- Issued:
- 2009-09-02
- Updated:
- 2009-09-02
RHEA-2009:1350 - Product Enhancement Advisory
Synopsis
openswan bug fix update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated openswan package that resolves several issues and provides
FIPS-1402-2 compliance is now available.
Description
Openswan is a free implementation of IPsec & IKE for Linux. IPsec is the
Internet Protocol Security and uses strong cryptography to provide both
authentication and encryption services. These services allow you to build
secure tunnels through untrusted networks. Everything passing through the
untrusted net is encrypted by the ipsec gateway machine and decrypted by
the gateway at the other end of the tunnel. The resulting tunnel is a
virtual private network or VPN.
This package contains the daemons and userland tools for setting up
Openswan. It optionally also builds the Openswan KLIPS IPsec stack that is
an alternative for the NETKEY/XFRM IPsec stack that exists in the default
Linux kernel.
Openswan 2.6.x also supports IKEv2 (RFC 4309)
Bugs fixed in these updated packages include:
- Openswan would not allow IPsec connections between a physical IP on one
system and a virtual IP on another system if the physical IP on the first
system was already connected to the physical IP on the second system that
was associated with that virtual IP. Now, Openswan creates a new route if a
route already exists. This allows simultaneous IPsec connections to a
physical IP and the virtual IP associated with it. (BZ#438998)
- the parser in lib/libipsecconf/ does not correctly interpret values
supplied in manual keyring, and the use of the manual keyring could
therefore result in a segmentation fault in Openswan. Because the manual
keyring is no longer supported, Openswan will now exit with an error when
ipsec manual up <connection-name> is used. (BZ#449725)
- the ipsec.conf file included any .conf files placed in /etc/ipsec.d but
Openswan's default installation did not place any files in this directory.
Therefore, error messages similar to "could not open include filename:
'/etc/ipsec.d/*.conf'" would appear when starting or stopping the IPsec
service. Although the service operated correctly, the appearance of these
error messages could mislead a user to think that there was a problem with
IPsec. The ipsec.conf file now comments out the include of /etc/ipsec.d and
contains a note suggesting that users uncomment the line and use
/etc/ipsec.d for their customized configuration files. (BZ#463931)
- Openswan did not close file decriptors on exec. The resulting file
descriptor leaks would then cause AVC denial warnings on systems set to
enforce SELinux policy. Openswan now closes file descriptors on exec, both
for sockets that it has opened and for sockets that it has accepted.
Because Openswan does not now leak these file descriptors, the
corresponding AVC denial warnings do not appear. (BZ#466861)
- Openswan's cryptographic methods did not meet the standards for FIPS
140-2 certification, therefore precluding the use of Openswan in
environments that require this certification. Openswan now uses the NSS
library and includes:
- encryption/decryption algorithms (AES, 3DES)
- hash and data integrity algorithm (MD5, SHA1, SHA2(256, 384, 512))
- HMAC mechanisms for the above hash algorithms.
- authentication with signature (without certificates) (DS_AUTH).
Specifically, it uses RSA signatures.
- authentication with signature (with x.509 certificates ) (DS_AUTH).
- Oakley Diffie-Hellman (DH) related cryptographic operations.
- random number generation through NSS.
- support for NSS DB without and with password.
- FIPS integrity check using fipscheck library
- support for old (dbm) and new (sql) NSS databases (dbm)
- Openswan now meets the FIPS 140-2 standard. (BZ#444801, BZ#469763)
- previously, the package description included a reference to a "freeswan
enabled kernel". This reference could have mislead users into thinking that
Openswan required some special kernel, when no such kernel exists. The
reference has therefore been removed, eliminating the potential for
confusion. (BZ#487708)
All users of openswan are advised to upgrade to this updated package, which
resolves these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 439771 - [IPv6-DoD] openswan and strongswan fail to interoperate with IKEv2
- BZ - 441383 - IPV6DOD: openswan should negotiate CCM algorithm.
- BZ - 442955 - [IPv6-DoD] openswan doesn't accept null esp auth alg
- BZ - 442956 - openswan logging segfault when phase2alg=null
- BZ - 443626 - Pluto segfault with host-to-host config and other host down
- BZ - 443646 - AVC errors when openswan attempts to start up
- BZ - 444166 - [IPv6-DoD] openswan IKEv2 crashes when interoperating with racoon2
- BZ - 444575 - openswan doesn't delete expired SA's
- BZ - 449382 - openswan segv using RSA PKIX (x.509) mode
- BZ - 449725 - Openswan seg fault using manual keying.
