strongswan — Commit History
showing 114 stored commits — full history at freebsd-ports on GitHub
| Commit | Credits | Log message |
|---|---|---|
|
6.0.6
3b628bd6b8
files touched
|
Vladimir Druzenko (vvd) |
security/strongswan: Update 6.0.5 => 6.0.6 (fix 7 CVEs)
Changelog: https://github.com/strongswan/strongswan/releases/tag/6.0.6 PR: 294718 Approved by: blanket (fix CVEs) Security: CVE-2026-35328 Security: CVE-2026-35329 Security: CVE-2026-35330 Security: CVE-2026-35331 Security: CVE-2026-35332 Security: CVE-2026-35333 Security: CVE-2026-35334 Sponsored by: UNIS Labs MFH: 2026Q2 |
|
6.0.5
fb347f7775
files touched
|
Mike Bressem (mike) |
security/strongswan: Enable ML plugin by default to allow Post-Quantum Key Exchange Methods
Currently ML-DSA (used for Digital Signatures) is a draft in strongswan (ETA Version 6.1.0 or later). So CNSA 2.0 cannot be fully supported yet. https://linux-ipsec.org/slides/2025/steffen-pqc-auth-for-ikev2.pdf But most firewalls (Palo Alto / Fortigate) already support ML-KEM Key Exchange in addition to standard proposals. E.g. aes128gcm16-ecp256-ke1_mlkem512. More details: https://docs.strongswan.org/docs/latest/config/proposals.html PR: 294305 Approved by: strongswan@Nanoteq.com (maintainer, timeout 2 weeks) Sponsored by: UNIS Labs |
|
6.0.5
2d6221ae7d
files touched
|
Vladimir Druzenko (vvd) |
security/strongswan: Update 6.0.4 => 6.0.5 (CVE-2026-25075)
Changelog: https://github.com/strongswan/strongswan/releases/tag/6.0.5 While here: - Switch from post-install + "if PORT_OPTIONS:MVICI" to post-install-VICI-on. - Add option FIPS_PRF - software implementation plugin. - Improve plist. - Refresh patches. Reported by: Mike Bressem <mike@bressem.com> (via email) Approved by: blanket (fix CVE) Security: CVE-2026-25075 Sponsored by: UNIS Labs MFH: 2026Q2 |
|
6.0.4
f1fee394ea
files touched
|
topical (topical) |
security/strongswan: Update 6.0.3 => 6.0.4
Changelog: https://github.com/strongswan/strongswan/releases/tag/6.0.4 PR: 293003 Approved by: strongswan@Nanoteq.com (maintainer, timeout > 3 weeks) MFH: 2026Q1 |
|
6.0.3
5b3e57e136
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Fix plist
Error: Orphaned: %%ETCDIR%%.d/iptfs.conf.sample Error: Orphaned: %%DATADIR%%/templates/config/strongswan.d/iptfs.conf PR: 290828 Approved by: blanket, just fix it |
|
6.0.3
c3584a2ee5
files touched
|
R. Christian McDonald (rcm) |
security/strongswan: Update to 6.0.3
ChangeLog:
https://github.com/strongswan/strongswan/releases/tag/6.0.3
PR: 290578
Reviewed by: brd
MFH: 2025Q4
Security: CVE-2025-62291
Sponsored by: Rubicon Communications, LLC ("Netgate")
|
|
6.0.1
4ebd4846a1
files touched
|
Kurt Jaeger (pi) |
security/strongswan: update 6.0.0 -> 6.0.1
PR: 286928 Changes: https://github.com/strongswan/strongswan/releases/tag/6.0.1 Approved by: strongswan@Nanoteq.com (maintainer timeout) |
|
6.0.0
de8342c344
files touched
|
kwf (kwf) |
security/strongswan: Allow old stroke interface to be enabled
Note that strongSwan has deprecated the stroke management interface for years, and it is recommended to migrate the configuration to vici before it is removed. PR: 285049 |
|
6.0.0
68fd439e6a
files touched
|
kwf (kwf) |
security/strongswan: Update 5.9.14 => 6.0.0
Changelog: https://github.com/strongswan/strongswan/releases/tag/6.0.0 Remove GNU_CONFIGURE_MANPREFIX. PR: 284947 |
|
5.9.14
825afe0bb4
files touched
|
Olivier Cochard (olivier) |
security/strongswan: fix build on current
Backport upstream commit a7f617ab3328153939cb757a5cf9001071ef8720 PR: 280435 Approved by: kwf@nanoteq.com (maintainer) |
|
5.9.14
32cab2d7dc
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Update to 5.9.14
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.14 PR: 278137 Reported by: jlduran@gmail.com Approved by: strongswan@Nanoteq.com (maintainer, timeout > 2 weeks) |
|
5.9.13
53f3494abb
files touched
|
Muhammad Moinur Rahman (bofh) |
security/strongswan: Moved man to share/man
Approved by: portmgr (blanket) |
|
5.9.13
9d8accbe0c
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Update to 5.9.13
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.13 PR: 275620 Reported by: jlduran@gmail.com MFH: 2023Q4 (security fix) Security: CVE-2023-41913 |
|
5.9.11
4e2c0382dd
files touched
|
Eugene Grosbein (eugen) |
security/strongswan: fix CVE-2023-41913
