strongswan: 5.9.14 -> 6.0.2 (#362302)

Nick Cao 7d72ca8c 0e38b27f

Changed files
+301 -268
nixos
doc
manual
release-notes
modules
services
networking
strongswan-swanctl
pkgs
by-name
st
strongswan
+2
nixos/doc/manual/release-notes/rl-2511.section.md
···
- Potential race conditions in the network setup when using `networking.interfaces` have been fixed by disabling duplicate address detection (DAD)
for statically configured IPv6 addresses.
- `amdgpu` kernel driver overdrive mode can now be enabled by setting [hardware.amdgpu.overdrive.enable](#opt-hardware.amdgpu.overdrive.enable) and customized through [hardware.amdgpu.overdrive.ppfeaturemask](#opt-hardware.amdgpu.overdrive.ppfeaturemask).
This allows for fine-grained control over the GPU's performance and maybe required by overclocking softwares like Corectrl and Lact. These new options replace old options such as {option}`programs.corectrl.gpuOverclock.enable` and {option}`programs.tuxclocker.enableAMD`.
···
- Potential race conditions in the network setup when using `networking.interfaces` have been fixed by disabling duplicate address detection (DAD)
for statically configured IPv6 addresses.
+
- `strongSwan` has been updated to 6.0. See [strongSwan 6.0.0 release notes](https://github.com/strongswan/strongswan/releases/tag/6.0.0) for a complete list of changes.
+
- `amdgpu` kernel driver overdrive mode can now be enabled by setting [hardware.amdgpu.overdrive.enable](#opt-hardware.amdgpu.overdrive.enable) and customized through [hardware.amdgpu.overdrive.ppfeaturemask](#opt-hardware.amdgpu.overdrive.ppfeaturemask).
This allows for fine-grained control over the GPU's performance and maybe required by overclocking softwares like Corectrl and Lact. These new options replace old options such as {option}`programs.corectrl.gpuOverclock.enable` and {option}`programs.tuxclocker.enableAMD`.
+144 -104
nixos/modules/services/networking/strongswan-swanctl/swanctl-params.nix
···
'';
proposals = mkCommaSepListParam [ "default" ] ''
-
A proposal is a set of algorithms. For non-AEAD algorithms, this includes
-
for IKE an encryption algorithm, an integrity algorithm, a pseudo random
-
function and a Diffie-Hellman group. For AEAD algorithms, instead of
-
encryption and integrity algorithms, a combined algorithm is used.
-
In IKEv2, multiple algorithms of the same kind can be specified in a
-
single proposal, from which one gets selected. In IKEv1, only one
-
algorithm per kind is allowed per proposal, more algorithms get implicitly
-
stripped. Use multiple proposals to offer different algorithms
-
combinations in IKEv1.
-
Algorithm keywords get separated using dashes. Multiple proposals may be
-
specified in a list. The special value `default` forms a
-
default proposal of supported algorithms considered safe, and is usually a
-
good choice for interoperability.
'';
vips = mkCommaSepListParam [ ] ''
···
Use childless IKE_SA initiation (RFC 6023) for IKEv2, with the first
CHILD_SA created with a separate CREATE_CHILD_SA exchange (e.g. to use an
-
independent DH exchange for all CHILD_SAs). Acceptable values are `allow`
-
(the default), `prefer`, `force` and `never`. If set to `allow`, responders
will accept childless IKE_SAs (as indicated via notify in the IKE_SA_INIT
response) while initiators continue to create regular IKE_SAs with the first
CHILD_SA created during IKE_AUTH, unless the IKE_SA is initiated explicitly
without any children (which will fail if the responder does not support or
-
has disabled this extension). The effect of `prefer` is the same as `allow`
on responders, but as initiator a childless IKE_SA is initiated if the
-
responder supports it. If set to `force`, only childless initiation is
-
accepted in either role. Finally, setting the option to `never` disables
support for childless IKE_SAs as responder.