- BZ - 463931 - /etc/ipsec.conf includes /etc/ipsec.d/*.conf which is missing
- BZ - 466861 - avc: denied { write } for pid=2193 comm="ip" path="/var/run/pluto/ipsec_setup.out"
- BZ - 487708 - Misleading package description
- BZ - 507844 - PSK support with Openswan-NSS in non-fips mode and fixing several warnings during compilation
CVEs
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
openswan-2.6.21-5.el5.src.rpm | SHA-256: cca63fd6ee8ac1a9afddeb04efd18e9421fae0ac4002bafbf793abe891a09672 |
x86_64 | |
openswan-2.6.21-5.el5.x86_64.rpm | SHA-256: 9245a2830b7e1ed2da7422b9375e8f498211a0506dffc7cf7ec6a1abf8b5a494 |
openswan-doc-2.6.21-5.el5.x86_64.rpm | SHA-256: 3455ab51bd9231026ff344b5fc22b9fec5fffb9501393c72a2eb49ede7a91fd2 |
ia64 | |
openswan-2.6.21-5.el5.ia64.rpm | SHA-256: 4cbc95d77245e16f7efcffafc6e460b0875005bc851e99706f60388abe9c9714 |
openswan-doc-2.6.21-5.el5.ia64.rpm | SHA-256: 76801646d1a147ca9ea34f48088eec4f860255b43965bf3115a9810acedc6527 |
i386 | |
openswan-2.6.21-5.el5.i386.rpm | SHA-256: 05830b6ec43e6e6eb89f04dc3534404f84deb1fdbbd4e198814917de0c7b85cc |
openswan-doc-2.6.21-5.el5.i386.rpm | SHA-256: c2ee8d370f4e8b7dfccb31798c588781164af6e1be4d9491de156dd573471588 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
openswan-2.6.21-5.el5.src.rpm | SHA-256: cca63fd6ee8ac1a9afddeb04efd18e9421fae0ac4002bafbf793abe891a09672 |
x86_64 | |
openswan-2.6.21-5.el5.x86_64.rpm | SHA-256: 9245a2830b7e1ed2da7422b9375e8f498211a0506dffc7cf7ec6a1abf8b5a494 |
openswan-doc-2.6.21-5.el5.x86_64.rpm | SHA-256: 3455ab51bd9231026ff344b5fc22b9fec5fffb9501393c72a2eb49ede7a91fd2 |
i386 | |
openswan-2.6.21-5.el5.i386.rpm | SHA-256: 05830b6ec43e6e6eb89f04dc3534404f84deb1fdbbd4e198814917de0c7b85cc |
openswan-doc-2.6.21-5.el5.i386.rpm | SHA-256: c2ee8d370f4e8b7dfccb31798c588781164af6e1be4d9491de156dd573471588 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
openswan-2.6.21-5.el5.src.rpm | SHA-256: cca63fd6ee8ac1a9afddeb04efd18e9421fae0ac4002bafbf793abe891a09672 |
x86_64 | |
openswan-2.6.21-5.el5.x86_64.rpm | SHA-256: 9245a2830b7e1ed2da7422b9375e8f498211a0506dffc7cf7ec6a1abf8b5a494 |
openswan-doc-2.6.21-5.el5.x86_64.rpm | SHA-256: 3455ab51bd9231026ff344b5fc22b9fec5fffb9501393c72a2eb49ede7a91fd2 |
i386 | |
openswan-2.6.21-5.el5.i386.rpm | SHA-256: 05830b6ec43e6e6eb89f04dc3534404f84deb1fdbbd4e198814917de0c7b85cc |
openswan-doc-2.6.21-5.el5.i386.rpm | SHA-256: c2ee8d370f4e8b7dfccb31798c588781164af6e1be4d9491de156dd573471588 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
openswan-2.6.21-5.el5.src.rpm | SHA-256: cca63fd6ee8ac1a9afddeb04efd18e9421fae0ac4002bafbf793abe891a09672 |
s390x | |
openswan-2.6.21-5.el5.s390x.rpm | SHA-256: 11476a3a1fb62d960e6d9935ba7b2c4bf22a6cad7d55fa4cf8c651a232ec6ef2 |
openswan-doc-2.6.21-5.el5.s390x.rpm | SHA-256: 4c39e28ab0130c072d7f0d708d96c8e0120c5cbf85e69423171cfe251a360563 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
openswan-2.6.21-5.el5.src.rpm | SHA-256: cca63fd6ee8ac1a9afddeb04efd18e9421fae0ac4002bafbf793abe891a09672 |
ppc | |
openswan-2.6.21-5.el5.ppc.rpm | SHA-256: 3d9d697a83e287f37312418e965fe1252f9a4ee1b7e7eb69d0e7d97fa0b4a9b8 |
openswan-doc-2.6.21-5.el5.ppc.rpm | SHA-256: 57963d3c3386cc04df2f1c9027fa0c6e4fc82b81d97c5dd95ac54a7d70060082 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
openswan-2.6.21-5.el5.src.rpm | SHA-256: cca63fd6ee8ac1a9afddeb04efd18e9421fae0ac4002bafbf793abe891a09672 |
x86_64 | |
openswan-2.6.21-5.el5.x86_64.rpm | SHA-256: 9245a2830b7e1ed2da7422b9375e8f498211a0506dffc7cf7ec6a1abf8b5a494 |
openswan-doc-2.6.21-5.el5.x86_64.rpm | SHA-256: 3455ab51bd9231026ff344b5fc22b9fec5fffb9501393c72a2eb49ede7a91fd2 |
i386 | |
openswan-2.6.21-5.el5.i386.rpm | SHA-256: 05830b6ec43e6e6eb89f04dc3534404f84deb1fdbbd4e198814917de0c7b85cc |
openswan-doc-2.6.21-5.el5.i386.rpm | SHA-256: c2ee8d370f4e8b7dfccb31798c588781164af6e1be4d9491de156dd573471588 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.