This is urgent change adding official patch https://download.strongswan.org/security/CVE-2023-41913/strongswan-5.9.7-5.9.11_charon_tkm_dh_len.patch that is identical to the change made for strongswan-5.9.12: https://github.com/strongswan/strongswan/commit/96d793718955820dfe5e6d8aa6127a34795ae39e It is upto port maintainer to review and maybe upgrade the port to 5.9.12 Obtained from: strongSwan Security: CVE-2023-41913 |
|
5.9.11
f7f38560ce
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Explicitly set sysconfdir
This allows for proper substitution in manual pages. PR: 273138 Reported by: jlduran@gmail.com Reviewed by: strongswan@Nanoteq.com (maintainer timeout > 2 weeks) |
|
5.9.11
ab5ef1b273
files touched
|
Matteo Riondato (matteo) |
security/strongswan: Fix route installation
cherry-pick upstream commit a619356 to fix route installation on FreeBSD PR: 272841 Reported by: matteo@FreeBSD.org Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.11
7409da5ebd
files touched
|
Matteo Riondato (matteo) |
security/strongswan: Update to 5.9.11
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.11 PR: 272739 Reported by: matteo@FreeBSD.org Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.10
e27bfba4d7
files touched
|
Fernando Apesteguía (fernape) |
security/strongswan: Fix TLS 1.2 in EAP-TLS plugin
Cherry pick commit from upstream. PR: 270380 Reported by: dronmbi@gtn.ru Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.10
0cc82a4810
files touched
|
Kurt Jaeger (pi) |
security/strongswan: upgrade 5.9.9 -> 5.9.10 to fix CVE-2023-26463
See also: https://www.strongswan.org/blog/2023/03/02/strongswan-vulnerability-(cve-2023-26463).html PR: 269976 Approved-by: Francois ten Krooden <strongswan@Nanoteq.com> (maintainer) Changelog: https://github.com/strongswan/strongswan/releases/tag/5.9.10 |
|
5.9.9
c703ad728b
files touched
|
Eugene Grosbein (eugen) |
security/strongswan: fix CVE-2023-26463
This is urgent change adding official patch https://download.strongswan.org/security/CVE-2023-26463/strongswan-5.9.8-5.9.9_tls_auth_bypass_exp_pointer.patch It is upto port maintainer to review and maybe upgrade the port to 5.9.10. Obtained from: strongSwan Security: CVE-2023-26463 |
|
5.9.9
6e1233be22
files touched
|
Muhammad Moinur Rahman (bofh) |
Mk/**ldap.mk: Convert USE_LDAP to USES=ldap
Convert the USE_LDAP=yes to USES=ldap and adds the following features:
- Adds the argument USES=ldap:server to add openldap2{4|5|6}-server as
RUN_DEPENDS
- Adds the argument USES=ldap<version> and replaces WANT_OPENLDAP_VER
- Adds OPENLDAP versions in bsd.default-versions.mk
- Adds USE_OPENLDAP/WANT_OPENLDAP_VER in Mk/bsd.sanity.mk
- Changes consumers to use the features
Reviewed by: delphij
Approved by: portmgr
Differential Revision: https://reviews.freebsd.org/D38233
|
|
5.9.9
a06d577338
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Remove --with-lib-prefix
Remove flag already in the default option. PR: 268918 Reported by: jlduran@gmail.com Approved by: strongswan@Nanoteq.com (maintainer, implicit in PR) |
|
5.9.9
9428654776
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Update to 5.9.9
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.9 PR: 268918 262743 Reported by: jlduran@gmail.com Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.8
a0103c803b
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Add GCM option to OPTIONS_DEFAULT
Avoid the message: "plugin 'gcm': failed to load - gcm_plugin_create not found and no plugin file available" According to strongSwan's 5.9.8 release notes[1]: The gcm plugin has been enabled by default, so that the TLS 1.3 unit tests (now indirectly enabled if the pki tool is built due to the implementation of EST) can be completed successfully with just the default plugins. Let's also enable it by default. [1]: https://github.com/strongswan/strongswan/releases/tag/5.9.8 PR: 267352 |
|
5.9.8
a28166f3b1
files touched
|
Franco Fichtner (franco) |
security/strongswan: update to 5.9.8
ChangeLog: https://github.com/strongswan/strongswan/releases/tag/5.9.8 Fixes CVE-2022-40617. PR: 267037 Reported by: franco@opnsense.org Approved by: strongswan@Nanoteq.com (maintainer, implicit) MFH: 2022Q4 (security update) Security: CVE-2022-40617 DoS attack vulnerability |
|
5.9.6
fb16dfecae
files touched
|
Stefan Eßer (se) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on WWW: lines in pkg-descr files. This commit removes the WWW: lines of moved-over URLs from these pkg-descr files. Approved by: portmgr (tcberner) |
|
5.9.6
b7f05445c0
files touched
|
