- Issued:
- 2011-05-19
- Updated:
- 2011-05-19
RHBA-2011:0652 - Bug Fix Advisory
Synopsis
openswan bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated openswan package that fix various bugs and provide several enhancements
are now available for Red Hat Enterprise Linux 6.
Description
Openswan is a free implementation of IPsec and IKE (Internet Key Exchange) for
Linux. This package contains the daemons and user space tools for setting up
Openswan. It supports the NETKEY/XFRM IPsec kernel stack that exists in the
default Linux kernel.
Openswan 2.6.x also supports IKEv2 (RFC4306)
The openswan packages have been upgraded to upstream version 2.6.32, which
provides a number of bug fixes and enhancements over the previous version.
(BZ#642724)
These updated openswan packages provide fixes for the following bugs:
- Openswan was previously unable to negotiate using the HMAC-SHA2-256 algorithm
in transport mode. With this update, Openswan is able to set up IPsec in using
HMAC-SHA2-256 in transport mode. (BZ#621790)
- The Openswan init script accessed the current working directory, which led to
an SELinux AVC Denial. This update ensures that the current working directory is
set to the root ("/") directory, and thus Openswan's pluto daemon starts without
incurring an SELinux denial. (BZ#628879)
- Previously, the Openswan packages were not compiled with the "-Wl,-z,relro"
parameter. These updated openswan packages have been compiled with the
"-Wl,-z,relro" parameter. (BZ#642722)
- The IPsec NETKEY kernel code sent thousands of ACQUIRE messages which led to a
segmentation fault. With this update, ACQUIRE messages are now properly
processed with the result that Openswan does not crash. (BZ#658121)
- When the system's IP address was renewed using DHCP, the Openswan IPsec
connection failed. This update ensures that the IPsec connection continues to
operate across DHCP IP address renewals. (BZ#658253)
- Entering an incorrect IKE Extended Authentication (Xauth) password during IKE
negotiation leads to a failure to connect. However, the failure was not
communicated to NetworkManager, with the result that NetworkManager continued to
wait for a timeout. With this update, Openswan sends a failure message to
NetworkManager over the D-Bus system message bus, informing it of the failure to
connect. As a result, NetworkManager knows about the failure as soon as it
happens, and is able to inform the user about it immediately. (BZ#668785)
- Internet Control Message Protocol (ICMP)-specific IPsec connections were set
up incorrectly, with incorrect "Type" and "Code" fields, in the code. This has
been fixed so that ICMP selectors are now processed correctly according to the
IKEv2 protocol specification (RFC 4306). (BZ#681974)
- Configuring a second IPsec policy using a different host behind the same
gateway caused Openswan to crash due to the policy not being set up correctly.
With this update, Openswan's IKEv2 implementation processes the traffic
selectors correctly so that the correct definition is picked up during the key
exchange. As a result, a second IPsec policy using a different host behind the
same gateway can successfully set up. (BZ#683604)
In addition, these updated packages provide the following enhancements:
