1 secnet (0.6.0~) unstable; urgency=medium
4 * mobile sites: Do not ever expire peer addresses. In practice
5 this fixes transitions between IPv6-only and IPv4-only networks.
6 * make-secnet-sites: Tainted: Fix a lot of bad return values
7 (which would result in assertions rather than nice error messages).
8 * Fix hash algo confusion in mixed sha1/md5 configurations (see below).
11 * site: Always advertise all capabilities, even in MSG1. This is
12 incompatible with secnets earlier than 0.3.0 (September 2013), which
13 are all quite badly broken and should have been upgraded long ago.
14 * Drop support for using the same loaded rsa key with multiple different
15 hash algorithms (which was broken in 0.5.0). Right now we support
16 only `sha1' and `md5' so everyone should be using `sha1'.
17 Installations which specified `md5' anywhere may need config changes.
19 Major new featureset (use of which is not adviseable yet):
20 * New facilities for negotiating about the signing keys to use for
21 authentication during key setup, and selecting and using the
22 appropriate keys. (``key-cache'/`privcache' and `peer-keys').
23 Using these new facilities for keyrollover now is in principle
24 possible but rather complex. Further machinery is planned;
25 for now, retain your existing config which should keep working.
27 - secnet: new `privcache' closure;
28 - secnet: `key-cache' and `peer-keys' keys on site closures;
29 - secnet: new file format for peer public keysets;
30 - secnet: new `make-public' config operator;
31 - make-secnet-sites `pub', `pkg', `serial', etc. keywords;
32 - make-secnet-sites --filter, --pubkeys-*, --output-version.
34 More minor (logging) improvements:
35 * Make stderr line buffered and log to it by default.
36 * Do not log differently with --nodetach.
37 * New `prefix' option to `logfile' closure.
38 * Tidy and simplify some messages.
41 * Many substantial internal refactorings in secnet.
42 * Many substantial internal refactorings in make-secnet-sites.
43 * make-secnet-sites option parsing totally replaced.
44 * Imported subtrees for base91-c and base91-python.
45 * New portablity code, etc.: osdep.[ch], fmemopen reimplementation.
46 * Explicitly define oddly-rotated dh padding arrangement (write_mpbin).
48 Build system and packaging:
49 * Do not fail to build from git when HEAD refers to a packed ref.
50 * Update to subdirmk 0.3.
51 * Many makefile fixes (esp. to clean and cdeps).
52 * configure.ac: Drop or suppress some very obsolete checks.
53 * autogen.sh: Write a comment about need for autoheader.
54 * dir-locals: Provide python-indent-offset too.
57 * stest: Use stderr, not tty, for logging.
58 * stest/udp-preload.c: Fix error handling of sun_prep.
59 * stest: Fix breakage if nproc is not installed.
61 Test suite improvements:
62 * New tests, including tests for new features.
63 * Existing tests (especially stest) generally made more thorough.
64 * New comprehensive-test and pretest-to-tested convenience scripts.
65 * Arrangements for testing with (user-provided) old secnet.
66 * parallel-test.*: scripts to help with parallelised bisection.
67 * stest: Print a lot more output about what we are doing.
68 * stest: Better support for cwd with longish pathname.
69 * stest: More flexibility, env var hooks, etc.
73 secnet (0.5.1) unstable; urgency=medium
75 POTENTIALLY INCOMPATIBLE CHANGE. Some security implications.
77 * make-secnet-sites: Prefix names when writing secnet sites.conf file.
79 make-secnet-sites must copy names (vpn, location and site names) from
80 the input sites file (which is not wholly trusted) to the secnet
81 config file. Prior to this release, naming a location or site the
82 same as a secnet predefined name could generate a broken sites.conf
83 which secnet would reject. (With the existing featureset,
84 malfunctions other than rejection, eg privilege escalation, are not
87 make-secnet-sites now adds a prefix to these names when writing
88 sites.conf. This will not affect configurations which use the
89 make-secnet-sites-provided `all-sites' key, as is usual. Other
90 configurations will break unless the references in the static part of
91 the config are adjusted.