Stefan Eßer (se) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the ports' pkg-descr files, one per line and prefixed with "WWW:". These URLs should point at a project website or other relevant resources. Access to these URLs required processing of the pkg-descr files, and they have often become stale over time. If more than one such URL was present in a pkg-descr file, only the first one was tarnsfered into the port INDEX, but for many ports only the last line did contain the port specific URL to further information. There have been several proposals to make a project URL available as a macro in the ports' Makefiles, over time. This commit implements such a proposal and moves one of the WWW: entries of each pkg-descr file into the respective port's Makefile. A heuristic attempts to identify the most relevant URL in case there is more than one WWW: entry in some pkg-descr file. URLs that are not moved into the Makefile are prefixed with "See also:" instead of "WWW:" in the pkg-descr files in order to preserve them. There are 1256 ports that had no WWW: entries in pkg-descr files. These ports will not be touched in this commit. The portlint port has been adjusted to expect a WWW entry in each port Makefile, and to flag any remaining "WWW:" lines in pkg-descr files as deprecated. Approved by: portmgr (tcberner) |
|
5.9.6
4e7ee356bb
files touched
|
Francois ten Krooden (strongswan) |
security/strongswan: Fix key derivation
An issue in the upstream port causes key derivation to fail in version 5.9.6. A work around is to enable the KDF pluging by default. PR: 264667 Reported by: strongswan@Nanoteq.com (maintainer) |
|
5.9.6
b3a2477de7
files touched
|
Björn König (freebsd) |
security/strongswan: add CTR plugin option
PR: 264354 Approved by: Francois ten Krooden (maintainer) |
|
5.9.6
b591672ecc
files touched
|
Dani I (i.dani) |
security/strongswan: Update to 5.9.6
Changes: https://github.com/strongswan/strongswan/releases/tag/5.9.6 PR: 263748 Approved by: Francois ten Krooden (maintainer) |
|
5.9.5
f642535800
files touched
|
Michael Glaus (michael.glaus) |
security/strongswan: Update to 5.9.5
Changes: https://github.com/strongswan/strongswan/releases/tag/5.9.5 PR: 261462 Approved by: Francois ten Krooden <strongswan@Nanoteq.com> (maintainer) MFH: 2022Q1 Security: CVE-2021-45079 |
|
5.9.4
eead2ddf75
files touched
|
Dani (i.dani) |
security/strongswan: Update to 5.9.4
Security & Bugfix Update to 5.9.4: - Changelog: https://github.com/strongswan/strongswan/releases/tag/5.9.4 - While here change repos to https - Fix CVE-2021-41990: https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41990).html - Fix CVE-2021-41991: https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-(cve-2021-41991).html PR: 259267 Approved by: strongswan@Nanoteq.com (maintainer) MFH: 2021Q4 |
|
5.9.3
4a836720c7
files touched
|
Jose Luis Duran (jlduran) |
security/strongswan: Update to 5.9.3
Changelog: https://github.com/strongswan/strongswan/releases/tag/5.9.3 PR: 257564 Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.2
0ca8849103
files touched
|
Sergey Akhmatov (sergey) |
security/strongswan: Fix default control-interface
Fix default control-interface in rc.d script and also make it user-selectable at build time, defaulting to VICI. Also mention this change in pkg-message, as previously the default was "stroke" and it was changed to "vici" with only a short notice in UPDATING, that was not displayed when using binary upgrades. Committing a portfmt'd version. PR: 255952 Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.2
135fdeebb9
files touched
|
Mathieu Arnold (mat) |
all: Remove all other $FreeBSD keywords.
|
|
5.9.2
305f148f48
files touched
|
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles.
|
|
5.9.2
ca2eb5c646
files touched
|
Dmitry Marakasov (amdmi3) |
security/strongswan: use "vici" interface instead of deprecated "stroke" by default
Add UPDATING entry with migration instruction. PR: 249865 Submitted by: driesm.michiels@gmail.com Approved by: strongswan@nanoteq.com (maintainer) |
|
5.9.2
1f6e853221
files touched
|
Fernando Apesteguía (fernape) |
security/strongswan: Update to 5.9.2
ChangeLog: https://wiki.strongswan.org/versions/80 While here, pet linters PR: 254047 Submitted by: jlduran@gmail.com Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.9.1
208eaad339
files touched
|
Joseph Mingrone (jrm) |
security/strongswan: Update to version 5.9.1
