[Announce] ANNOUNCE: strongswan-2.7.0 released

Andreas Steffen andreas.steffen at strongswan.org
Thu Apr 27 13:46:23 CEST 2006


Hi,

I'm happy to announce the major release strongswan-2.7.0 which is
available from

    http://www.strongswan.org

and which at last offers built-in iptables support for both
Linux 2.4 and 2.6 kernels and should make fully integrated
firewall solutions a piece of cake. Here are the details:


Re-activation of the left|rightfirewall parameter
-------------------------------------------------

The default _updown script now automatically inserts and deletes
dynamic iptables firewall rules upon the establishment or teardown, 
respectively, of an IPsec security association. This new feature is 
activated with the line

     leftfirewall=yes

and can be used when the following prerequisites are fulfilled:

     * Linux 2.4.x kernel, KLIPS IPsec stack, and arbitrary iptables
       version. Filtering of tunneled traffic is based on ipsecN
       interfaces.

     * Linux 2.6.16 kernel, native NETKEY IPsec stack, and
       iptables-1.3.5. Filtering of tunneled traffic is based
       on Patrick McHardy's iptables IPsec policy matching rules .

All UML scenarios shown under the link:

    http://www.strongswan.org/uml/testresults

have been converted to the new leftfirewall=yes scheme.

strongswan-2.7.0 is fully backwards compatible with earlier versions
(assuming that the ipfwadm is now obsolete and not used anymore).
Thus your personal firewall solution based on an updown script imported 
via leftupdown will still work. For Linux 2.6 kernels < 2.6.16 the
_updown_espmark template is recommended.


New left|righthostaccess parameter
----------------------------------

If you define a local client subnet with a netmask larger than /32 
behind the gateway then the automatically inserted FORWARD iptables 
rules will not allow you to access the internal IP address of the host 
although it is part of the client subnet definition. If you want 
additional INPUT and OUTPUT iptables rules to be inserted, so that the 
host itself can be accessed then add the following line:

     lefthostaccess=yes


Mixed PSK/RSA roadwarrior support
---------------------------------

The ISAKMP proposal payload is preparsed in order to find out whether
the roadwarrior requests PSK or RSA so that a matching connection
candidate can be found. Thanks go to Mathieu Lafon who wrote the
original patch. The following example shows the use of this new feature

   http://www.strongswan.org/uml/testresults/rw-psk-rsa-mixed/

Best regards

Andreas

======================================================================
Andreas Steffen                         andreas.steffen at strongswan.org
strongSwan - the Linux VPN Solution!                www.strongswan.org
Institute of Internet Technologies and Applications
University of Applied Sciences Rapperswil
CH-8640 Rapperswil (Switzerland)
===========================================================[ITA-HSR]==


More information about the Announce mailing list