'';
···
reauthentication lifetime negotiation can instruct the client to perform
reauthentication.
-
Reauthentication is disabled by default. Enabling it usually may lead to
-
small connection interruptions, as strongSwan uses a break-before-make
-
policy with IKEv2 to avoid any conflicts with associated tunnel resources.
'';
rekey_time = mkDurationParam "4h" ''
···
mkAttrsOfParams
{
ah_proposals = mkCommaSepListParam [ ] ''
-
AH proposals to offer for the CHILD_SA. A proposal is a set of
-
algorithms. For AH, this includes an integrity algorithm and an optional
-
Diffie-Hellman group. If a DH group is specified, CHILD_SA/Quick Mode
-
rekeying and initial negotiation uses a separate Diffie-Hellman exchange
-
using the specified group (refer to esp_proposals for details).
-
In IKEv2, multiple algorithms of the same kind can be specified in a
-
single proposal, from which one gets selected. In IKEv1, only one
-
algorithm per kind is allowed per proposal, more algorithms get
-
implicitly stripped. Use multiple proposals to offer different algorithms
-
combinations in IKEv1.
-
Algorithm keywords get separated using dashes. Multiple proposals may be
-
specified in a list. The special value `default` forms
-
a default proposal of supported algorithms considered safe, and is
usually a good choice for interoperability. By default no AH proposals
are included, instead ESP is proposed.
'';
esp_proposals = mkCommaSepListParam [ "default" ] ''
-
ESP proposals to offer for the CHILD_SA. A proposal is a set of
-
algorithms. For ESP non-AEAD proposals, this includes an integrity
-
algorithm, an encryption algorithm, an optional Diffie-Hellman group and
-
an optional Extended Sequence Number Mode indicator. For AEAD proposals,
-
a combined mode algorithm is used instead of the separate
-
encryption/integrity algorithms.
-
If a DH group is specified, CHILD_SA/Quick Mode rekeying and initial
-
negotiation use a separate Diffie-Hellman exchange using the specified
-
group. However, for IKEv2, the keys of the CHILD_SA created implicitly
-
with the IKE_SA will always be derived from the IKE_SA's key material. So
-
any DH group specified here will only apply when the CHILD_SA is later
-
rekeyed or is created with a separate CREATE_CHILD_SA exchange. A
-
proposal mismatch might, therefore, not immediately be noticed when the
-
SA is established, but may later cause rekeying to fail.
-
Extended Sequence Number support may be indicated with the
-
`esn` and `noesn` values, both may be
-
included to indicate support for both modes. If omitted,
-
`noesn` is assumed.
-
In IKEv2, multiple algorithms of the same kind can be specified in a
-
single proposal, from which one gets selected. In IKEv1, only one
-
algorithm per kind is allowed per proposal, more algorithms get
-
implicitly stripped. Use multiple proposals to offer different algorithms
-
combinations in IKEv1.
-
Algorithm keywords get separated using dashes. Multiple proposals may be
-
specified as a list. The special value `default` forms
-
a default proposal of supported algorithms considered safe, and is
-
usually a good choice for interoperability. If no algorithms are
-
specified for AH nor ESP, the default set of algorithms for ESP is
-
included.
'';
sha256_96 = mkYesNoParam no ''
···
'';
local_ts = mkCommaSepListParam [ "dynamic" ] ''
-
List of local traffic selectors to include in CHILD_SA. Each selector is
-
a CIDR subnet definition, followed by an optional proto/port
-
selector. The special value `dynamic` may be used
-
instead of a subnet definition, which gets replaced by the tunnel outer
-
address or the virtual IP, if negotiated. This is the default.
A protocol/port selector is surrounded by opening and closing square
-
brackets. Between these brackets, a numeric or getservent(3) protocol
-
name may be specified. After the optional protocol restriction, an
-
optional port restriction may be specified, separated by a slash. The
-
port restriction may be numeric, a getservent(3) service name, or the
-
special value `opaque` for RFC 4301 OPAQUE
-
selectors. Port ranges may be specified as well, none of the kernel
-
backends currently support port ranges, though.
