fastports

strongswan 6.0.6

security/strongswan

Open Source IKEv2 IPsec-based VPN solution

Category
security
Maintainer
strongswan@nanoteq.com
WWW
https://www.strongswan.org
License
GPLv2
USES
cpe libtool:keepla pkgconfig ssl tar:bzip2

Description

Strongswan is an open source IPsec-based VPN solution.
Strongswan for FreeBSD implements both the IKEv1 and IKEv2 (RFC 5996) key
exchange protocols.

Dependencies

Commit History

may be incomplete — full history at freebsd-ports on GitHub

Commit Credits Log message
6.0.6
3b628bd6b8 files touched
Vladimir Druzenko (vvd)
security/strongswan: Update 6.0.5 => 6.0.6 (fix 7 CVEs)
Changelog:
https://github.com/strongswan/strongswan/releases/tag/6.0.6

PR:		294718
Approved by:	blanket (fix CVEs)
Security:	CVE-2026-35328
Security:	CVE-2026-35329
Security:	CVE-2026-35330
Security:	CVE-2026-35331
Security:	CVE-2026-35332
Security:	CVE-2026-35333
Security:	CVE-2026-35334
Sponsored by:	UNIS Labs
MFH:		2026Q2
6.0.5
fb347f7775 files touched
Mike Bressem (mike)
security/strongswan: Enable ML plugin by default to allow Post-Quantum Key Exchange Methods
Currently ML-DSA (used for Digital Signatures) is a draft in strongswan
(ETA Version 6.1.0 or later). So CNSA 2.0 cannot be fully supported yet.
https://linux-ipsec.org/slides/2025/steffen-pqc-auth-for-ikev2.pdf
But most firewalls (Palo Alto / Fortigate) already support ML-KEM Key
Exchange in addition to standard proposals.
E.g. aes128gcm16-ecp256-ke1_mlkem512.

More details:
https://docs.strongswan.org/docs/latest/config/proposals.html

PR:		294305
Approved by:	strongswan@Nanoteq.com (maintainer, timeout 2 weeks)
Sponsored by:	UNIS Labs
6.0.5
2d6221ae7d files touched
Vladimir Druzenko (vvd)
security/strongswan: Update 6.0.4 => 6.0.5 (CVE-2026-25075)
Changelog:
https://github.com/strongswan/strongswan/releases/tag/6.0.5

While here:
- Switch from post-install + "if PORT_OPTIONS:MVICI" to
  post-install-VICI-on.
- Add option FIPS_PRF - software implementation plugin.
- Improve plist.
- Refresh patches.

Reported by:	Mike Bressem <mike@bressem.com> (via email)
Approved by:	blanket (fix CVE)
Security:	CVE-2026-25075
Sponsored by:	UNIS Labs
MFH:		2026Q2
6.0.4
f1fee394ea files touched
topical (topical)
security/strongswan: Update 6.0.3 => 6.0.4
Changelog:
https://github.com/strongswan/strongswan/releases/tag/6.0.4

PR:		293003
Approved by:	strongswan@Nanoteq.com (maintainer, timeout > 3 weeks)
MFH:		2026Q1
6.0.3
5b3e57e136 files touched
Jose Luis Duran (jlduran)
security/strongswan: Fix plist
Error: Orphaned: %%ETCDIR%%.d/iptfs.conf.sample
Error: Orphaned: %%DATADIR%%/templates/config/strongswan.d/iptfs.conf

PR:		290828
Approved by:	blanket, just fix it
6.0.3
c3584a2ee5 files touched
R. Christian McDonald (rcm)
security/strongswan: Update to 6.0.3
ChangeLog:
https://github.com/strongswan/strongswan/releases/tag/6.0.3

PR:		290578
Reviewed by:	brd
MFH:		2025Q4
Security:	CVE-2025-62291
Sponsored by:	Rubicon Communications, LLC ("Netgate")
6.0.1
4ebd4846a1 files touched
Kurt Jaeger (pi)
security/strongswan: update 6.0.0 -> 6.0.1
PR:		286928
Changes:	https://github.com/strongswan/strongswan/releases/tag/6.0.1
Approved by:	strongswan@Nanoteq.com (maintainer timeout)
6.0.0
de8342c344 files touched
kwf (kwf)
security/strongswan: Allow old stroke interface to be enabled
Note that strongSwan has deprecated the stroke management interface for
years, and it is recommended to migrate the configuration to vici before
it is removed.

PR:	285049
6.0.0
68fd439e6a files touched
kwf (kwf)
security/strongswan: Update 5.9.14 => 6.0.0
Changelog:
https://github.com/strongswan/strongswan/releases/tag/6.0.0

Remove GNU_CONFIGURE_MANPREFIX.