93 Previous behaviour can be restored with the --no-conf-key-prefix
94 option. (Planned future enhancements to secnet are likely to make use
95 of that option, with untrusted input, dangerously insecure.)
97 other changes to make-secnet-sites:
98 * Fix argument parsing. Fixes a regression affecting -P in 0.5.0,
99 and also fixes new facilities introduced in 0.5.0.
100 * Sort the properties on output (and adjust the test case expected
101 outputs). Tests now pass on (at least) Python 2.7.13, 3.5.3, 3.7.5.
102 * Delete some unused code.
105 * Change one idiom to avoid a warning from GCC9. No functional change.
107 build system - MAJOR CHANGES:
108 * Fix out-of-tree builds. (Broken in 0.5.0)
109 * Replace recursive make with use of the new subdirmk system.
110 This represents a fairly comprehensive overhaul of the makefiles.
111 Several bugs (esp. involving dependencies between files in different
112 directories) are fixed.
113 * Drop `make check' from `make all'. (Otherwise there is no way
114 to ask for `all' without `check'.)
115 * Suppress two unhelpful new compiler warnings from GCC9.
116 * Release checklist update.
119 * Credit Mark Wooding properly in CREDITS.
120 * Include DEVELOPER-CERTIFICATE.
123 * Locations now have different names to sites.
124 * Somewhat better debugging output from mtest.
125 * Do not run msgcode-test except with `make fullcheck'.
126 * Other minor bugfixes and improvments.
127 * stest: Suppress unhelpful -Wno-unused-result (needed for stretch).
129 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Fri, 22 Nov 2019 23:13:14 +0000
131 secnet (0.5.0) unstable; urgency=medium
133 make-secnet-sites SECURITY FIX:
134 * Do not blindly trust inputs; instead, check the syntax for sanity.
135 Previous releases can be induced to run arbitrary code as the user
136 invoking secnet (which might be root), if a secnet sites.conf is used
137 that was generated from an untrustworthy sites file.
138 * The userv invocation mode of make-secnet-sites seems to have been safe
139 in itself, but it previously allowed hazardous data to be propagated
140 into the master sites file. This is now prevented too.
142 make-secnet-sites overhaul work:
143 * make-secnet-sites is now in the common subset of Python2 and Python3.
144 The #! is python3 now, but it works with Python2.7 too.
145 It will probably *not* work with old versions of Python2.
146 * We no longer depend on the obsolete `ipaddr' library. We use
147 `ipaddress' now. And this is onlo a Recommends in the .deb.
148 * Ad-hoc argument parser been replaced with `argparse'.
149 There should be no change to existing working invocations.
150 * Bad address syntax error does not wrongly mention IPv6 scopes.
151 * Minor refactoring to support forthcoming work. [Mark Wooding]
153 other bugfixes, improvements and changes to secnet itself:
154 * Better logging of why we are sending NAK messages.
155 * Correctly use the verified copy of the peer remote capabilities
156 from MSG3. (Bug is not a vulnerability.) [Mark Wooding]
157 * Significant internal rearrangements and refactorings, to support
158 forthcoming key management work. [Mark Wooding and Ian Jackson]
161 * Completely overhaul release checklist; drop dist target.
162 * Remove dependency on `libfl.a'. [Mark Wooding]
163 * polypath.c: Fix missing include of <limits.h>. [Mark Wooding]
164 * Add a Wireshark dissector `secnet-wireshark.lua'. It is not
165 installed anywhere right now. [Mark Wooding]
168 * Improve documentation of capability negotiation in NOTES, secnet(8)
169 and magic.h. [Mark Wooding]
171 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Thu, 24 Oct 2019 19:11:54 +0100
173 secnet (0.4.5) unstable; urgency=medium
175 * INSTALL: Mention that rsa key generation might need ssh-keygen1.