-
When IKEv1 is used only the first selector is interpreted, except if the
-
Cisco Unity extension plugin is used. This is due to a limitation of the
-
IKEv1 protocol, which only allows a single pair of selectors per
-
CHILD_SA. So to tunnel traffic matched by several pairs of selectors when
-
using IKEv1 several children (CHILD_SAs) have to be defined that cover
-
the selectors. The IKE daemon uses traffic selector narrowing for IKEv1,
-
the same way it is standardized and implemented for IKEv2. However, this
-
may lead to problems with other implementations. To avoid that, configure
-
identical selectors in such scenarios.
'';
remote_ts = mkCommaSepListParam [ "dynamic" ] ''
···
{option}`local_ts` for a description of the selector syntax.
'';
-
rekey_time = mkDurationParam "1h" ''
Time to schedule CHILD_SA rekeying. CHILD_SA rekeying refreshes key
material, optionally using a Diffie-Hellman exchange if a group is
-
specified in the proposal. To avoid rekey collisions initiated by both
-
ends simultaneously, a value in the range of {option}`rand_time`
-
gets subtracted to form the effective soft lifetime.
-
By default CHILD_SA rekeying is scheduled every hour, minus
{option}`rand_time`.
'';
···
{option}`life_time` and {option}`rekey_time`.
'';
-
rekey_bytes = mkIntParam 0 ''
Number of bytes processed before initiating CHILD_SA rekeying. CHILD_SA
-
rekeying refreshes key material, optionally using a Diffie-Hellman
-
exchange if a group is specified in the proposal.
To avoid rekey collisions initiated by both ends simultaneously, a value
-
in the range of {option}`rand_bytes` gets subtracted to form the
-
effective soft volume limit.
-
Volume based CHILD_SA rekeying is disabled by default.
'';
life_bytes = mkOptionalIntParam ''
···
{option}`life_bytes` and {option}`rekey_bytes`.
'';
-
rekey_packets = mkIntParam 0 ''
Number of packets processed before initiating CHILD_SA rekeying. CHILD_SA
-
rekeying refreshes key material, optionally using a Diffie-Hellman
-
exchange if a group is specified in the proposal.
To avoid rekey collisions initiated by both ends simultaneously, a value
-
in the range of {option}`rand_packets` gets subtracted to form
-
the effective soft packet count limit.
-
Packet count based CHILD_SA rekeying is disabled by default.
'';
life_packets = mkOptionalIntParam ''
···
the default of `32` are supported using the Netlink
backend only, a value of `0` disables IPsec replay
protection.
'';
hw_offload = mkEnumParam [ "yes" "no" "auto" "crypto" "packet" ] "no" ''
···
mkAttrsOfParams
{
addrs = mkOptionalStrParam ''
-
Subnet or range defining addresses allocated in pool. Accepts a single
-
CIDR subnet defining the pool to allocate addresses from or an address
-
range (\<from\>-\<to\>). Pools must be unique and non-overlapping.
'';
dns = mkCommaSepListParam [ ] "Address or CIDR subnets";
···
'';
proposals = mkCommaSepListParam [ "default" ] ''
+
A proposal is a set of algorithms. For non-AEAD IKE proposals, this includes
+
an encryption algorithm, an integrity algorithm, a pseudo-random function
+
and a key exchange method. For AEAD proposals, instead of encryption and
+
integrity algorithms, a combined mode algorithm is used.
+
With peers that support multiple IKEv2 key exchanges (RFC 9370), up to seven
+
additional key exchanges may be negotiated. They can be configured by
+
prefixing the algorithm keyword with **keX_** (where X is a number between
+
1 and 7).