PR:	284947
5.9.14
825afe0bb4 files touched
Olivier Cochard (olivier)
security/strongswan: fix build on current
Backport upstream commit a7f617ab3328153939cb757a5cf9001071ef8720

PR:		280435
Approved by:	kwf@nanoteq.com (maintainer)
5.9.14
32cab2d7dc files touched
Jose Luis Duran (jlduran)
security/strongswan: Update to 5.9.14
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.14

PR:		278137
Reported by:	jlduran@gmail.com
Approved by:	strongswan@Nanoteq.com (maintainer, timeout > 2 weeks)
5.9.13
53f3494abb files touched
Muhammad Moinur Rahman (bofh)
security/strongswan: Moved man to share/man
Approved by:    portmgr (blanket)
5.9.13
9d8accbe0c files touched
Jose Luis Duran (jlduran)
security/strongswan: Update to 5.9.13
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.13

PR:		275620
Reported by:	jlduran@gmail.com
MFH:		2023Q4 (security fix)
Security:	CVE-2023-41913
5.9.11
4e2c0382dd files touched
Eugene Grosbein (eugen)
security/strongswan: fix CVE-2023-41913
This is urgent change adding official patch
https://download.strongswan.org/security/CVE-2023-41913/strongswan-5.9.7-5.9.11_charon_tkm_dh_len.patch
that is identical to the change made for strongswan-5.9.12:
https://github.com/strongswan/strongswan/commit/96d793718955820dfe5e6d8aa6127a34795ae39e

It is upto port maintainer to review and maybe upgrade the port to 5.9.12

Obtained from:	strongSwan
Security:	CVE-2023-41913
5.9.11
f7f38560ce files touched
Jose Luis Duran (jlduran)
security/strongswan: Explicitly set sysconfdir
This allows for proper substitution in manual pages.

PR:		273138
Reported by:	jlduran@gmail.com
Reviewed by:	strongswan@Nanoteq.com (maintainer timeout > 2 weeks)
5.9.11
ab5ef1b273 files touched
Matteo Riondato (matteo)
security/strongswan: Fix route installation
cherry-pick upstream commit a619356 to fix route installation on FreeBSD

PR:		272841
Reported by:	matteo@FreeBSD.org
Approved by:	strongswan@Nanoteq.com (maintainer)
5.9.11
7409da5ebd files touched
Matteo Riondato (matteo)
security/strongswan: Update to 5.9.11
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.11

PR:		272739
Reported by:	matteo@FreeBSD.org
Approved by:	strongswan@Nanoteq.com (maintainer)
5.9.10
e27bfba4d7 files touched
Fernando Apesteguía (fernape)
security/strongswan: Fix TLS 1.2 in EAP-TLS plugin
Cherry pick commit from upstream.

PR:		270380
Reported by:	dronmbi@gtn.ru
Approved by:	strongswan@Nanoteq.com (maintainer)
5.9.10
0cc82a4810 files touched
Kurt Jaeger (pi)
security/strongswan: upgrade 5.9.9 -> 5.9.10 to fix CVE-2023-26463
See also:
  https://www.strongswan.org/blog/2023/03/02/strongswan-vulnerability-(cve-2023-26463).html

PR:		269976
Approved-by:	Francois ten Krooden <strongswan@Nanoteq.com> (maintainer)
Changelog:	https://github.com/strongswan/strongswan/releases/tag/5.9.10
5.9.9
c703ad728b files touched
Eugene Grosbein (eugen)
security/strongswan: fix CVE-2023-26463
This is urgent change adding official patch
https://download.strongswan.org/security/CVE-2023-26463/strongswan-5.9.8-5.9.9_tls_auth_bypass_exp_pointer.patch

It is upto port maintainer to review and maybe upgrade
the port to 5.9.10.

Obtained from:	strongSwan
Security:	CVE-2023-26463
5.9.9
6e1233be22 files touched
Muhammad Moinur Rahman (bofh)
Mk/**ldap.mk: Convert USE_LDAP to USES=ldap
Convert the USE_LDAP=yes to USES=ldap and adds the following features:

- Adds the argument USES=ldap:server to add openldap2{4|5|6}-server as
  RUN_DEPENDS
- Adds the argument USES=ldap<version> and replaces WANT_OPENLDAP_VER
- Adds OPENLDAP versions in bsd.default-versions.mk
- Adds USE_OPENLDAP/WANT_OPENLDAP_VER in Mk/bsd.sanity.mk
- Changes consumers to use the features

Reviewed by:	delphij
Approved by:	portmgr
Differential Revision: https://reviews.freebsd.org/D38233
5.9.9
a06d577338 files touched
Jose Luis Duran (jlduran)
security/strongswan: Remove --with-lib-prefix
Remove flag already in the default option.