176 * mobile: Fix negotiation bug with mixed old/new secnets and
177 simultaneous key setup attempts by each end. [Mark Wooding]
178 * Makefile.in: Support installation from a `VPATH' build. [Mark Wooding]
179 * Portability fixes for clang. [Mark Wooding]
181 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Sat, 21 Sep 2019 12:04:31 +0100
183 secnet (0.4.4) unstable; urgency=medium
186 * make-secnet-sites: Don't allow setting new VPN-level properties
187 when restricted. This could allow denial of service by
188 users with delegated authorisation. [Mark Wooding]
190 Bugfixes for poor network environments:
191 * polypath: cope properly with asymmetric routing, by correcting
192 the handling of late duplicated packets etc. Protocol is now
193 incompatible with secnet prior to 0.3.0 when either end is mobile.
194 * Randomise key setup retry time.
197 * rsa and cbcmac: Fix configuration error messages. [Mark Wooding]
198 * Handle IPv4 addresses properly (ie, not foolishly byte-swapped),
199 when IPv6 is not available. [Mark Wooding]
200 * Better logging (and less foolish debug), especially about whether
201 key is set up, and about crossed key setup attempts.
202 * Internal refactoring and fixes. [Ian Jackson and Mark Wooding]
204 Build system and portability:
205 * configure: rerun autogen.sh with autoconf 2.69-10
206 * Avoid memset(0,0,0) wrt st->sharedsecret. (Fixes compiler warning;
207 in theory might cause miscompilation.) [Mark Wooding]
210 * README.make-secnet-sites: new documentation file. [Mark Wooding]
211 * NOTES: Describe current allocation of capability bits. [Mark Wooding]
212 * NOTES: tiny fix tot protocol description.
213 * secnet(8): Delete wrong information about dh groups. [Mark Wooding]
216 * Fix erroneous GPL3+ licence notices "version d or later" (!)
217 * .dir-locals.el: Settings for Python code. [Mark Wooding]
219 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Sun, 08 Sep 2019 22:53:14 +0100
221 secnet (0.4.3) unstable; urgency=low
223 Security improvement:
224 * Use `mpz_powm_sec' for modexps.
227 * Implement comm-info and dedicated-interface-addr feature, for
229 * Implement `keepalive' site option, to try to keep link always up.
232 * #include <limits.h> (fixes the build on jessie).
233 * Tolerate building from a git checkout, but with git not installed.
234 (This can happen in chroots.)
235 * Turn off -Wsign-compare for bison output.
236 * Makefile.in: Fix `check-ipaddrset' rule to get reference from
237 $(srcdir). (Makes out-of-tree builds work properly.)
238 * Release checklist fixes.
239 * Burn version numbers 0.4.1 and 0.4.2 due to errors in release prep.
242 * When printing messages about dropping IPv6, do not print anything
243 about ihl. (Check the IP version field first!)
244 * When turning on debug, turn on verbose too.
246 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Sat, 25 Nov 2017 13:36:41 +0000
248 secnet (0.4.0) unstable; urgency=low
250 Debugging improvements:
251 * Packet-level debugging from site notes errors from transmit.
252 * Report when transport peers updated as a result of transmit.
254 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Sat, 28 Feb 2015 15:03:00 +0000
256 secnet (0.4.0~beta2) unstable; urgency=low
259 * Ignore IPv6 Unique Local unicast addresses.
260 * Skip "tentative" IPv6 local addresses.
261 * Improve logging and debug output.
264 * Build where size_t is not compatible with int.
266 Build system and packaging fixes:
267 * Makefile: support DESTDIR.
268 * debian/rules: set DESTDIR (not prefix).
269 * debian/rules: Support dpkg-buildflags.
270 * Install ipaddrset.py and secnet.8 with correct permissions.
271 * Fix check for <linux/if_tun.h> and git rid of our copy.
272 * Use -lresolv only if inet_aton is not found otherwise.
273 * Use -lnsl only if inet_ntoa is not found otherwise.
274 * debian/rules: Provide build-arch and build-indep targets.
275 * debian/rules: Do not run build for *-indep (!)
276 * Makefile.in: Putative dual (backport and not) release build process doc.
279 * Update to GPLv3. Add missing copyright notices and credits.
