did not return a correct non-zero exit code in
case of failure, for example when generating keys of insufficient strength. Now,
ipsec newhostkey returns the correct exit code. (BZ#1098473)
- Configuring an AH algorithm for IKEv2, or various non-standard ESP algorithms
for IKEv1 or IKEv2 (such as CAST, RIPEMD160 or CAMELLIA) caused the IKE pluto
daemon to terminate unexpectedly and restart. This bug has been fixed and pluto
no longer crashes when AH or ESP algorithms are configured. (BZ#1114683)
- Using the "force_busy=yes" developer option to force anti-DDOS mode in IKEv2
caused the IKE pluto daemon to crash and restart. This bug has been fixed and
pluto no longer crashes in the described situation.
(BZ#1126066)
In addition, this update adds the following enhancements:
- This update enhances and clarifies man pages shipped with the openswan
packages. (BZ#730975, BZ#1018327, BZ#1099871, BZ#1105179)
Users of openswan are advised to upgrade to these updated packages, which fix
these bugs and add these enhancements.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x
Fixes
- BZ - 730975 - Openswan doesn't work with ike=modp1536 option
- BZ - 739949 - Openswan net-to-net not work with unencrypted connection on specific port, when all other connections are encrypt.
- BZ - 834397 - ikev2 crashes when firing up a few conns at once
- BZ - 1018327 - ipsec.conf man page lacks example for AES-GCM configuration
- BZ - 1019746 - ipsec ikeping does not recognize --exchangenum parameter
- BZ - 1021961 - pluto abort when using SHA2_{384,512} IKE encryption algorithm
- BZ - 1041576 - Due to lack of CAP_DAC_OVERRIDE, pluto cannot write to directories not owned by root
- BZ - 1070356 - openswan breaks NAT-T draft clients (and possibly ike fragmentation)
- BZ - 1092913 - The default nss database created by ipsec can not be used
- BZ - 1098473 - ipsec newhostkey returns 0 even if it fails and allows new RSA keys < 2048
- BZ - 1099871 - Missing man-page ipsec_whack
- BZ - 1105179 - ipsec_auto --ready doesn't work properly
- BZ - 1114683 - configuring a non-standard AH / ESP algorithm (like CAST) cause a restart of pluto
- BZ - 1126066 - dcookie code enabled with force_busy=yes uses bad pointer causing restart
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
openswan-2.6.32-37.el6.src.rpm | SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb |
x86_64 | |
openswan-2.6.32-37.el6.x86_64.rpm | SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d |
openswan-2.6.32-37.el6.x86_64.rpm | SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d |
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm | SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368 |
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm | SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368 |
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm | SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368 |
openswan-doc-2.6.32-37.el6.x86_64.rpm | SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1 |
openswan-doc-2.6.32-37.el6.x86_64.rpm | SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1 |
i386 | |
openswan-2.6.32-37.el6.i686.rpm | SHA-256: 169652516307c2c6a2144b2725bf3b159be088fe9a73d46cd3f748f37d640213 |
openswan-debuginfo-2.6.32-37.el6.i686.rpm | SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa |
openswan-debuginfo-2.6.32-37.el6.i686.rpm | SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa |
openswan-doc-2.6.32-37.el6.i686.rpm | SHA-256: b05822e7416b3ebe8c7643f950db59d6cffd74d4cdc5e06dc1dc87493790afc9 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
openswan-2.6.32-37.el6.src.rpm | SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb |
x86_64 | |
openswan-2.6.32-37.el6.x86_64.rpm | SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d |