- Openswan's IKEv1 implementation and NETKEY interactions now understand SELinux
labeled flows, and Openswan has been integrated with SELinux. As a result, it's
now possible to exchange SELinux labels in IKE, and set up labeled IPsec
policies and Security Associations (SAs) in SELinux Multi-Level Security (MLS)
mode. (BZ#235720)
- Previously, Openswan did not support the Internet Key Exchange version 2
(IKEv2) USE_TRANSPORT_MODE functionality, with the result that Openswan could
not interoperate with racoon2 in transport mode. With this update, Openswan's
IKEv2 protocol support has been enhanced so that it now works in transport mode,
and interoperate with racoon2. (BZ#646718)
Users are advised to upgrade to these updated openswan packages, which resolve
these issues and add these enhancements.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6 x86_64
Fixes
- BZ - 621790 - [TAHI]openswan doesn't support auth alg with "ESP=3DES-CBC HMAC-SHA2-256" in transport mode
- BZ - 628879 - init script searches cwd which can cause SELinux denials
- BZ - 642722 - Openswan does not have RELRO ELF flag set
- BZ - 642724 - Openswan rebase to the latest upstream version
- BZ - 646718 - [IPv6][TAHI]interoperation issue in transport mode between openswan and racoon2
- BZ - 668785 - Openswan modifications needed for bz 659709
- BZ - 681974 - Openswan's current IKEv2 implementation does not correctly process ICMPv6 Selectors for Type and Code
- BZ - 683604 - Openswan-IKEv2 can not setup 2nd SA with traffic selector for different host behind the same security gateway.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
openswan-2.6.32-4.el6.src.rpm | SHA-256: 3fa6b02063219998de2a505d3efc4d78b8f2856917c45f5f2d8c78c56ec1148f |
x86_64 | |
openswan-2.6.32-4.el6.x86_64.rpm | SHA-256: 857cf3ee8bd0eb77f81c9b430c7b734aa67a48f23d35c142cdffcdd45d2bf5a7 |
openswan-debuginfo-2.6.32-4.el6.x86_64.rpm | SHA-256: 86d9dec00b18fa670b7b5a005d925d90936ddc148a60c733098561bc9462aaf8 |
openswan-debuginfo-2.6.32-4.el6.x86_64.rpm | SHA-256: 86d9dec00b18fa670b7b5a005d925d90936ddc148a60c733098561bc9462aaf8 |
openswan-doc-2.6.32-4.el6.x86_64.rpm | SHA-256: cf18e9c98e13ee8dbd7614173186066318ecf2f5d75b627199457dba1ed8c7b6 |
i386 | |
openswan-2.6.32-4.el6.i686.rpm | SHA-256: bf19697dfeb4862135f5dec89c95f3ab997e5b2c0ac7141f5f90146cb8b251b1 |
openswan-debuginfo-2.6.32-4.el6.i686.rpm | SHA-256: cfadce02c03d3d5756633983657b64f45baf6fc28fd8845e77a7f95373320b4a |
openswan-debuginfo-2.6.32-4.el6.i686.rpm | SHA-256: cfadce02c03d3d5756633983657b64f45baf6fc28fd8845e77a7f95373320b4a |
openswan-doc-2.6.32-4.el6.i686.rpm | SHA-256: 1a1f6529f6897d5f947e9d84ce8d520769db6a8de5232761527c5216d6cc3acb |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
openswan-2.6.32-4.el6.src.rpm | SHA-256: 3fa6b02063219998de2a505d3efc4d78b8f2856917c45f5f2d8c78c56ec1148f |
x86_64 | |
openswan-2.6.32-4.el6.x86_64.rpm | SHA-256: 857cf3ee8bd0eb77f81c9b430c7b734aa67a48f23d35c142cdffcdd45d2bf5a7 |
openswan-debuginfo-2.6.32-4.el6.x86_64.rpm | SHA-256: 86d9dec00b18fa670b7b5a005d925d90936ddc148a60c733098561bc9462aaf8 |
openswan-debuginfo-2.6.32-4.el6.x86_64.rpm | SHA-256: 86d9dec00b18fa670b7b5a005d925d90936ddc148a60c733098561bc9462aaf8 |