+
For IKEv2, multiple algorithms of the same kind can be specified in a single
+
proposal, from which one gets selected. For IKEv1, only one algorithm per
+
kind is allowed per proposal, more algorithms get implicitly stripped. Use
+
multiple proposals to offer different algorithm combinations with IKEv1.
+
+
Algorithm keywords get separated using dashes. The special value _default_
+
forms a default proposal of supported algorithms considered safe, and is
+
usually a good choice for interoperability.
'';
vips = mkCommaSepListParam [ ] ''
···
Use childless IKE_SA initiation (RFC 6023) for IKEv2, with the first
CHILD_SA created with a separate CREATE_CHILD_SA exchange (e.g. to use an
+
independent key exchange for all CHILD_SAs). Acceptable values are _allow_
+
(the default), _prefer_, _force_ and _never_. If set to _allow_, responders
will accept childless IKE_SAs (as indicated via notify in the IKE_SA_INIT
response) while initiators continue to create regular IKE_SAs with the first
CHILD_SA created during IKE_AUTH, unless the IKE_SA is initiated explicitly
without any children (which will fail if the responder does not support or
+
has disabled this extension). The effect of _prefer_ is the same as _allow_
on responders, but as initiator a childless IKE_SA is initiated if the
+
responder supports it. If set to _force_, only childless initiation is
+
accepted in either role. Finally, setting the option to _never_ disables
support for childless IKE_SAs as responder.
'';
···
reauthentication lifetime negotiation can instruct the client to perform
reauthentication.
+
Reauthentication is disabled by default. Enabling it can usually result in
+
short connection interruptions, even when using make-before-break
+
reauthentication, which is now the default. However, they are significantly
+
shorter than when using the legacy break-before-make approach.
'';
rekey_time = mkDurationParam "4h" ''
···
mkAttrsOfParams
{
ah_proposals = mkCommaSepListParam [ ] ''
+
AH proposals to offer for the CHILD_SA. A proposal is a set of algorithms.
+
For AH, this includes an integrity algorithm and an optional key exchange
+
method. If a KE method is specified, CHILD_SA/Quick Mode rekeying and
+
initial negotiation uses a separate key exchange using the negotiated method
+
(refer to _esp_proposals_ for details).
+
With peers that support multiple IKEv2 key exchanges (RFC 9370), up to seven
+
additional key exchanges may be negotiated. They can be configured by
+
prefixing the algorithm keyword with **keX_** (where X is a number between
+
1 and 7).
+
+
For IKEv2, multiple algorithms of the same kind can be specified in a single
+
proposal, from which one gets selected. For IKEv1, only one algorithm per
+
kind is allowed per proposal, more algorithms get implicitly stripped. Use
+
multiple proposals to offer different algorithm combinations with IKEv1.
+
Algorithm keywords get separated using dashes. The special value _default_
+
forms a default proposal of supported algorithms considered safe, and is
usually a good choice for interoperability. By default no AH proposals
are included, instead ESP is proposed.
'';
esp_proposals = mkCommaSepListParam [ "default" ] ''
+
ESP proposals to offer for the CHILD_SA. A proposal is a set of algorithms.
+
For non-AEAD ESP proposals, this includes an integrity algorithm, an
+
encryption algorithm, an optional key exchange method and an optional
+
Extended Sequence Number Mode indicator. For AEAD proposals, a combined
+
mode algorithm is used instead of the separate encryption/integrity
+
algorithms.
+
If a key exchange method is specified, CHILD_SA/Quick Mode rekeying and
+
initial negotiation use a separate key exchange using the specified method.
+
However, for IKEv2, the keys of the CHILD_SA created implicitly with the
+
IKE_SA will always be derived from the IKE_SA's key material. So any key
+
exchange method specified here will only apply when the CHILD_SA is later
+
rekeyed or is created with a separate CREATE_CHILD_SA exchange. A proposal
+
mismatch might, therefore, not immediately be noticed when the SA is
+
established, but may later cause rekeying to fail.