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm | SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368 |
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm | SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368 |
openswan-doc-2.6.32-37.el6.x86_64.rpm | SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1 |
i386 | |
openswan-2.6.32-37.el6.i686.rpm | SHA-256: 169652516307c2c6a2144b2725bf3b159be088fe9a73d46cd3f748f37d640213 |
openswan-debuginfo-2.6.32-37.el6.i686.rpm | SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa |
openswan-debuginfo-2.6.32-37.el6.i686.rpm | SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa |
openswan-doc-2.6.32-37.el6.i686.rpm | SHA-256: b05822e7416b3ebe8c7643f950db59d6cffd74d4cdc5e06dc1dc87493790afc9 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
openswan-2.6.32-37.el6.src.rpm | SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb |
i386 | |
openswan-2.6.32-37.el6.i686.rpm | SHA-256: 169652516307c2c6a2144b2725bf3b159be088fe9a73d46cd3f748f37d640213 |
openswan-debuginfo-2.6.32-37.el6.i686.rpm | SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa |
openswan-debuginfo-2.6.32-37.el6.i686.rpm | SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa |
openswan-doc-2.6.32-37.el6.i686.rpm | SHA-256: b05822e7416b3ebe8c7643f950db59d6cffd74d4cdc5e06dc1dc87493790afc9 |
x86_64 | |
openswan-2.6.32-37.el6.x86_64.rpm | SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d |
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm | SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368 |
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm | SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368 |
openswan-doc-2.6.32-37.el6.x86_64.rpm | SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1 |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
openswan-2.6.32-37.el6.src.rpm | SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb |
s390x | |
openswan-2.6.32-37.el6.s390x.rpm | SHA-256: 498bbf4886d3816b830a86b001a7d73e9e62cec5820349f79480affd87080631 |
openswan-debuginfo-2.6.32-37.el6.s390x.rpm | SHA-256: fc0b2a48d96ccf9a1288f5c76162b56f8243b4e6d9c0da55d6b597c86e18d266 |
openswan-debuginfo-2.6.32-37.el6.s390x.rpm | SHA-256: fc0b2a48d96ccf9a1288f5c76162b56f8243b4e6d9c0da55d6b597c86e18d266 |
openswan-doc-2.6.32-37.el6.s390x.rpm | SHA-256: 79b3da9fb554c6403e76915c7fb83264b88647d07a434f07010c5e8d4076a0a5 |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
openswan-2.6.32-37.el6.src.rpm | SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb |
ppc64 | |
openswan-2.6.32-37.el6.ppc64.rpm | SHA-256: 711e9c7044441a785145b024ac025c286bdb05b81281e326ce34e97235b003ae |
openswan-debuginfo-2.6.32-37.el6.ppc64.rpm | SHA-256: 296d784f8faddce5693d12c2b9c1212e2f0ac3b8a506e40543c23ab01b4e49df |
openswan-debuginfo-2.6.32-37.el6.ppc64.rpm | SHA-256: 296d784f8faddce5693d12c2b9c1212e2f0ac3b8a506e40543c23ab01b4e49df |
openswan-doc-2.6.32-37.el6.ppc64.rpm | SHA-256: c0fd038b5d21ae01eed69669fdfc615bd87099af38f0a9a3af411b6033f60843 |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
openswan-2.6.32-37.el6.src.rpm | SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb |
x86_64 | |
openswan-2.6.32-37.el6.x86_64.rpm | SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d |
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm | SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368 |
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm | SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368 |
openswan-doc-2.6.32-37.el6.x86_64.rpm | SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1 |
i386 | |
openswan-2.6.32-37.el6.i686.rpm | SHA-256: 169652516307c2c6a2144b2725bf3b159be088fe9a73d46cd3f748f37d640213 |