openswan-doc-2.6.32-4.el6.x86_64.rpm | SHA-256: cf18e9c98e13ee8dbd7614173186066318ecf2f5d75b627199457dba1ed8c7b6 |
i386 | |
openswan-2.6.32-4.el6.i686.rpm | SHA-256: bf19697dfeb4862135f5dec89c95f3ab997e5b2c0ac7141f5f90146cb8b251b1 |
openswan-debuginfo-2.6.32-4.el6.i686.rpm | SHA-256: cfadce02c03d3d5756633983657b64f45baf6fc28fd8845e77a7f95373320b4a |
openswan-debuginfo-2.6.32-4.el6.i686.rpm | SHA-256: cfadce02c03d3d5756633983657b64f45baf6fc28fd8845e77a7f95373320b4a |
openswan-doc-2.6.32-4.el6.i686.rpm | SHA-256: 1a1f6529f6897d5f947e9d84ce8d520769db6a8de5232761527c5216d6cc3acb |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
openswan-2.6.32-4.el6.src.rpm | SHA-256: 3fa6b02063219998de2a505d3efc4d78b8f2856917c45f5f2d8c78c56ec1148f |
x86_64 | |
openswan-2.6.32-4.el6.x86_64.rpm | SHA-256: 857cf3ee8bd0eb77f81c9b430c7b734aa67a48f23d35c142cdffcdd45d2bf5a7 |
openswan-debuginfo-2.6.32-4.el6.x86_64.rpm | SHA-256: 86d9dec00b18fa670b7b5a005d925d90936ddc148a60c733098561bc9462aaf8 |
openswan-debuginfo-2.6.32-4.el6.x86_64.rpm | SHA-256: 86d9dec00b18fa670b7b5a005d925d90936ddc148a60c733098561bc9462aaf8 |
openswan-doc-2.6.32-4.el6.x86_64.rpm | SHA-256: cf18e9c98e13ee8dbd7614173186066318ecf2f5d75b627199457dba1ed8c7b6 |
i386 | |
openswan-2.6.32-4.el6.i686.rpm | SHA-256: bf19697dfeb4862135f5dec89c95f3ab997e5b2c0ac7141f5f90146cb8b251b1 |
openswan-debuginfo-2.6.32-4.el6.i686.rpm | SHA-256: cfadce02c03d3d5756633983657b64f45baf6fc28fd8845e77a7f95373320b4a |
openswan-debuginfo-2.6.32-4.el6.i686.rpm | SHA-256: cfadce02c03d3d5756633983657b64f45baf6fc28fd8845e77a7f95373320b4a |
openswan-doc-2.6.32-4.el6.i686.rpm | SHA-256: 1a1f6529f6897d5f947e9d84ce8d520769db6a8de5232761527c5216d6cc3acb |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
openswan-2.6.32-4.el6.src.rpm | SHA-256: 3fa6b02063219998de2a505d3efc4d78b8f2856917c45f5f2d8c78c56ec1148f |
x86_64 | |
openswan-2.6.32-4.el6.x86_64.rpm | SHA-256: 857cf3ee8bd0eb77f81c9b430c7b734aa67a48f23d35c142cdffcdd45d2bf5a7 |
openswan-debuginfo-2.6.32-4.el6.x86_64.rpm | SHA-256: 86d9dec00b18fa670b7b5a005d925d90936ddc148a60c733098561bc9462aaf8 |
openswan-debuginfo-2.6.32-4.el6.x86_64.rpm | SHA-256: 86d9dec00b18fa670b7b5a005d925d90936ddc148a60c733098561bc9462aaf8 |
openswan-doc-2.6.32-4.el6.x86_64.rpm | SHA-256: cf18e9c98e13ee8dbd7614173186066318ecf2f5d75b627199457dba1ed8c7b6 |
i386 | |
openswan-2.6.32-4.el6.i686.rpm | SHA-256: bf19697dfeb4862135f5dec89c95f3ab997e5b2c0ac7141f5f90146cb8b251b1 |
openswan-debuginfo-2.6.32-4.el6.i686.rpm | SHA-256: cfadce02c03d3d5756633983657b64f45baf6fc28fd8845e77a7f95373320b4a |
openswan-debuginfo-2.6.32-4.el6.i686.rpm | SHA-256: cfadce02c03d3d5756633983657b64f45baf6fc28fd8845e77a7f95373320b4a |
openswan-doc-2.6.32-4.el6.i686.rpm | SHA-256: 1a1f6529f6897d5f947e9d84ce8d520769db6a8de5232761527c5216d6cc3acb |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
openswan-2.6.32-4.el6.src.rpm | SHA-256: 3fa6b02063219998de2a505d3efc4d78b8f2856917c45f5f2d8c78c56ec1148f |
s390x | |
openswan-2.6.32-4.el6.s390x.rpm | SHA-256: 16eea6e4e2c5679fcf48976d504b38a6c91e52db1e619e406ec5bc4d8342e90f |
openswan-debuginfo-2.6.32-4.el6.s390x.rpm | SHA-256: 401af05c517224d496a2a2eb098d8ae89b6204e83f9a9ac543d4859d0487a853 |
openswan-debuginfo-2.6.32-4.el6.s390x.rpm | SHA-256: 401af05c517224d496a2a2eb098d8ae89b6204e83f9a9ac543d4859d0487a853 |