Changelog: https://wiki.strongswan.org/versions/79 PR: 252202 Submitted by: Jose Luis Duran <jlduran@gmail.com> Approved by: strongswan@nanoteq.com (maintainer) |
|
5.9.0
d5dae03b67
files touched
|
Kurt Jaeger (pi) |
security/strongswan: update 5.8.4 -> 5.9.0
- Also link the tpm2-tss package for testing with the TPM plugin: https://wiki.strongswan.org/projects/strongswan/wiki/TpmPlugin PR: 249470 Submitted by: Jose Luis Duran <jlduran@gmail.com> Approved by: strongswan@Nanoteq.com (maintainer) Relnotes: https://wiki.strongswan.org/versions/78 |
|
5.8.4
7a792acc12
files touched
|
Fernando Apesteguía (fernape) |
security/strongswan: Add TEST_TARGET
make test passes OK PR: 246535 Submitted by: jlduran@gmail.com Reviewed by: strongswan@Nanoteq.com (maintainer) |
|
5.8.4
b69b2fb8da
files touched
|
Renato Botelho (garga) |
security/strongswan: Update to 5.8.4
PR: 245199 Submitted by: Jose Luis Duran <jlduran@gmail.com> Approved by: strongswan@Nanoteq.com (maintainer) Sponsored by: Rubicon Communications, LLC (Netgate) |
|
5.8.3
2099740570
files touched
|
Jochen Neumeister (joneum) |
Update to 5.8.3
PR: 245087 Sponsored by: Netzkommune GmbH |
|
5.8.2
26827296ac
files touched
|
Mateusz Piotrowski (0mp) |
security/strongswan: Add PYTHON plugin option for a VICI protocol plugin
PR: 243254 Submitted by: Dries Michiels <driesm.michiels@gmail.com> Approved by: maintainer Event: Brussels DevSummit 2020 |
|
5.8.2
62ce674158
files touched
|
Koichiro Iwao (meta) |
security/strongswan: load ipsec kernel module by rc script
From the following discussion: https://reviews.freebsd.org/D20163 It makes sense to add ipsec as required module for the rc script of strongSwan. PR: 243316 Submitted by: Dries Michiels <driesm.michiels@gmail.com> Approved by: maintainer |
|
5.8.2
63290106b6
files touched
|
Renato Botelho (garga) |
security/strongswan: Update to 5.8.2
PR: 242687 Approved by: maintainer Obtained from: pfSense Sponsored by: Rubicon Communications, LLC (Netgate) |
|
5.8.1
c2e5505afa
files touched
|
Renato Botelho (garga) |
Add a new option to enable PKCS11 plugin
PR: 240684 Approved by: strongswan@Nanoteq.com (maintainer) Obtained from: pfSense Sponsored by: Rubicon Communications, LLC (Netgate) |
|
5.8.1
b1c34a2767
files touched
|
Steve Wills (swills) |
security/strongswan: update to 5.8.1
PR: 240316 Submitted by: Jose Luis Duran <jlduran@gmail.com> Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.8.0
c07f70692d
files touched
|
Koichiro Iwao (meta) |
security/strongswan: Add support for the VIA Padlock plugin
PR: 239458 Submitted by: Evgeny <mojolicious@yandex.com> (initial revision) strongswan@Nanoteq.com (maintainer, brushed-up revision) Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.8.0
222e095f2a
files touched
|
Koichiro Iwao (meta) |
Implement new virtual category: net-vpn for VPN related ports
based on discussion at ports@ [1]. As VPN softwares are put in different physical category net and security. This is a little bit confusing. Let's give them new virtual category net-vpn. [1] https://lists.freebsd.org/pipermail/freebsd-ports/2019-April/115915.html PR: 239395 Submitted by: myself Approved by: portmgr (mat) Differential Revision: https://reviews.freebsd.org/D21174 |
|
5.8.0
d5a85043e3
files touched
|
Renato Botelho (garga) |
security/strongswan: Update to 5.8.0
PR: 238173 Approved by: maintainer Obtained from: pfSense Sponsored by: Rubicon Communications, LLC (Netgate) |
|
5.7.2
35f91bc9a3
files touched
|
Kurt Jaeger (pi) |
security/strongswan: add vici-based configuration for the rc script
The rc script is modified to allow both a legacy (ipsec.conf-based) startup or a new (swanctl.conf-based) config. Default is the legacy. The new setup is based on vici, the Versatile IKE Configuration Interface. For more details, see: https://wiki.strongswan.org/projects/strongswan/wiki/Vici PR: 234648 Submitted by: Jose Luis Duran <jlduran@gmail.com> Reviewed by: Sam Chen <sc.gear@one.caeon.com> Approved by: strongswan@Nanoteq.com (maintainer) Differential Revision: D19367 |
|
5.7.2
a17fd70e84
files touched
|
Kurt Jaeger (pi) |
security/strongswan: add PAM to XAUTH
PR: 236218 Submitted by: Franco Fichtner <franco@opnsense.org> Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.7.2
1c226cc6ed
files touched
|
Steve Wills (swills) |
security/strongswan: Minor port improvements
- Follow the same patching logic for swanctl.conf as the other config files. - Silence warning: $strongswan_enable not properly set. PR: 235340 Submitted by: Jose Luis Duran <jlduran@gmail.com> Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.7.2