280 * Get rid of old FSF street address; use URL instead.
281 * Remove obsolete LICENCE.txt (which was for snprintf reimplementation).
282 * Remove obsolete references to Cendio (for old ipaddr.py).
284 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Sun, 28 Dec 2014 17:14:10 +0000
286 secnet (0.4.0~beta1) unstable; urgency=low
289 * Support transport over IPv6. (We do not yet carry IPv6 in the private
290 network.) IPv6 support depends on IPv6-capable adns (adns 1.5.x).
291 * New polypath comm, which can duplicate packets so as to send them via
292 multiple routes over the public network, for increased
293 reliability/performance (but increased cost). Currently Linux-only
294 but should be fairly easy to port.
295 * Support multiple public addresses for peers.
296 * Discard previously-received packets (by default).
298 Logging improvements:
299 * Report (each first) transmission and reception success and failure.
300 * Log reason for DNS reolution failure.
301 * Log unexpected kinds of death from userv.
302 * Log authbind exit status as errno value (if appropriate).
304 Configuration adjustments:
305 * Adjust default number of mobile peer addresses to store when a peer
306 public address is also configured.
307 * Make specifying peer public port optional. This avoids making special
308 arrangements to bind to a port for in mobile sites with no public
312 * Hackypar children will die if they get a terminating signal.
313 * Fix signal dispositions inherited by secnet's child processes.
314 * Fix off-by-one error which prevented setting transport-peers-max to 5.
316 Test, build and internal improvements:
317 * Use conventional IP address handling library ipaddr.py.
318 * Provide a fuzzer for the slip decoder.
319 * Build system improvements.
320 * Many source code cleanups.
322 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Sun, 26 Oct 2014 15:28:31 +0000
324 secnet (0.3.4) unstable; urgency=low
327 * The previous security fix to buffer handling was entirely wrong. This
328 one is better. Thanks to Simon Tatham for the report and the patch.
330 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Mon, 22 Sep 2014 16:16:11 +0100
332 secnet (0.3.3) unstable; urgency=high
335 * Pass correct size argument to recvfrom. This is a serious security
336 problem which may be exploitable from outside the VPN.
337 * Fix a memory leak in some error logging.
340 * Two other latent bugs in buffer length handling found and fixed.
341 * Non-critical stylistic improvements to buffer length handling, to make
342 the code clearer and to assist audit.
344 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Fri, 19 Sep 2014 23:50:45 +0100
346 secnet (0.3.3~beta1) unstable; urgency=low
348 Installation compatibility fix:
349 * In make-secnet-sites, always use our own ipaddr.py even if the
350 incompatible modern ipaddr.py is installed (eg via python-ipaddr.deb).
351 (Future versions of secnet are going to need that Python module to be
354 For links involving mobile sites:
355 * Use source of NAK packets as hint for peer transport address.
356 * When initiating rekey, make use of data transport peer addresses.
359 * Provide clean target in test-example/Makefile.
361 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Fri, 19 Sep 2014 00:11:44 +0100
363 secnet (0.3.2) unstable; urgency=low
365 * Release of 0.3.2. No code changes since 0.3.1~beta1.
367 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Thu, 26 Jun 2014 20:27:58 +0100
369 secnet (0.3.2~beta1) unstable; urgency=low
371 For links involving mobile sites:
372 * SECURITY: Properly update peer address array when it is full.
373 * Do name-resolution on peer-initiated key setup too, when we are mobile
374 (and other name-resolution improvements).
376 Other minor improvements:
377 * Log peer addresses on key exchange timeout.
378 * When printing version (eg during startup), use value from git-describe
379 and thus include git commit id where applicable.
380 * Updates to release checklist in Makefile.in.
381 * Use C99 _Bool for bool_t.
383 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Fri, 06 Jun 2014 01:17:54 +0100
385 secnet (0.3.1) unstable; urgency=low
387 * Release of 0.3.1. No code changes since 0.3.1~beta3.