openswan-debuginfo-2.6.32-37.el6.i686.rpm | SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa |
openswan-debuginfo-2.6.32-37.el6.i686.rpm | SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa |
openswan-doc-2.6.32-37.el6.i686.rpm | SHA-256: b05822e7416b3ebe8c7643f950db59d6cffd74d4cdc5e06dc1dc87493790afc9 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
openswan-2.6.32-37.el6.src.rpm | SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb |
x86_64 | |
openswan-2.6.32-37.el6.x86_64.rpm | SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d |
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm | SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368 |
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm | SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368 |
openswan-doc-2.6.32-37.el6.x86_64.rpm | SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1 |
i386 | |
openswan-2.6.32-37.el6.i686.rpm | SHA-256: 169652516307c2c6a2144b2725bf3b159be088fe9a73d46cd3f748f37d640213 |
openswan-debuginfo-2.6.32-37.el6.i686.rpm | SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa |
openswan-debuginfo-2.6.32-37.el6.i686.rpm | SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa |
openswan-doc-2.6.32-37.el6.i686.rpm | SHA-256: b05822e7416b3ebe8c7643f950db59d6cffd74d4cdc5e06dc1dc87493790afc9 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6
SRPM | |
---|---|
openswan-2.6.32-37.el6.src.rpm | SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb |
s390x | |
openswan-2.6.32-37.el6.s390x.rpm | SHA-256: 498bbf4886d3816b830a86b001a7d73e9e62cec5820349f79480affd87080631 |
openswan-debuginfo-2.6.32-37.el6.s390x.rpm | SHA-256: fc0b2a48d96ccf9a1288f5c76162b56f8243b4e6d9c0da55d6b597c86e18d266 |
openswan-debuginfo-2.6.32-37.el6.s390x.rpm | SHA-256: fc0b2a48d96ccf9a1288f5c76162b56f8243b4e6d9c0da55d6b597c86e18d266 |
openswan-doc-2.6.32-37.el6.s390x.rpm | SHA-256: 79b3da9fb554c6403e76915c7fb83264b88647d07a434f07010c5e8d4076a0a5 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
openswan-2.6.32-37.el6.src.rpm | SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb |
x86_64 | |
openswan-2.6.32-37.el6.x86_64.rpm | SHA-256: c518fcbf78b5241ecf6d89be7a4170d9136eee6a1c79048bf10e929559591a1d |
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm | SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368 |
openswan-debuginfo-2.6.32-37.el6.x86_64.rpm | SHA-256: 33bfa9a49c65170485b8bb3d12a7cb7a5e10e2eb94e23c0463b6e7f6f31ca368 |
openswan-doc-2.6.32-37.el6.x86_64.rpm | SHA-256: bc7d0b0f021eddc12d494672cfc47f5af6d9851f9ac25c57c7211f5725a75eb1 |
i386 | |
openswan-2.6.32-37.el6.i686.rpm | SHA-256: 169652516307c2c6a2144b2725bf3b159be088fe9a73d46cd3f748f37d640213 |
openswan-debuginfo-2.6.32-37.el6.i686.rpm | SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa |
openswan-debuginfo-2.6.32-37.el6.i686.rpm | SHA-256: 00867db59aabd0164f1543081b3f318d18faffda553e0d87274ba1a0f3433aaa |
openswan-doc-2.6.32-37.el6.i686.rpm | SHA-256: b05822e7416b3ebe8c7643f950db59d6cffd74d4cdc5e06dc1dc87493790afc9 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6
SRPM | |
---|---|
openswan-2.6.32-37.el6.src.rpm | SHA-256: 9be1a174d7435e2884eb88fc81afd187a2f3a2537314866c33801c4a9de196bb |
s390x | |
openswan-2.6.32-37.el6.s390x.rpm | SHA-256: 498bbf4886d3816b830a86b001a7d73e9e62cec5820349f79480affd87080631 |
openswan-debuginfo-2.6.32-37.el6.s390x.rpm | SHA-256: fc0b2a48d96ccf9a1288f5c76162b56f8243b4e6d9c0da55d6b597c86e18d266 |
openswan-debuginfo-2.6.32-37.el6.s390x.rpm | SHA-256: fc0b2a48d96ccf9a1288f5c76162b56f8243b4e6d9c0da55d6b597c86e18d266 |
openswan-doc-2.6.32-37.el6.s390x.rpm | SHA-256: 79b3da9fb554c6403e76915c7fb83264b88647d07a434f07010c5e8d4076a0a5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.