IKEv2 VPN connections fail to use DNS servers provided by the server
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
strongswan (CentOS) |
Unknown
|
Unknown
|
|||
strongswan (Ubuntu) |
Fix Released
|
Medium
|
Unassigned | ||
Bionic |
Fix Released
|
High
|
Unassigned |
Bug Description
[Impact]
* Due to a rework of libnm-glib to libnm there was an error in the
strongswan code. This error lead to pass garbadge (pointer instead of
string) to the parser that pushes new config to NM on connection.
* Upstream had a fix for quite a while, it already is in Ubuntu since
Cosmic. But we should also backport it to Bionic.
[Test Case]
* The test follows 4 rough steps, comment #15 has details about them
0. prep a VPN server/client setup with IKEv2
1. Install test system
2. Make sure you have installed strongswan-nm
3. Setup a strongswan connection in NM GUI
[Regression Potential]
* Compared to accessing almost random data the new code seems much safer.
But let us be strict and anticipate regressions, I think in a setup
that was used to get "no valid" DNS carried over it might now actually
get proper DNS which might change name resolution for those clients.
I doubt this is too much of an issue, as the wrong DNS before would
already have added a delay forcing the user to debug and workaround,
but that is the one regression that comes to mind.
* This change only affects charon-nm which means
a) not the strongswan server
b) no systemd-networkd setups
c) no setups that didn't use the NM plugin
[Other Info]
* n/a
---
Description: Ubuntu 18.04 LTS
Release: 18.04
strongswan-nm:
Installed: 5.6.2-1ubuntu2
Candidate: 5.6.2-1ubuntu2
Version table:
*** 5.6.2-1ubuntu2 500
500 http://
100 /var/lib/
Expectation:
Strongswan should actually receive and set the DNS server properly.
What does happen:
Strongswan-nm (charon-nm) does set a random DNS server which breaks the name resolution completely.
The bug has already been reported for RedHat, and has been fixed in the strongswan upstream repo:
https:/
Related branches
- Rafael David Tinoco (community): Approve
- Bryce Harrington (community): Approve
- Canonical Server: Pending requested
-
Diff: 69 lines (+47/-0)3 files modifieddebian/changelog (+7/-0)
debian/patches/lp-1772705-charon-nm-Fix-building-list-of-DNS-MDNS-servers-with.patch (+39/-0)
debian/patches/series (+1/-0)
- Andreas Hasenack (community): Approve
- Canonical Server: Pending requested
- git-ubuntu developers: Pending requested
-
Diff: 2059 lines (+1537/-90)18 files modifieddebian/changelog (+1155/-0)
debian/control (+122/-6)
debian/ipsec.secrets.proto (+0/-3)
debian/libcharon-extra-plugins.install (+64/-12)
debian/libcharon-standard-plugins.install (+19/-0)
debian/libstrongswan-extra-plugins.install (+58/-0)
debian/libstrongswan.install (+11/-6)
debian/patches/dont-load-kernel-libipsec-plugin-by-default.patch (+11/-0)
debian/patches/series (+1/-0)
debian/rules (+50/-6)
debian/strongswan-starter.install (+4/-0)
debian/strongswan-starter.postinst (+0/-57)
debian/strongswan-tnc-base.install (+16/-0)
debian/strongswan-tnc-client.install (+5/-0)
debian/strongswan-tnc-ifmap.install (+3/-0)
debian/strongswan-tnc-pdp.install (+3/-0)
debian/strongswan-tnc-server.install (+10/-0)
debian/usr.sbin.charon-systemd (+5/-0)
Changed in strongswan (Ubuntu): | |
status: | Confirmed → In Progress |
tags: | added: rls-bb-incoming |
tags: | added: server-next |
Changed in strongswan (Ubuntu Bionic): | |
importance: | Undecided → High |
description: | updated |
tags: |
added: verification-done verification-done-bionic removed: verification-failed verification-failed-bionic |
Proposed patch: https:/ /git.strongswan .org/?p= strongswan. git;a=commitdif f;h=ee8c2551