389 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Thu, 15 May 2014 01:08:30 +0100
391 secnet (0.3.1~beta3) unstable; urgency=low
393 * Build fixes for non-i386 architectures and gcc 4.8.2.
395 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Thu, 08 May 2014 19:53:43 +0100
397 secnet (0.3.1~beta2) unstable; urgency=low
399 Fix relating to new fragmentation / ICMP functionality:
400 * Generate ICMP packets correctly in point-to-point configurations.
402 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Sat, 03 May 2014 18:58:09 +0100
404 secnet (0.3.1~beta1) unstable; urgency=low
406 Security fixes (vulnerabilities are to inside attackers only):
407 * SECURITY: Fixes to MTU and fragmentation handling.
408 * SECURITY: Correctly set "unused" ICMP header field.
409 * SECURITY: Fix IP length check not to crash on very short packets.
412 * Make the inter-site MTU configurable, and negotiate it with the peer.
415 * Fix netlink SEGV on clientless netlinks (i.e. configuration error).
416 * Fix formatting error in p-t-p startup message.
417 * Do not send ICMP errors in response to unknown incoming ICMP.
418 * Fix formatting error in secnet.8 manpage.
419 * Internal code rearrangements and improvements.
421 Packaging improvements:
422 * Updates to release checklist in Makefile.in.
423 * Additions to the test-example suite.
425 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Thu, 01 May 2014 19:02:56 +0100
427 secnet (0.3.0) unstable; urgency=low
429 * Release of 0.3.0. No code changes since 0.3.0~beta3.
430 * Update release checklist.
432 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Sun, 01 Sep 2013 20:27:48 +0100
434 secnet (0.3.0~beta3) unstable; urgency=low
436 * New upstream version.
437 - Stability bugfix: properly initialise site's scratch buffer.
439 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Mon, 05 Aug 2013 11:54:09 +0100
441 secnet (0.3.0~beta2) unstable; urgency=low
443 * New upstream version.
444 - SECURITY FIX: RSA public modulus and exponent buffer overflow.
445 - SECURITY FIX: Use constant-time memcmp for message authentication.
446 - SECURITY FIX: Provide a new transform, eax-serpent, to replace cbcmac.
447 - SECURITY FIX: No longer send NAKs for NAKs, avoiding NAK storm.
448 - SECURITY FIX: Fix site name checking when site name A is prefix of B.
449 - SECURITY FIX: Safely reject too-short IP packets.
450 - Better robustness for mobile sites (proper user of NAKs, new PROD msg).
451 - Better robustness against SLIP decoding errors.
452 - Fix bugs which caused routes to sometimes not be advertised.
453 - Protocol capability negotiation mechanism.
454 - Improvements and fixes to protocol and usage documentation.
455 - Other bugfixes and code tidying up.
457 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Thu, 25 Jul 2013 18:26:01 +0100
459 secnet (0.3.0~beta1) unstable; urgency=low
461 * New upstream version.
462 - SECURITY FIX: avoid crashes (or buffer overrun) on short packets.
463 - Bugfixes relating to packet loss during key exchange.
464 - Bugfixes relating to link up/down status.
465 - Bugfixes relating to logging.
466 - make-secnet-sites made more sophisticated to support two vpns on chiark.
467 - Documentation improvements.
468 - Build system improvements.
469 * Debian packaging improvements:
471 - Maintainer / uploaders.
472 - init script requires $remove_fs since we're in /usr.
474 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Thu, 12 Jul 2012 20:18:16 +0100
476 secnet (0.2.1-1) unstable; urgency=low
478 * New upstream version. (authbind endianness fix)
480 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Sun, 11 Dec 2011 13:14:57 +0000
482 secnet (0.2.0-1) unstable; urgency=low
484 * New upstream version.
486 -- Ian Jackson <ijackson@chiark.greenend.org.uk> Sat, 10 Dec 2011 22:44:41 +0000
488 secnet (0.1.18-1) unstable; urgency=low
490 * New upstream version.
492 -- Stephen Early <steve@greenend.org.uk> Tue, 18 Mar 2008 17:45:00 +0000