strongswan 6.0.6
security/strongswan
Open Source IKEv2 IPsec-based VPN solution
Description
Strongswan is an open source IPsec-based VPN solution. Strongswan for FreeBSD implements both the IKEv1 and IKEv2 (RFC 5996) key exchange protocols.
Dependencies
- build devel/pkgconf
- lib ftp/curl
Commit History
may be incomplete — full history at freebsd-ports on GitHub
| Commit | Credits | Log message |
|---|---|---|
|
6.0.6
3b628bd6b8
files touched
|
Vladimir Druzenko (vvd) |
security/strongswan: Update 6.0.5 => 6.0.6 (fix 7 CVEs)
Changelog: https://github.com/strongswan/strongswan/releases/tag/6.0.6 PR: 294718 Approved by: blanket (fix CVEs) Security: CVE-2026-35328 Security: CVE-2026-35329 Security: CVE-2026-35330 Security: CVE-2026-35331 Security: CVE-2026-35332 Security: CVE-2026-35333 Security: CVE-2026-35334 Sponsored by: UNIS Labs MFH: 2026Q2 |
|
6.0.5
fb347f7775
files touched
|
Mike Bressem (mike) |
security/strongswan: Enable ML plugin by default to allow Post-Quantum Key Exchange Methods
Currently ML-DSA (used for Digital Signatures) is a draft in strongswan (ETA Version 6.1.0 or later). So CNSA 2.0 cannot be fully supported yet. https://linux-ipsec.org/slides/2025/steffen-pqc-auth-for-ikev2.pdf But most firewalls (Palo Alto / Fortigate) already support ML-KEM Key Exchange in addition to standard proposals. E.g. aes128gcm16-ecp256-ke1_mlkem512. More details: https://docs.strongswan.org/docs/latest/config/proposals.html PR: 294305 Approved by: strongswan@Nanoteq.com (maintainer, timeout 2 weeks) Sponsored by: UNIS Labs |
|
6.0.5
2d6221ae7d
files touched
|
Vladimir Druzenko (vvd) |
security/strongswan: Update 6.0.4 => 6.0.5 (CVE-2026-25075)
Changelog: https://github.com/strongswan/strongswan/releases/tag/6.0.5 While here: - Switch from post-install + "if PORT_OPTIONS:MVICI" to post-install-VICI-on. - Add option FIPS_PRF - software implementation plugin. - Improve plist. - Refresh patches. Reported by: Mike Bressem <mike@bressem.com> (via email) Approved by: blanket (fix CVE) Security: CVE-2026-25075 Sponsored by: UNIS Labs MFH: 2026Q2 |
|
6.0.4
f1fee394ea
files touched
|
topical (topical) |
security/strongswan: Update 6.0.3 => 6.0.4
Changelog: https://github.com/strongswan/strongswan/releases/tag/6.0.4 PR: 293003 Approved by: strongswan@Nanoteq.com (maintainer, timeout > 3 weeks) MFH: 2026Q1 |
|
6.0.3
5b3e57e136
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Fix plist
Error: Orphaned: %%ETCDIR%%.d/iptfs.conf.sample Error: Orphaned: %%DATADIR%%/templates/config/strongswan.d/iptfs.conf PR: 290828 Approved by: blanket, just fix it |
|
6.0.3
c3584a2ee5
files touched
|
R. Christian McDonald (rcm) |
security/strongswan: Update to 6.0.3
ChangeLog:
https://github.com/strongswan/strongswan/releases/tag/6.0.3
PR: 290578
Reviewed by: brd
MFH: 2025Q4
Security: CVE-2025-62291
Sponsored by: Rubicon Communications, LLC ("Netgate")
|
|
6.0.1
4ebd4846a1
files touched
|
Kurt Jaeger (pi) |
security/strongswan: update 6.0.0 -> 6.0.1
PR: 286928 Changes: https://github.com/strongswan/strongswan/releases/tag/6.0.1 Approved by: strongswan@Nanoteq.com (maintainer timeout) |
|
6.0.0
de8342c344
files touched
|
kwf (kwf) |
security/strongswan: Allow old stroke interface to be enabled
Note that strongSwan has deprecated the stroke management interface for years, and it is recommended to migrate the configuration to vici before it is removed. PR: 285049 |
|
6.0.0
68fd439e6a
files touched
|
kwf (kwf) |
security/strongswan: Update 5.9.14 => 6.0.0
Changelog: https://github.com/strongswan/strongswan/releases/tag/6.0.0 Remove GNU_CONFIGURE_MANPREFIX. PR: 284947 |
|
5.9.14
825afe0bb4
files touched
|
Olivier Cochard (olivier) |
security/strongswan: fix build on current
Backport upstream commit a7f617ab3328153939cb757a5cf9001071ef8720 PR: 280435 Approved by: kwf@nanoteq.com (maintainer) |
|
5.9.14
32cab2d7dc
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Update to 5.9.14
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.14 PR: 278137 Reported by: jlduran@gmail.com Approved by: strongswan@Nanoteq.com (maintainer, timeout > 2 weeks) |
|
5.9.13
53f3494abb
files touched
|
Muhammad Moinur Rahman (bofh) |
security/strongswan: Moved man to share/man
Approved by: portmgr (blanket) |
|
5.9.13