+
With peers that support multiple IKEv2 key exchanges (RFC 9370), up to seven
+
additional key exchanges may be negotiated. They can be configured by
+
prefixing the algorithm keyword with **keX_** (where X is a number between
+
1 and 7).
+
Extended Sequence Number support may be indicated with the _esn_ and _noesn_
+
values, both may be included to indicate support for both modes. If omitted,
+
_noesn_ is assumed.
+
For IKEv2, multiple algorithms of the same kind can be specified in a single
+
proposal, from which one gets selected. For IKEv1, only one algorithm per
+
kind is allowed per proposal, more algorithms get implicitly stripped. Use
+
multiple proposals to offer different algorithm combinations with IKEv1.
+
+
Algorithm keywords get separated using dashes. The special value _default_
+
forms a default proposal of supported algorithms considered safe, and is
+
usually a good choice for interoperability. If no algorithms are specified
+
for AH nor ESP, the _default_ set of algorithms for ESP is included.
'';
sha256_96 = mkYesNoParam no ''
···
'';
local_ts = mkCommaSepListParam [ "dynamic" ] ''
+
List of local traffic selectors to include in CHILD_SA.
+
Each selector is a CIDR subnet definition, followed by an optional
+
proto/port selector. The special value _dynamic_ may be used instead of a
+
subnet definition, which gets replaced by the tunnel outer address or the
+
virtual IP, if negotiated. This is the default.
A protocol/port selector is surrounded by opening and closing square
+
brackets. Between these brackets, a numeric or **getservent**(3) protocol
+
name may be specified. After the optional protocol restriction, an optional
+
port restriction may be specified, separated by a slash. The port
+
restriction may be numeric, a **getservent**(3) service name, or the special
+
value _opaque_ for RFC 4301 OPAQUE selectors. Port ranges may be specified
+
as well, none of the kernel backends currently support port ranges, though.
+
If the protocol is _icmp_ or _ipv6-icmp_, the port is interpreted as ICMP
+
message type if it is less than 256 or as type and code if it is greater or
+
equal to 256, with the type in the most significant 8 bits and the code in
+
the least significant 8 bits.
+
When IKEv1 is used only the first selector is interpreted, except if
+
the Cisco Unity extension plugin is used. This is due to a limitation of the
+
IKEv1 protocol, which only allows a single pair of selectors per CHILD_SA.
+
So to tunnel traffic matched by several pairs of selectors when using IKEv1
+
several children (CHILD_SAs) have to be defined that cover the selectors.
+
+
The IKE daemon uses traffic selector narrowing for IKEv1, the same way it is
+
standardized and implemented for IKEv2. However, this may lead to problems
+
with other implementations. To avoid that, configure identical selectors in
+
such scenarios.
'';
remote_ts = mkCommaSepListParam [ "dynamic" ] ''
···
{option}`local_ts` for a description of the selector syntax.
'';
+
rekey_time = mkOptionalDurationParam ''
Time to schedule CHILD_SA rekeying. CHILD_SA rekeying refreshes key
material, optionally using a Diffie-Hellman exchange if a group is
+
specified in the proposal.
+
To avoid rekey collisions initiated by both ends simultaneously, a value
+
in the range of {option}`rand_time` gets subtracted to form the effective soft
+
lifetime.
+
+
If {option}`life_time` is explicitly configured, {option}`rekey_time` defaults to 10%
+
less than that, otherwise, CHILD_SA rekeying is scheduled every hour, minus
{option}`rand_time`.
'';
···
{option}`life_time` and {option}`rekey_time`.
'';
+
rekey_bytes = mkOptionalIntParam ''
+
Number of bytes processed before initiating CHILD_SA rekeying.
+
Number of bytes processed before initiating CHILD_SA rekeying. CHILD_SA
+
rekeying refreshes key material, optionally using a Diffie-Hellman exchange
+
if a group is specified in the proposal.