f712c6381c
files touched
|
Steve Wills (swills) |
security/strongswan: update to version 5.7.2
PR: 234882 Submitted by: Jose Luis Duran <jlduran@gmail.com> Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.7.1
405927e1c4
files touched
|
Renato Botelho (garga) |
security/strongswan: Update to 5.7.1
PR: 231862 Approved by: maintainer Obtained from: pfSense MFH: 2018Q4 Security: CVE-2018-16151 CVE-2018-16152 Sponsored by: Rubicon Communications, LLC (Netgate) |
|
5.7.0
574f70ef77
files touched
|
Renato Botelho (garga) |
security/strongswan: Fix rc startup script to support rc.conf settings like _nice, _fib
Do not bump version since I'll commit the upgrade to 5.7.1 just after it PR: 211108 Submitted by: Dmitry Wagin <dmitry.wagin@ya.ru> Approved by: maintainer Sponsored by: Rubicon Communications, LLC (Netgate) |
|
5.7.0
531be1c7b6
files touched
|
Renato Botelho (garga) |
- Update security/strongswan to 5.7.0 - While here, silence portlint warning renaming option IKEv1 to IKEV1
PR: 231720 Approved by: maintainer Obtained from: pfSense Sponsored by: Rubicon Communications, LLC (Netgate) |
|
5.6.3
9ccf25ffb8
files touched
|
Kirill Ponomarev (krion) |
Update to 5.6.3
Fixes: - Denial-of-Service Vulnerability in the IKEv2 key derivation (CVE-2018-10811) - Denial-of-Service Vulnerability in the stroke plugin (CVE-2018-5388) - Crash on FreeBSD that was present in 5.6.2 - The kernel-pfkey plugin optionally installs routes via internal interface (one with an IP in the local traffic selector). On FreeBSD, enabling this selects the correct source IP when sending packets from the gateway itself. PR: 228631 Submitted by: maintainer |
|
5.6.2
f5b4b6fb0e
files touched
|
Yuri Victorovich (yuri) |
security/strongswan: Fix crash in public key authentication with 5.6.2
While here, added LICENSE_FILE. PR: 226404 Submitted by: strongswan@Nanoteq.com (maintainer) Approved by: tcberner (mentor, implicit) |
|
5.6.2
b3ff476a60
files touched
|
Renato Botelho (garga) |
- Update security/strongswan to 5.6.2 [1] - Enable CURL option by default [2]
PR: 226043 [1], 220488 [2] Submitted by: strongswan@Nanoteq.com (maintainer) [1] karl@denninger.net [2] Approved by: maintainer [2] MFH: 2018Q1 Security: CVE-2018-6459 Sponsored by: Rubicon Communications, LLC (Netgate) |
|
5.6.0
3fcd0e41de
files touched
|
Mathieu Arnold (mat) |
Remove USES=execinfo.
PR: 220271 Submitted by: mat (review), Yasuhiro KIMURA (PR) Sponsored by: Absolight Differential Revision: https://reviews.freebsd.org/D11488 |
|
5.6.0
66ea0a1c94
files touched
|
Kurt Jaeger (pi) |
security/strongswan: update 5.5.3 -> 5.6.0
- the gmp plugin responsible for CVE-2017-11185 is not enabled in the FreeBSD build PR: 221716 Relnotes: https://wiki.strongswan.org/versions/66 Reported by: i.dani@outlook.com Approved by: strongswan@nanoteq.com (maintainer) |
|
5.5.3
51bb85d963
files touched
|
Olivier Cochard (olivier) |
Update strongswan to 5.5.3
PR: 220823 Submitted by: strongswan@Nanoteq.com (maintainer) Reported by: i.dani@outlook.com |
|
5.5.2
7d74e337ec
files touched
|
Olivier Cochard (olivier) |
Add option for enabling mediation feature (like STUN for IPSec peers)
Approved by: strongswan@nanoteq.com (maintainer) Sponsored by: Orange |
|
5.5.2
cc6418d4b8
files touched
|
Renato Botelho (garga) |
Update security/strongswan to 5.5.2
PR: 218430 Approved by: maintainer Sponsored by: Rubicon Communications (Netgate) |
|
5.5.1
6d14406a13
files touched
|
Martin Wilke (miwi) |
- Chase ldns shlip bump
PR: 217495 |
|
5.5.1
c1ddb127a2
files touched
|
Renato Botelho (garga) |
Update security/strongswan to 5.5.1
PR: 213844 Approved by: strongswan@Nanoteq.com (maintainer) Obtained from: pfSense Sponsored by: Rubicon Communications (Netgate) |
|
5.5.0
d2849d0cce
files touched
|
John Marino (marino) |
security/strongswan: Fix build with LibreSSL
Approved by: SSL blanket |
|
5.5.0
6651f71c86
files touched
|
Renato Botelho (garga) |
Update security/strongswan to 5.5.0
PR: 211095 Submitted by: strongswan@Nanoteq.com (maintainer) |
|
5.4.0
6a2558d8a8
files touched
|
Jason Unovitch (junovitch) |
security/strongswan: unbreak FreeBSD 9 builds
- Add patch to include sys/endian.h header PR: 208446 Submitted by: strongswan@Nanoteq.com (maintainer) MFH: 2016Q2 (build fix blanket) |
|
5.4.0
597afc47ba
files touched
|
Mathieu Arnold (mat) |
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.