9d8accbe0c
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Update to 5.9.13
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.13 PR: 275620 Reported by: jlduran@gmail.com MFH: 2023Q4 (security fix) Security: CVE-2023-41913 |
|
5.9.11
4e2c0382dd
files touched
|
Eugene Grosbein (eugen) |
security/strongswan: fix CVE-2023-41913
This is urgent change adding official patch https://download.strongswan.org/security/CVE-2023-41913/strongswan-5.9.7-5.9.11_charon_tkm_dh_len.patch that is identical to the change made for strongswan-5.9.12: https://github.com/strongswan/strongswan/commit/96d793718955820dfe5e6d8aa6127a34795ae39e It is upto port maintainer to review and maybe upgrade the port to 5.9.12 Obtained from: strongSwan Security: CVE-2023-41913 |
|
5.9.11
f7f38560ce
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Explicitly set sysconfdir
This allows for proper substitution in manual pages. PR: 273138 Reported by: jlduran@gmail.com Reviewed by: strongswan@Nanoteq.com (maintainer timeout > 2 weeks) |
|
5.9.11
ab5ef1b273
files touched
|
Matteo Riondato (matteo) |
security/strongswan: Fix route installation
cherry-pick upstream commit a619356 to fix route installation on FreeBSD PR: 272841 Reported by: matteo@FreeBSD.org Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.11
7409da5ebd
files touched
|
Matteo Riondato (matteo) |
security/strongswan: Update to 5.9.11
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.11 PR: 272739 Reported by: matteo@FreeBSD.org Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.10
e27bfba4d7
files touched
|
Fernando Apesteguía (fernape) |
security/strongswan: Fix TLS 1.2 in EAP-TLS plugin
Cherry pick commit from upstream. PR: 270380 Reported by: dronmbi@gtn.ru Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.10
0cc82a4810
files touched
|
Kurt Jaeger (pi) |
security/strongswan: upgrade 5.9.9 -> 5.9.10 to fix CVE-2023-26463
See also: https://www.strongswan.org/blog/2023/03/02/strongswan-vulnerability-(cve-2023-26463).html PR: 269976 Approved-by: Francois ten Krooden <strongswan@Nanoteq.com> (maintainer) Changelog: https://github.com/strongswan/strongswan/releases/tag/5.9.10 |
|
5.9.9
c703ad728b
files touched
|
Eugene Grosbein (eugen) |
security/strongswan: fix CVE-2023-26463
This is urgent change adding official patch https://download.strongswan.org/security/CVE-2023-26463/strongswan-5.9.8-5.9.9_tls_auth_bypass_exp_pointer.patch It is upto port maintainer to review and maybe upgrade the port to 5.9.10. Obtained from: strongSwan Security: CVE-2023-26463 |
|
5.9.9
6e1233be22
files touched
|
Muhammad Moinur Rahman (bofh) |
Mk/**ldap.mk: Convert USE_LDAP to USES=ldap
Convert the USE_LDAP=yes to USES=ldap and adds the following features:
- Adds the argument USES=ldap:server to add openldap2{4|5|6}-server as
RUN_DEPENDS
- Adds the argument USES=ldap<version> and replaces WANT_OPENLDAP_VER
- Adds OPENLDAP versions in bsd.default-versions.mk
- Adds USE_OPENLDAP/WANT_OPENLDAP_VER in Mk/bsd.sanity.mk
- Changes consumers to use the features
Reviewed by: delphij
Approved by: portmgr
Differential Revision: https://reviews.freebsd.org/D38233
|
|
5.9.9
a06d577338
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Remove --with-lib-prefix
Remove flag already in the default option. PR: 268918 Reported by: jlduran@gmail.com Approved by: strongswan@Nanoteq.com (maintainer, implicit in PR) |
|
5.9.9
9428654776
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Update to 5.9.9
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.9 PR: 268918 262743 Reported by: jlduran@gmail.com Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.8
a0103c803b
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Add GCM option to OPTIONS_DEFAULT
Avoid the message: "plugin 'gcm': failed to load - gcm_plugin_create not found and no plugin file available" According to strongSwan's 5.9.8 release notes[1]: The gcm plugin has been enabled by default, so that the TLS 1.3 unit tests (now indirectly enabled if the pki tool is built due to the implementation of EST) can be completed successfully with just the default plugins. Let's also enable it by default. [1]: https://github.com/strongswan/strongswan/releases/tag/5.9.8 PR: 267352 |
|
5.9.8
a28166f3b1
files touched
|