PR:		268918
Reported by:	jlduran@gmail.com
Approved by:	strongswan@Nanoteq.com (maintainer, implicit in PR)
5.9.9
9428654776 files touched
Jose Luis Duran (jlduran)
security/strongswan: Update to 5.9.9
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.9

PR:		268918 262743
Reported by:	jlduran@gmail.com
Approved by:	strongswan@Nanoteq.com (maintainer)
5.9.8
a0103c803b files touched
Jose Luis Duran (jlduran)
security/strongswan: Add GCM option to OPTIONS_DEFAULT
Avoid the message:

 "plugin 'gcm': failed to load - gcm_plugin_create not found and no
 plugin file available"

 According to strongSwan's 5.9.8 release notes[1]:

 The gcm plugin has been enabled by default, so that the TLS 1.3 unit
 tests (now indirectly enabled if the pki tool is built due to the
 implementation of EST) can be completed successfully with just the
 default plugins.

 Let's also enable it by default.

 [1]: https://github.com/strongswan/strongswan/releases/tag/5.9.8

PR:		267352
5.9.8
a28166f3b1 files touched
Franco Fichtner (franco)
security/strongswan: update to 5.9.8
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.8

Fixes CVE-2022-40617.

PR:		267037
Reported by:	franco@opnsense.org
Approved by:	strongswan@Nanoteq.com (maintainer, implicit)
MFH:		2022Q4	(security update)
Security:	CVE-2022-40617 DoS attack vulnerability
5.9.6
fb16dfecae files touched
Stefan Eßer (se)
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.

This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.

Approved by:		portmgr (tcberner)
5.9.6
b7f05445c0 files touched
Stefan Eßer (se)
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.

Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.

There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.

This commit implements such a proposal and moves one of the WWW: entries
of each pkg-descr file into the respective port's Makefile. A heuristic
attempts to identify the most relevant URL in case there is more than
one WWW: entry in some pkg-descr file. URLs that are not moved into the
Makefile are prefixed with "See also:" instead of "WWW:" in the pkg-descr
files in order to preserve them.

There are 1256 ports that had no WWW: entries in pkg-descr files. These
ports will not be touched in this commit.

The portlint port has been adjusted to expect a WWW entry in each port
Makefile, and to flag any remaining "WWW:" lines in pkg-descr files as
deprecated.

Approved by:		portmgr (tcberner)
5.9.6
4e7ee356bb files touched
Francois ten Krooden (strongswan)
security/strongswan: Fix key derivation
An issue in the upstream port causes key derivation to fail in version 5.9.6.
A work around is to enable the KDF pluging by default.

PR:	264667
Reported by:	strongswan@Nanoteq.com (maintainer)
5.9.6
b3a2477de7 files touched
Björn König (freebsd)
security/strongswan: add CTR plugin option
PR:		264354
Approved by:	Francois ten Krooden (maintainer)
5.9.6
b591672ecc files touched
Dani I (i.dani)
security/strongswan: Update to 5.9.6
Changes:	https://github.com/strongswan/strongswan/releases/tag/5.9.6

PR:		263748
Approved by:	Francois ten Krooden (maintainer)
5.9.5
f642535800 files touched
Michael Glaus (michael.glaus)
security/strongswan: Update to 5.9.5
Changes:	https://github.com/strongswan/strongswan/releases/tag/5.9.5
PR:		261462
Approved by:	Francois ten Krooden <strongswan@Nanoteq.com> (maintainer)
MFH:		2022Q1
Security:	CVE-2021-45079
5.9.4
eead2ddf75 files touched
Dani (i.dani)
security/strongswan: Update to 5.9.4
Security & Bugfix Update to 5.9.4:
- Changelog: https://github.com/strongswan/strongswan/releases/tag/5.9.4
- While here change repos to https
- Fix CVE-2021-41990: https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41990).html
- Fix CVE-2021-41991: https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html

PR:		259267
Approved by:	strongswan@Nanoteq.com (maintainer)
MFH:		2021Q4
5.9.3
4a836720c7 files touched
Jose Luis Duran (jlduran)
security/strongswan: Update to 5.9.3
Changelog:	https://github.com/strongswan/strongswan/releases/tag/5.9.3

PR:		257564
Approved by:	strongswan@Nanoteq.com (maintainer)
5.9.2
0ca8849103 files touched
Sergey Akhmatov (sergey)
security/strongswan: Fix default control-interface
Fix default control-interface in rc.d script and also
make it user-selectable at build time, defaulting to VICI.

Also mention this change in pkg-message, as previously the
default was "stroke" and it was changed to "vici" with
only a short notice in UPDATING, that was not displayed
when using binary upgrades.

Committing a portfmt'd version.