To avoid rekey collisions initiated by both ends simultaneously, a value
+
in the range of {option}`rand_bytes` gets subtracted to form the effective soft
+
volume limit.
+
Volume based CHILD_SA rekeying is disabled by default. If {option}`life_bytes`
+
is explicitly configured, {option}`rekey_bytes` defaults to 10% less than that.
'';
life_bytes = mkOptionalIntParam ''
···
{option}`life_bytes` and {option}`rekey_bytes`.
'';
+
rekey_packets = mkOptionalIntParam ''
+
Number of packets processed before initiating CHILD_SA rekeying.
+
Number of packets processed before initiating CHILD_SA rekeying. CHILD_SA
+
rekeying refreshes key material, optionally using a Diffie-Hellman exchange
+
if a group is specified in the proposal.
To avoid rekey collisions initiated by both ends simultaneously, a value
+
in the range of {option}`rand_packets` gets subtracted to form the effective soft
+
packet count limit.
+
Packet count based CHILD_SA rekeying is disabled by default. If
+
{option}`life_packets` is explicitly configured, {option}`rekey_packets` defaults to
+
10% less than that.
'';
life_packets = mkOptionalIntParam ''
···
the default of `32` are supported using the Netlink
backend only, a value of `0` disables IPsec replay
protection.
+
'';
+
+
per_cpu_sas = mkEnumParam [ "yes" "no" "encap" ] "no" ''
+
Enable per-CPU CHILD_SAs. Requires `trap` in `start_action`.
+
The value `encap` enables a special type of UDP encapsulation
+
(requires enabling `encap` for the connection if there is no NAT),
+
where a random source port is used for each outbound per-CPU SA
+
(the destination port for all of them remains 4500). This allows
+
using the port for RSS if the SPI can’t be used. Note that this type
+
of behavior is not standardized and not negotiated. So regardless
+
of whether the option is enabled, inbound per-CPU SAs
+
with UDP-encapsulation always have the source port set to 0
+
as the peer’s random port is unknown if it has this option enabled.
'';
hw_offload = mkEnumParam [ "yes" "no" "auto" "crypto" "packet" ] "no" ''
···
mkAttrsOfParams
{
addrs = mkOptionalStrParam ''
+
Addresses allocated in pool.
+
+
Subnet or range defining addresses allocated in pool. Accepts a single CIDR
+
subnet defining the pool to allocate addresses from or an address range
+
(<from>-<to>). If the address in CIDR notation is not the network ID of the
+
subnet (e.g. 10.1.0.5/24 instead of 10.1.0.0/24), addresses below it won't
+
be allocated to clients (they could e.g. be assigned manually to internal
+
hosts like the VPN server itself). Pools must be unique and non-overlapping
'';
dns = mkCommaSepListParam [ ] "Address or CIDR subnets";
+155 -164
pkgs/by-name/st/strongswan/package.nix
···
lib,
stdenv,
fetchFromGitHub,
-
fetchpatch2,
pkg-config,
-
autoreconfHook,
-
perl,
-
gperf,
bison,
flex,
-
gmp,
-
python3,
-
iptables,
-
ldns,
-
unbound,
openssl,
pcsclite,
-
glib,
openresolv,
systemd,
pam,
-
curl,
-
enableTNC ? false,
trousers,
sqlite,
-
libxml2,
-
enableTPM2 ? false,
-
tpm2-tss,
-
enableNetworkManager ? false,
-
networkmanager,
nixosTests,
}:
-
# Note on curl support: If curl is built with gnutls as its backend, the
-
# strongswan curl plugin may break.
-
# See https://wiki.strongswan.org/projects/strongswan/wiki/Curl for more info.
stdenv.mkDerivation rec {
pname = "strongswan";
-
version = "5.9.14"; # Make sure to also update <nixpkgs/nixos/modules/services/networking/strongswan-swanctl/swanctl-params.nix> when upgrading!