Franco Fichtner (franco) |
security/strongswan: update to 5.9.8
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.8 Fixes CVE-2022-40617. PR: 267037 Reported by: franco@opnsense.org Approved by: strongswan@Nanoteq.com (maintainer, implicit) MFH: 2022Q4 (security update) Security: CVE-2022-40617 DoS attack vulnerability |
|
5.9.6
fb16dfecae
files touched
|
Stefan Eßer (se) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on WWW: lines in pkg-descr files. This commit removes the WWW: lines of moved-over URLs from these pkg-descr files. Approved by: portmgr (tcberner) |
|
5.9.6
b7f05445c0
files touched
|
Stefan Eßer (se) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the ports' pkg-descr files, one per line and prefixed with "WWW:". These URLs should point at a project website or other relevant resources. Access to these URLs required processing of the pkg-descr files, and they have often become stale over time. If more than one such URL was present in a pkg-descr file, only the first one was tarnsfered into the port INDEX, but for many ports only the last line did contain the port specific URL to further information. There have been several proposals to make a project URL available as a macro in the ports' Makefiles, over time. This commit implements such a proposal and moves one of the WWW: entries of each pkg-descr file into the respective port's Makefile. A heuristic attempts to identify the most relevant URL in case there is more than one WWW: entry in some pkg-descr file. URLs that are not moved into the Makefile are prefixed with "See also:" instead of "WWW:" in the pkg-descr files in order to preserve them. There are 1256 ports that had no WWW: entries in pkg-descr files. These ports will not be touched in this commit. The portlint port has been adjusted to expect a WWW entry in each port Makefile, and to flag any remaining "WWW:" lines in pkg-descr files as deprecated. Approved by: portmgr (tcberner) |
|
5.9.6
4e7ee356bb
files touched
|
Francois ten Krooden (strongswan) |
security/strongswan: Fix key derivation
An issue in the upstream port causes key derivation to fail in version 5.9.6. A work around is to enable the KDF pluging by default. PR: 264667 Reported by: strongswan@Nanoteq.com (maintainer) |
|
5.9.6
b3a2477de7
files touched
|
Björn König (freebsd) |
security/strongswan: add CTR plugin option
PR: 264354 Approved by: Francois ten Krooden (maintainer) |
|
5.9.6
b591672ecc
files touched
|
Dani I (i.dani) |
security/strongswan: Update to 5.9.6
Changes: https://github.com/strongswan/strongswan/releases/tag/5.9.6 PR: 263748 Approved by: Francois ten Krooden (maintainer) |
|
5.9.5
f642535800
files touched
|
Michael Glaus (michael.glaus) |
security/strongswan: Update to 5.9.5
Changes: https://github.com/strongswan/strongswan/releases/tag/5.9.5 PR: 261462 Approved by: Francois ten Krooden <strongswan@Nanoteq.com> (maintainer) MFH: 2022Q1 Security: CVE-2021-45079 |
|
5.9.4
eead2ddf75
files touched
|
Dani (i.dani) |
security/strongswan: Update to 5.9.4
Security & Bugfix Update to 5.9.4: - Changelog: https://github.com/strongswan/strongswan/releases/tag/5.9.4 - While here change repos to https - Fix CVE-2021-41990: https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41990).html - Fix CVE-2021-41991: https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html PR: 259267 Approved by: strongswan@Nanoteq.com (maintainer) MFH: 2021Q4 |
|
5.9.3
4a836720c7
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Update to 5.9.3
Changelog: https://github.com/strongswan/strongswan/releases/tag/5.9.3 PR: 257564 Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.2
0ca8849103
files touched
|
Sergey Akhmatov (sergey) |
security/strongswan: Fix default control-interface
Fix default control-interface in rc.d script and also make it user-selectable at build time, defaulting to VICI. Also mention this change in pkg-message, as previously the default was "stroke" and it was changed to "vici" with only a short notice in UPDATING, that was not displayed when using binary upgrades. Committing a portfmt'd version. PR: 255952 Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.2
135fdeebb9
files touched
|
Mathieu Arnold (mat) |
all: Remove all other $FreeBSD keywords.
