Skip to content

Commit

Permalink
Added what's new in strongswan 6.0
Browse files Browse the repository at this point in the history
  • Loading branch information
strongX509 authored and tobiasbrunner committed Aug 6, 2024
1 parent c1b5b26 commit 78dbe11
Show file tree
Hide file tree
Showing 3 changed files with 152 additions and 0 deletions.
3 changes: 3 additions & 0 deletions docs/modules/ROOT/nav.adoc
Original file line number Diff line number Diff line change
@@ -1,3 +1,6 @@
.News
** xref:news/whatsNew.adoc[]

* xref:howtos/introduction.adoc[]
* xref:howtos/ipsecProtocol.adoc[]
Expand Down
1 change: 1 addition & 0 deletions docs/modules/ROOT/pages/index.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@

== Introduction

* xref:news/whatsNew.adoc[]
* xref:howtos/introduction.adoc[An introduction to strongSwan]

== Configuration Examples
Expand Down
148 changes: 148 additions & 0 deletions docs/modules/ROOT/pages/news/whatsNew.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,148 @@
= What's New in strongSwan 6.0

:GMP: https://gmplib.org/
:OPENSSL: https://openssl.org/
:LIBOQS: https://github.com/open-quantum-safe/liboqs

== Plugins

=== New Plugins

The following new `*libstrongswan*` plugins have been *added*:

[cols="5,22"]
|===
|Plugin Name |Description

|frodo
|FrodoKEM post quantum safe key exchange method

|oqs
|Open quantum safe plugin based on the {LIBOQS}[`*liboqs*`] library
|===

=== Removed Plugins

The following deprecated `*libstrongswan*` plugins have been *removed*:

[cols="5,22"]
|===
|Plugin Name |Description

|bliss
|Bimodal Lattice Signature Scheme (BLISS) post-quantum computer signature scheme

|newhope
|Key exchange based on post-quantum computer New Hope algorithm

|ntru
|Key exchange based on post-quantum computer NTRU encryption
|===

=== Default Plugins

The powerful `*openssl*` crypto plugin is now *enabled* by default:

[cols="5,22"]
|===
|Plugin Name |Description

|openssl
|Crypto backend based on the {OPENSSL}[OpenSSL] library
|===

Due to the nearly all-encompassing capabilities of the `*openssl*` default
crypto plugin, the following `*libstrongswan*` plugins are *not enabled* by
default anymore:

[cols="5,22"]
|===
|Plugin Name |Description

|aes
|AES-128/192/256 cipher software implementation

|curve25519
|X25519 DH group and Ed25519 public key authentication

|des
|DES/3DES cipher software implementation

|fips-prf
|PRF specified by FIPS, used by EAP-SIM/AKA algorithms

|gmp
|RSA/DH crypto backend based on {GMP}[libgmp]

|hmac
|HMAC wrapper using various hashers

|md5
|MD5 hasher software implementation

|pkcs12
|PKCS#12 decoding routines

|rc2
|RC2 cipher software implementation

|sha1
|SHA1 hasher software implementation

|sha2
|SHA-2 hasher software implementation
|===

IMPORTANT: The legacy `*stroke*` management interface has been deprecated for many
years and has been replaced by the versatile xref:plugins/vici.adoc[`*vici*`]
management interface. Thus with strongSwan 6.0, the `*stroke*` plugin
is *not enabled* by default anymore and has to be built separately.

[cols="5,22"]
|===
|Plugin Name |Description

|stroke
|Deprecated stroke configuration/control backend used with ipsec script and starter
|===

Thus the xref:/plugins/plugins.adoc#_default_plugins[following 25 plugins] are now
enabled by xref:/plugins/plugins.adoc#_default_plugins[default].

== Configuration Options

The following two xref:config/strongswanConf.adoc#_charon[`*strongswan.conf*`]
configuration options are now enabled by default:

[cols="4,1,8"]
|===
|*Key*|*Default*|*Description [Default]*

|make_before_break |`yes`
|Initiate IKEv2 reauthentication with a *make-before-break* instead of a
*break-before-make* scheme. Make-before-break uses overlapping `IKE` and `CHILD SA`
during reauthentication by first recreating all new SAs before deleting the old
ones. This behavior can be beneficial to avoid connectivity gaps during
reauthentication, but requires support for overlapping SAs by the peer.
strongSwan can handle such overlapping SAs since version 5.3.0

|rsa_pss |`yes`
|Use RSA with PSS padding by default. Revert to legacy PKCS#1 padding by setting
the option to no
|===

Thus the following xref:pki/pki.adoc[`*pki*`] subcommands now use RSA-PSS signatures
per default:

[cols="1,1,1"]
|===
|xref:pki/pkiAcert.adoc[`pki --acert`]
|xref:pki/pkiIssue.adoc[`pki --issue`]
|xref:pki/pkiSelf.adoc[`pki --self`]

|xref:pki/pkiReq.adoc[`pki --req`]
|xref:pki/pkiScep.adoc[`pki --scep`]
|xref:pki/pkiSignCrl.adoc[`pki --signcrl`]
|===

Use the command line option `*--rsa-padding pkcs1*` for legacy PKCS#1 padding.

0 comments on commit 78dbe11

Please sign in to comment.