openswan-doc-2.6.32-4.el6.s390x.rpm | SHA-256: bd1260e8aefa1b3997a10128eb67838d5240bbfcd16d201ce58138b010ff731b |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
openswan-2.6.32-4.el6.src.rpm | SHA-256: 3fa6b02063219998de2a505d3efc4d78b8f2856917c45f5f2d8c78c56ec1148f |
ppc64 | |
openswan-2.6.32-4.el6.ppc64.rpm | SHA-256: 176e8be9736f28867778b03a629c64646670a942939147a436aedc2c8bb1af45 |
openswan-debuginfo-2.6.32-4.el6.ppc64.rpm | SHA-256: b80fdc811254e565933c710fe9ef07b2eb758427dd961dae5c7ef06b0071259f |
openswan-debuginfo-2.6.32-4.el6.ppc64.rpm | SHA-256: b80fdc811254e565933c710fe9ef07b2eb758427dd961dae5c7ef06b0071259f |
openswan-doc-2.6.32-4.el6.ppc64.rpm | SHA-256: 6bd7bea4560835cce7fac801bcd1bc3f10ade313a86a8e207f14377fc5efca26 |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
openswan-2.6.32-4.el6.src.rpm | SHA-256: 3fa6b02063219998de2a505d3efc4d78b8f2856917c45f5f2d8c78c56ec1148f |
x86_64 | |
openswan-2.6.32-4.el6.x86_64.rpm | SHA-256: 857cf3ee8bd0eb77f81c9b430c7b734aa67a48f23d35c142cdffcdd45d2bf5a7 |
openswan-debuginfo-2.6.32-4.el6.x86_64.rpm | SHA-256: 86d9dec00b18fa670b7b5a005d925d90936ddc148a60c733098561bc9462aaf8 |
openswan-debuginfo-2.6.32-4.el6.x86_64.rpm | SHA-256: 86d9dec00b18fa670b7b5a005d925d90936ddc148a60c733098561bc9462aaf8 |
openswan-doc-2.6.32-4.el6.x86_64.rpm | SHA-256: cf18e9c98e13ee8dbd7614173186066318ecf2f5d75b627199457dba1ed8c7b6 |
i386 | |
openswan-2.6.32-4.el6.i686.rpm | SHA-256: bf19697dfeb4862135f5dec89c95f3ab997e5b2c0ac7141f5f90146cb8b251b1 |
openswan-debuginfo-2.6.32-4.el6.i686.rpm | SHA-256: cfadce02c03d3d5756633983657b64f45baf6fc28fd8845e77a7f95373320b4a |
openswan-debuginfo-2.6.32-4.el6.i686.rpm | SHA-256: cfadce02c03d3d5756633983657b64f45baf6fc28fd8845e77a7f95373320b4a |
openswan-doc-2.6.32-4.el6.i686.rpm | SHA-256: 1a1f6529f6897d5f947e9d84ce8d520769db6a8de5232761527c5216d6cc3acb |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6
SRPM | |
---|---|
openswan-2.6.32-4.el6.src.rpm | SHA-256: 3fa6b02063219998de2a505d3efc4d78b8f2856917c45f5f2d8c78c56ec1148f |
s390x | |
openswan-2.6.32-4.el6.s390x.rpm | SHA-256: 16eea6e4e2c5679fcf48976d504b38a6c91e52db1e619e406ec5bc4d8342e90f |
openswan-debuginfo-2.6.32-4.el6.s390x.rpm | SHA-256: 401af05c517224d496a2a2eb098d8ae89b6204e83f9a9ac543d4859d0487a853 |
openswan-debuginfo-2.6.32-4.el6.s390x.rpm | SHA-256: 401af05c517224d496a2a2eb098d8ae89b6204e83f9a9ac543d4859d0487a853 |
openswan-doc-2.6.32-4.el6.s390x.rpm | SHA-256: bd1260e8aefa1b3997a10128eb67838d5240bbfcd16d201ce58138b010ff731b |
Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6
SRPM | |
---|---|
openswan-2.6.32-4.el6.src.rpm | SHA-256: 3fa6b02063219998de2a505d3efc4d78b8f2856917c45f5f2d8c78c56ec1148f |
x86_64 | |
openswan-2.6.32-4.el6.x86_64.rpm | SHA-256: 857cf3ee8bd0eb77f81c9b430c7b734aa67a48f23d35c142cdffcdd45d2bf5a7 |
openswan-debuginfo-2.6.32-4.el6.x86_64.rpm | SHA-256: 86d9dec00b18fa670b7b5a005d925d90936ddc148a60c733098561bc9462aaf8 |
openswan-debuginfo-2.6.32-4.el6.x86_64.rpm | SHA-256: 86d9dec00b18fa670b7b5a005d925d90936ddc148a60c733098561bc9462aaf8 |
openswan-doc-2.6.32-4.el6.x86_64.rpm | SHA-256: cf18e9c98e13ee8dbd7614173186066318ecf2f5d75b627199457dba1ed8c7b6 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.