|
|
5.9.2
305f148f48
files touched
|
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles.
|
|
5.9.2
ca2eb5c646
files touched
|
Dmitry Marakasov (amdmi3) |
security/strongswan: use "vici" interface instead of deprecated "stroke" by default
Add UPDATING entry with migration instruction. PR: 249865 Submitted by: driesm.michiels@gmail.com Approved by: strongswan@nanoteq.com (maintainer) |
|
5.9.2
1f6e853221
files touched
|
Fernando Apesteguía (fernape) |
security/strongswan: Update to 5.9.2
ChangeLog: https://wiki.strongswan.org/versions/80 While here, pet linters PR: 254047 Submitted by: jlduran@gmail.com Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.1
208eaad339
files touched
|
Joseph Mingrone (jrm) |
security/strongswan: Update to version 5.9.1
Changelog: https://wiki.strongswan.org/versions/79 PR: 252202 Submitted by: Jose Luis Duran <jlduran@gmail.com> Approved by: strongswan@nanoteq.com (maintainer) |
|
5.9.0
d5dae03b67
files touched
|
Kurt Jaeger (pi) |
security/strongswan: update 5.8.4 -> 5.9.0
- Also link the tpm2-tss package for testing with the TPM plugin: https://wiki.strongswan.org/projects/strongswan/wiki/TpmPlugin PR: 249470 Submitted by: Jose Luis Duran <jlduran@gmail.com> Approved by: strongswan@Nanoteq.com (maintainer) Relnotes: https://wiki.strongswan.org/versions/78 |
|
5.8.4
7a792acc12
files touched
|
Fernando Apesteguía (fernape) |
security/strongswan: Add TEST_TARGET
make test passes OK PR: 246535 Submitted by: jlduran@gmail.com Reviewed by: strongswan@Nanoteq.com (maintainer) |
|
5.8.4
b69b2fb8da
files touched
|
Renato Botelho (garga) |
security/strongswan: Update to 5.8.4
PR: 245199 Submitted by: Jose Luis Duran <jlduran@gmail.com> Approved by: strongswan@Nanoteq.com (maintainer) Sponsored by: Rubicon Communications, LLC (Netgate) |
|
5.8.3
2099740570
files touched
|
Jochen Neumeister (joneum) |
Update to 5.8.3
PR: 245087 Sponsored by: Netzkommune GmbH |
|
5.8.2
26827296ac
files touched
|
Mateusz Piotrowski (0mp) |
security/strongswan: Add PYTHON plugin option for a VICI protocol plugin
PR: 243254 Submitted by: Dries Michiels <driesm.michiels@gmail.com> Approved by: maintainer Event: Brussels DevSummit 2020 |
|
5.8.2
62ce674158
files touched
|
Koichiro Iwao (meta) |
security/strongswan: load ipsec kernel module by rc script
From the following discussion: https://reviews.freebsd.org/D20163 It makes sense to add ipsec as required module for the rc script of strongSwan. PR: 243316 Submitted by: Dries Michiels <driesm.michiels@gmail.com> Approved by: maintainer |
|
5.8.2
63290106b6
files touched
|
Renato Botelho (garga) |
security/strongswan: Update to 5.8.2
PR: 242687 Approved by: maintainer Obtained from: pfSense Sponsored by: Rubicon Communications, LLC (Netgate) |
|
5.8.1
c2e5505afa
files touched
|
Renato Botelho (garga) |
Add a new option to enable PKCS11 plugin
PR: 240684 Approved by: strongswan@Nanoteq.com (maintainer) Obtained from: pfSense Sponsored by: Rubicon Communications, LLC (Netgate) |
|
5.8.1
b1c34a2767
files touched
|
Steve Wills (swills) |
security/strongswan: update to 5.8.1
PR: 240316 Submitted by: Jose Luis Duran <jlduran@gmail.com> Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.8.0
c07f70692d
files touched
|
Koichiro Iwao (meta) |
security/strongswan: Add support for the VIA Padlock plugin
PR: 239458 Submitted by: Evgeny <mojolicious@yandex.com> (initial revision) strongswan@Nanoteq.com (maintainer, brushed-up revision) Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.8.0
222e095f2a
files touched
|
Koichiro Iwao (meta) |
Implement new virtual category: net-vpn for VPN related ports
based on discussion at ports@ [1]. As VPN softwares are put in different physical category net and security. This is a little bit confusing. Let's give them new virtual category net-vpn. [1] https://lists.freebsd.org/pipermail/freebsd-ports/2019-April/115915.html PR: 239395 Submitted by: myself Approved by: portmgr (mat) Differential Revision: https://reviews.freebsd.org/D21174 |