With hat: portmgr Sponsored by: Absolight |
|
5.4.0
54774528b6
files touched
|
Renato Botelho (garga) |
Update security/strongswan to 5.4.0
PR: 208219 Approved by: swan@nanoteq.com (maintainer) Obtained from: pfSense Sponsored by: Rubicon Communications (Netgate) |
|
5.3.5
98bbb468b4
files touched
|
Olli Hauer (ohauer) |
- bump PORTREVISION on ports depending on unbound
PR: 207948 Submitted by: jaap@NLnetLabs.nl (maintainer) |
|
5.3.5
4afaf01c5f
files touched
|
Jason Unovitch (junovitch) |
security/strongswan: enable options to increase usefulness of default pkg
- Enable PKI, SWANCTL, and VICI options (no external dependencies) - Document IMPLIES dependency on VICI for SWANCTL; mention in SWANCTL_DESC - Bump PORTREVISION PR: 205438 Reported by: Nick B <nicblais@clkroot.net> Submitted by: strongswan@Nanoteq.com (maintainer) |
|
5.3.5
d140eabacb
files touched
|
Erwin Lansing (erwin) |
- Update unbound to 1.5.7 - Bump PORTREVISIOn on dependent ports
Some Upgrade Notes: This release fixes a validation failure for nodata with wildcards and emptynonterminals. Fixes OpenSSL Library compability. Fixes correct response for malformed EDNS queries. For crypto in libunbound there is libnettle support. Qname minimisation is implemented. Use qname-minimisation: yes to enable it. This version sends the full query name when an error is found for intermediate names. It should therefore not fail for names on nonconformant servers. It combines well with harden-below-nxdomain: yes because those nxdomains are probed by the qname minimisation, and that will both stop privacy sensitive traffic and reduce nonsense traffic to authority servers. So consider enabling both. In this implementation IPv6 reverse lookups add several labels per increment, because otherwise those lookups would be very slow. [ Reference https://tools.ietf.org/html/draft-ietf-dnsop-qname-minimisation-08 ] More details at <http://unbound.net> PR: 206347 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> Approved by: maintainer timeout Sponsored by: DK Hostmaster A/S |
|
5.3.5
a0edc3c586
files touched
|
Renato Botelho (garga) |
Bump PORTREVISION to help users with custom OPTIONS to get the fix committed in r402880, as suggested by AMDmi3
|
|
5.3.5
7b7a23eef6
files touched
|
Renato Botelho (garga) |
Add @sample to gcm.conf missed when I introduced it. No bump on PORTREVISION since GCM is disabled by default
Submitted by: Jose Luis Duran Obtained from: https://github.com/pfsense/FreeBSD-ports/pull/2 |
|
5.3.5
169aacbd17
files touched
|
Renato Botelho (garga) |
Update security/strongswan to 5.3.5
PR: 204959 Approved by: strongswan@Nanoteq.com (maintainer) Obtained from: pfSense Sponsored by: Rubicon Communications (Netgate) |
|
5.3.4
39618f2a30
files touched
|
Renato Botelho (garga) |
Update security/strongswan to 5.3.4
PR: 204597 Submitted by: strongswan@nanoteq.com (maintainer) MFH: 2015Q4 Security: CVE 2015-8023 Security: https://github.com/strongswan/strongswan/commit/453e204ac40dfff2e0978e8f84a5f8ff0cbc45e2 Sponsored by: Rubicon Communications (Netgate) |
|
5.3.3
effa54ec4c
files touched
|
Renato Botelho (garga) |
Backport a couple of commits from master, that will be present in 5.3.4:
- dff2d05bb9 [1]: kernel-pfKey: Enable AES-CTR - 04f22cdabc [2]: VICI: add NAT information Bump PORTREVISION [1] https://github.com/strongswan/strongswan/commit/dff2d05bb9bec684b3b2efdafc9a47219550bbe1 [2] https://github.com/strongswan/strongswan/commit/04f22cdabc1c97d38692f95392429839f0fa90d1 PR: 204398 Approved by: maintainer Obtained from: pfSense Sponsored by: Rubicon Communications (Netgate) |
|
5.3.3
9c90e69933
files touched
|
Renato Botelho (garga) |
- Add a new option, SWANCTL, to install swanctll utility - When VICI option is selected, install libvici.h to include directory, it's useful when you need to build a custom code linked to libvici - Pass path to USE_LDCONFIG otherwise libraries will not be visible
PR: 204098 Approved by: maintainer Obtained from: pfSense Sponsored by: Rubicon Communications (Netgate) |
|
5.3.3
48f7ab060b
files touched
|
Renato Botelho (garga) |
- Add a new option (VICI) to build VICI management protocol - Change SMP option description to show users it's deprecated
PR: 204090 Approved by: maintainer |
|
5.3.3
1f33e7ef35
files touched
|
Renato Botelho (garga) |
strongSwan can be beuit using 3 different printf hooks: builtin, glibc (compatible with FreeBSD's libc) and vstr (devel/vstr). Since it's not selected any of them on CONFIGURE_ARGS, it uses auto, and end up using glibc.
