Package: strongswan
Version: 4.3.2-1.2
Severity: normal
Tags: patch

Upstream introduced a bug in version 4.3.x which breaks parsing of certificate 
common names if these contain email address OIDs (C=DE, O=org, e=...@bar.de). 
If incoming connection requests use certificates which contain CNs with such an 
OID strongswan is unable to choose the correct connection definition from 
ipsec.conf and fails with 'no matching peer config found'.

This is fixed with upstream commit c8b543a6fc28bc335212ec69d39cc57f5b0e4095.
http://wiki.strongswan.org/repositories/revision/strongswan/c8b543a6fc28bc335212ec69d39cc57f5b0e4095

This broke our setup which was working fine with lenny (4.2.4-5+lenny3) when we 
upgraded strongswan to a backported squeeze version (4.3.2-1.2).

-- System Information:
Debian Release: 5.0.4
  APT prefers proposed-updates
  APT policy: (500, 'proposed-updates'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-2-vserver-686 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages strongswan depends on:
ii  strongswan-ikev1              4.3.2-1.2  strongSwan Internet Key Exchange (
ii  strongswan-ikev2              4.3.2-1.2  strongSwan Internet Key Exchange (

strongswan recommends no packages.

Versions of packages strongswan suggests:
pn  network-manager-strongswan    <none>     (no description available)

-- debconf information:
  strongswan/x509_self_signed: true
  strongswan/x509_state_name:
* strongswan/start_level: earliest
  strongswan/x509_organizational_unit:
  strongswan/ikev2: true
  strongswan/x509_email_address:
* strongswan/enable-oe: false
  strongswan/x509_locality_name:
  strongswan/x509_country_code: AT
  strongswan/ikev1: true
  strongswan/x509_organization_name:
  strongswan/existing_x509_key_filename:
  strongswan/rsa_key_type: x509
* strongswan/create_rsa_key: false
  strongswan/existing_x509_certificate: false
* strongswan/restart: true
  strongswan/x509_common_name:
  strongswan/rsa_key_length: 2048
  strongswan/existing_x509_certificate_filename:
commit c8b543a6fc28bc335212ec69d39cc57f5b0e4095
Author: Andreas Steffen <andreas.stef...@strongswan.org>
Date:   Tue Aug 18 17:52:00 2009 +0200

    fixed wrong emailAddress OID introduced by revision c31687da

diff --git a/src/libstrongswan/utils/identification.c 
b/src/libstrongswan/utils/identification.c
index 10daf46..7c3b19c 100644
--- a/src/libstrongswan/utils/identification.c
+++ b/src/libstrongswan/utils/identification.c
@@ -85,9 +85,9 @@ static const x501rdn_t x501rdns[] = {
        {"ID",                          OID_UNIQUE_IDENTIFIER,          
ASN1_PRINTABLESTRING},
        {"EN",                          OID_EMPLOYEE_NUMBER,            
ASN1_PRINTABLESTRING},
        {"employeeNumber",      OID_EMPLOYEE_NUMBER,            
ASN1_PRINTABLESTRING},
-       {"E",                           OID_EMAIL_ADDRESS,                      
ASN1_IA5STRING},
-       {"Email",                       OID_EMAIL_ADDRESS,                      
ASN1_IA5STRING},
-       {"emailAddress",        OID_EMAIL_ADDRESS,                      
ASN1_IA5STRING},
+       {"E",                           OID_PKCS9_EMAIL,                        
ASN1_IA5STRING},
+       {"Email",                       OID_PKCS9_EMAIL,                        
ASN1_IA5STRING},
+       {"emailAddress",        OID_PKCS9_EMAIL,                        
ASN1_IA5STRING},
        {"UN",                          OID_UNSTRUCTURED_NAME,          
ASN1_IA5STRING},
        {"unstructuredName",OID_UNSTRUCTURED_NAME,              ASN1_IA5STRING},
        {"TCGID",                       OID_TCGID,                              
        ASN1_PRINTABLESTRING}

Reply via email to