PR:		255952
Approved by:	strongswan@Nanoteq.com (maintainer)
5.9.2
135fdeebb9 files touched
Mathieu Arnold (mat)
all: Remove all other $FreeBSD keywords.
5.9.2
305f148f48 files touched
Mathieu Arnold (mat)
Remove # $FreeBSD$ from Makefiles.
5.9.2
ca2eb5c646 files touched
Dmitry Marakasov (amdmi3)
security/strongswan: use "vici" interface instead of deprecated "stroke" by default
Add UPDATING entry with migration instruction.

PR:		249865
Submitted by:	driesm.michiels@gmail.com
Approved by:	strongswan@nanoteq.com (maintainer)
5.9.2
1f6e853221 files touched
Fernando Apesteguía (fernape)
security/strongswan: Update to 5.9.2
ChangeLog: https://wiki.strongswan.org/versions/80

While here, pet linters

PR:	254047
Submitted by:	jlduran@gmail.com
Approved by:	strongswan@Nanoteq.com (maintainer)
5.9.1
208eaad339 files touched
Joseph Mingrone (jrm)
security/strongswan: Update to version 5.9.1
Changelog: https://wiki.strongswan.org/versions/79

PR:		252202
Submitted by:	Jose Luis Duran <jlduran@gmail.com>
Approved by:	strongswan@nanoteq.com (maintainer)
5.9.0
d5dae03b67 files touched
Kurt Jaeger (pi)
security/strongswan: update 5.8.4 -> 5.9.0
- Also link the tpm2-tss package for testing with the TPM plugin:
  https://wiki.strongswan.org/projects/strongswan/wiki/TpmPlugin

PR:		249470
Submitted by:	Jose Luis Duran <jlduran@gmail.com>
Approved by:	strongswan@Nanoteq.com (maintainer)
Relnotes:	https://wiki.strongswan.org/versions/78
5.8.4
7a792acc12 files touched
Fernando Apesteguía (fernape)
security/strongswan: Add TEST_TARGET
make test passes OK

PR:	246535
Submitted by:	jlduran@gmail.com
Reviewed by:	strongswan@Nanoteq.com (maintainer)
5.8.4
b69b2fb8da files touched
Renato Botelho (garga)
security/strongswan: Update to 5.8.4
PR:		245199
Submitted by:	Jose Luis Duran <jlduran@gmail.com>
Approved by:	strongswan@Nanoteq.com (maintainer)
Sponsored by:	Rubicon Communications, LLC (Netgate)
5.8.3
2099740570 files touched
Jochen Neumeister (joneum)
Update to 5.8.3
PR:		245087
Sponsored by:	Netzkommune GmbH
5.8.2
26827296ac files touched
Mateusz Piotrowski (0mp)
security/strongswan: Add PYTHON plugin option for a VICI protocol plugin
PR:		243254
Submitted by:	Dries Michiels <driesm.michiels@gmail.com>
Approved by:	maintainer
Event:		Brussels DevSummit 2020
5.8.2
62ce674158 files touched
Koichiro Iwao (meta)
security/strongswan: load ipsec kernel module by rc script
From the following discussion: https://reviews.freebsd.org/D20163
It makes sense to add ipsec as required module for the rc script
of strongSwan.

PR:		243316
Submitted by:	Dries Michiels <driesm.michiels@gmail.com>
Approved by:	maintainer
5.8.2
63290106b6 files touched
Renato Botelho (garga)
security/strongswan: Update to 5.8.2
PR:		242687
Approved by:	maintainer
Obtained from:	pfSense
Sponsored by:	Rubicon Communications, LLC (Netgate)
5.8.1
c2e5505afa files touched
Renato Botelho (garga)
Add a new option to enable PKCS11 plugin
PR:		240684
Approved by:	strongswan@Nanoteq.com (maintainer)
Obtained from:	pfSense
Sponsored by:	Rubicon Communications, LLC (Netgate)
5.8.1
b1c34a2767 files touched
Steve Wills (swills)
security/strongswan: update to 5.8.1
PR:		240316
Submitted by:	Jose Luis Duran <jlduran@gmail.com>
Approved by:	strongswan@Nanoteq.com (maintainer)
5.8.0
c07f70692d files touched
Koichiro Iwao (meta)
security/strongswan: Add support for the VIA Padlock plugin
PR:		239458
Submitted by:	Evgeny <mojolicious@yandex.com> (initial revision)
		strongswan@Nanoteq.com (maintainer, brushed-up revision)
Approved by:	strongswan@Nanoteq.com (maintainer)
5.8.0
222e095f2a files touched
Koichiro Iwao (meta)
Implement new virtual category: net-vpn for VPN related ports
based on discussion at ports@ [1]. As VPN softwares are put in different
physical category net and security. This is a little bit confusing. Let's
give them new virtual category net-vpn.

[1] https://lists.freebsd.org/pipermail/freebsd-ports/2019-April/115915.html

PR:		239395
Submitted by:	myself
Approved by:	portmgr (mat)
Differential Revision:	https://reviews.freebsd.org/D21174

Load all commits →