pfSense users reported memory leaks on strongSwan [2] [3] and a it was reported to upstream [1]. Add a single option and let user choose which printf hook to use, and change default to use builtin. Bump PORTREVISION due to default change [1] https://wiki.strongswan.org/issues/1106 [2] https://forum.pfsense.org/index.php?topic=96767.0 [3] https://redmine.pfsense.org/issues/5149 PR: 204051 Approved by: maintainer Obtained from: pfSense MFH: 2015Q4 Sponsored by: Rubicon Communications (Netgate) |
|
5.3.3
4aaa296bd1
files touched
|
Renato Botelho (garga) |
Fix pkg-descr, Strongswan supports IKEv1 since version 5.0.0
Spotted by: Jim Thompson <jim@netgate.com> Approved by: strongswan@Nanoteq.com (maintainer) Sponsored by: Rubicon Communications (Netgate) |
|
5.3.3
0ef9966922
files touched
|
Renato Botelho (garga) |
Update security/strongswan to 5.3.3
PR: 203178 Approved by: strongswan@Nanoteq.com (maintainer) Sponsored by: Rubicon Communications (Netgate) |
|
5.3.2
30bfe91aba
files touched
|
Renato Botelho (garga) |
Update to 5.3.2
PR: 200721 Approved by: strongswan@Nanoteq.com (maintainer) MFH: 2015Q2 Security: CVE-2015-3991 Sponsored by: Netgate |
|
5.3.0
cd5bec75b8
files touched
|
Renato Botelho (garga) |
Fix PLIST when EAPAKA3GPP2 is unset and EAPDYNAMIC is set
PR: 199652 Approved by: stronswan@Nanoteq.com (maintainer) Sponsored by: Netgate |
|
5.3.0
0ef5155046
files touched
|
Dmitry Marakasov (amdmi3) |
- Add CPE info
Approved by: portmgr blanket |
|
5.3.0
d8fe21535f
files touched
|
Mark Felder (feld) |
Add patches to fix Strongswan Management Protocol
SMP is an XML control interface for Strongswan used by pfSense and Opnsense. SMP has been deprecated by upstream since 5.2.0 in favor of a newer IPC mechanism called VICI. As a result upstream is not motivated to take patches for SMP, and this uses non-portable strlcpy anyway. The code has not been deleted from the project and if we can bludgeon it into a working state I see no harm. PR: 199442 |
|
5.3.0
2daf580402
files touched
|
Renato Botelho (garga) |
- Update to 5.3.0 - Add a new option UNITY, to enable Cisco unity extension plugin
PR: 199064 Approved by: maintainer Sponsored by: Netgate |
|
5.2.2
37b65d30ff
files touched
|
Renato Botelho (garga) |
- Add GCM and SMP options - Add pkgconfig to the list of dependencies - Enable IKEv1 OPTION by default - Bump PORTREVISION
PR: 197824 Submitted by: Franco Fichtner <franco@lastsummer.de> (based on) Reworked by: strongswan@Nanoteq.com (maintainer) Approved by: strongswan@Nanoteq.com (maintainer) |
|
5.2.2
c9e8d09893
files touched
|
Renato Botelho (garga) |
- Update to 5.2.2 - Add LICENSE
PR: 196615 Approved by: strongswan@Nanoteq.com (maintainer) Security: CVE-2014-9221 |
|
5.2.1
2b036931bf
files touched
|
Pawel Pekala (pawel) |
- Update to version 5.2.1 [1] - Convert to USES=execinfo - Fix LDAP, MYSQL options
PR: 195580 [1] Submitted by: maintainer [1] |
|
5.2.0
50ab18630d
files touched
|
Baptiste Daroussin (bapt) |
Remove useless %D
Notified by: antoine |
|
5.2.0
2bbe2b3d55
files touched
|
Baptiste Daroussin (bapt) |
Simplify plist
|
|
5.2.0
13ab9a72d8
files touched
|
Dmitry Marakasov (amdmi3) |
- Switch dns/unbound to USES=libtool, drop .la files - Bump dependent ports as .so version has changed - While here, add LICENSE_FILE to dns/getdns
Approved by: portmgr blanket |
|
5.2.0
6f463327e8
files touched
|
John Marino (marino) |
security/strongswan: Upgrade version 5.1.3 => 5.2.0
While here, including missing library files and use install-strip target. Maintainer added a crash fix patch while reviewing. PR: 192366 Submitted by: dewayne (heruristicssystems.com.au) Approved by: maintainer (strongswan nanoteq.com) |
|
5.1.3
37f54e0f66
files touched
|
Tijl Coosemans (tijl) |
net/openldap24-*: - Convert to USES=libtool and bump dependent ports - Avoid USE_AUTOTOOLS - Don't use PTHREAD_LIBS - Use MAKE_CMD
databases/glom: - Drop :keepla - Add INSTALL_TARGET=install-strip databases/libgda4* databases/libgda5*: - Convert to USES=libtool and bump dependent ports - USES=tar:xz - Use INSTALL_TARGET=install-strip - Use @sample databases/libgdamm: - Drop :keepla - USES=tar:bzip2 - Use INSTALL_TARGET=install-strip databases/libgdamm5: - Add INSTALL_TARGET=install-strip - Drop --enable-static (inherited from old repocopy) devel/anjuta x11-toolkits/py-gnome-extras: - Drop :keepla dns/powerdns dns/powerdns-devel: - Convert to USES=libtool - Add INSTALL_TARGET=install-strip - Disable static modules - Stop creating library symlinks with .0 suffix, not needed for dynamically opened modules mail/dovecot2: - Add USES=libtool mail/dovecot2-pigeonhole: - Drop CONFIGURE_TARGET (incorrect for Dragonfly) - Add USES=libtool and INSTALL_TARGET=install-strip math/gnumeric: - USES=libtool tar:xz Approved by: portmgr (implicit, bump unstaged ports) |
|
5.1.3
bd48d39657
files touched
|
Martin Wilke (miwi) |
- Chase database/sqlite3 slib bump
Approved by: portmgr (myself) |
|
5.1.3
87798b4974
files touched
|
Kurt Jaeger (pi) |
security/strongswan: update 5.1.1 -> 5.1.3 with security update
- Update strongSwan port to 5.1.3 to resolve CVE 2014-2338 - Fixed rcvar issue with FreeBSD 10 (ports/186865) - Added building of additional tools included in strongswan (ports/186867) - libtool fix - pkg-plist updated PR: ports/189132, ports/186865, ports/186867 Submitted by: Robert Sevat, Dewayne Geraghty, Francois ten Krooden (maintainer) Approved by: jadawin (mentor) |
|
5.1.1
de452c484c
files touched
|
Bernhard Froehlich (decke) |
- Use OPTIONS_SUB=yes - Prefer ${INSTALL_DATA} over ${MV} - Whitespace fix
Thanks to: garga@ |
|
5.1.1
30100f3566
files touched
|
Antoine Brodin (antoine) |
- Remove MANx, man pages are already moved to plist - Use new LIB_DEPENDS syntax
|
|
5.1.1
2b99a9e08b
files touched
|
Bernhard Froehlich (decke) |
- Add missing manpages
PR: ports/186264 Submitted by: HASHI Hiroaki <hashiz@meridiani.jp> Approved by: strongswan <strongswan@Nanoteq.com> (maintainer) |
|
5.1.1
6ab93ec3c7
files touched
|
Bernhard Froehlich (decke) |
- Update to 5.1.1 - Added EAP dynamic proxy module - Added EAP Radius proxy authentication - Added DNSSEC/unbound support - Added kernel libipsec plugin - Changed configuration files to install to ${PREFIX}/etc/<filename>.conf.sample - Convert to new options format
PR: ports/185535 Submitted by: Francois ten Krooden <strongswan@nanoteq.com> (maintainer) Security: CVE-2013-5018 Security: CVE-2013-6075 Security: CVE-2013-6076 |
|
5.0.4
a65ed2e51b
files touched
|
Baptiste Daroussin (bapt) |
Add NO_STAGE all over the place in preparation for the staging support (cat: security)
|
|
5.0.4
c2d1a14c7c
files touched
|
Sunpoet Po-Chuan Hsieh (sunpoet) |
- Update to 7.31.0 - Bump PORTREVISION for ftp/curl shlib change - Add TEST_DEPENDS - Convert to new options framework - Adjust options: - Add COOKIES - Add CYASSL, NSS, POLARSSL, THREADED_RESOLVER, TLS_SRP [1] - Add GSSAPI and SPNEGO [2] - Remove KERBEROS4 - Rename LIBIDN to IDN - Remove TRACKMEMORY [1] - Sort option handler - Add SLAVEDIRS: ftp/curl-hiphop - Cosmetic change - Cleanup Makefile header - While I'm here, fix typo (PORTREVSION) in x11-wm/ede/Makefile
Changes: http://curl.haxx.se/changes.html PR: ports/172325 (-exp run), ports/177369 (based on) [1] Submitted by: Hirohisa Yamaguchi <umq@ueo.co.jp> [1], hrs (via email) [2] Exp run by: miwi |
|
5.0.4
7ee3843173
files touched
|
Olli Hauer (ohauer) |
- update to version 5.0.4 which fixes CVE-2013-2944. - add entry to vuxml - add CVE references to jankins vuxml entry
while I'm here remove .sh from rc script PR: ports/178266 Submitted by: David Shane Holden <dpejesh@yahoo.com> Approved by: strongswan@nanoteq.com (maintainer) |
|
5.0.1
e62bbe9b89
files touched
|
TAKATSU Tomonari (tota) |
- Update to 5.0.1 - Change maintainer address - Trim Makefile header - Convert to new options framework - Cleanup
PR: ports/173860 (based on) Submitted by: Riaan Kruger (maintainer) |
|
4.5.3
83eb2c3700
files touched
|
Doug Barton (dougb) |
In the rc.d scripts, change assignments to rcvar to use the literal name_enable wherever possible, and ${name}_enable when it's not, to prepare for the demise of set_rcvar().
In cases where I had to hand-edit unusual instances also modify formatting slightly to be more uniform (and in some cases, correct). This includes adding some $FreeBSD$ tags, and most importantly moving rcvar= to right after name= so it's clear that one is derived from the other. |
|
4.5.3
cd017dcb5b
files touched
|
Florian Smeets (flo) |
update to 4.5.3
PR: ports/160401 Submitted by: Riaan Kruger <riaank@gmail.com> maintainer |
|
4.5.1
194b2ba99d
files touched
|
Frederic Culot (culot) |
- Update to 4.5.1 [1] - Pet portlint(1) (change spaces into tabs and reformat IGNORE message)
PR: ports/156711 [1] Submitted by: Riaan Kruger <riaank@gmail.com> (maintainer) |
|
4.4.0
4a8684e352
files touched
|
Ade Lovett (ade) |
Sync to new bsd.autotools.mk
|
|
4.4.0
8a9429cb2b
files touched
|
Pav Lucistnik (pav) |
Strongswan is an open source IPsec-based VPN solution. Strongswan for FreeBSD supports IKEv2 but NOT IKEv1.
WWW: http://www.strongswan.org PR: ports/147431 Submitted by: Riaan Kruger <riaank@gmail.com> |