src = fetchFromGitHub {
owner = "strongswan";
repo = "strongswan";
-
rev = version;
-
hash = "sha256-qFM7ErfqiDlUsZdGXJQVW3nJoh+I6tEdKRwzrKteRVY=";
};
-
dontPatchELF = true;
nativeBuildInputs = [
pkg-config
-
autoreconfHook
-
perl
-
gperf
bison
flex
-
];
-
buildInputs = [
-
curl
-
gmp
-
python3
-
ldns
-
unbound
-
openssl
-
pcsclite
-
]
-
++ lib.optionals enableTNC [
-
trousers
-
sqlite
-
libxml2
-
]
-
++ lib.optional enableTPM2 tpm2-tss
-
++ lib.optionals stdenv.hostPlatform.isLinux [
-
systemd.dev
-
pam
-
iptables
-
]
-
++ lib.optionals enableNetworkManager [
-
networkmanager
-
glib
];
-
patches = [
-
./ext_auth-path.patch
-
./firewall_defaults.patch
-
./updown-path.patch
-
# Fixes for gettext 0.25
-
(fetchpatch2 {
-
url = "https://github.com/strongswan/strongswan/commit/7ec0101250bf2ac3da7a576cbb4204fceb2ef10c.patch?full_index=1";
-
excludes = [ "scripts/test.sh" ];
-
hash = "sha256-ATd/oj6/1vrtZdwMs45rA2MGtH2viumyucVj0LZ8Nnc=";
-
})
-
(fetchpatch2 {
-
url = "https://github.com/strongswan/strongswan/commit/e8e5e2d4419a686c5a2c064648618ec281089b2e.patch?full_index=1";
-
hash = "sha256-p98LSX8jjsDK/GZTovj/salmQ8T+txEV3vKD+wTUvsM=";
-
})
-
(fetchpatch2 {
-
url = "https://github.com/strongswan/strongswan/commit/2b3a5172d89c513ed28d21bb406c1b4ef0ac787a.patch?full_index=1";
-
hash = "sha256-xqp2Lq4pp3Uu0nVC/fl4E5mpJqCNgyZXP2g/Y2wShhI=";
-
})
-
];
-
-
postPatch = lib.optionalString stdenv.hostPlatform.isLinux ''
-
# glibc-2.26 reorganized internal includes
-
sed '1i#include <stdint.h>' -i src/libstrongswan/utils/utils/memory.h
-
-
substituteInPlace src/libcharon/plugins/resolve/resolve_handler.c --replace "/sbin/resolvconf" "${openresolv}/sbin/resolvconf"
-
'';
-
configureFlags = [
"--sysconfdir=/etc"
-
"--enable-swanctl"
-
"--enable-cmd"
-
"--enable-openssl"
-
"--enable-eap-sim"
-
"--enable-eap-sim-file"
-
"--enable-eap-simaka-pseudonym"
-
"--enable-eap-simaka-reauth"
-
"--enable-eap-identity"
-
"--enable-eap-md5"
-
"--enable-eap-gtc"
-
"--enable-eap-aka"
-
"--enable-eap-aka-3gpp2"
-
"--enable-eap-mschapv2"
-
"--enable-eap-radius"
-
"--enable-xauth-eap"
-
"--enable-ext-auth"
-
"--enable-acert"
-
"--enable-pkcs11"
-
"--enable-eap-sim-pcsc"
-
"--enable-dnscert"
-
"--enable-unbound"
-
"--enable-chapoly"
-
"--enable-curl"
-
]
-
++ lib.optionals stdenv.hostPlatform.isLinux [
-
"--enable-farp"
-
"--enable-dhcp"
-
"--enable-systemd"
-
"--with-systemdsystemunitdir=${placeholder "out"}/etc/systemd/system"
-
"--enable-xauth-pam"
-
"--enable-forecast"
-
"--enable-connmark"
-
"--enable-af-alg"
-
]
-
++ lib.optionals stdenv.hostPlatform.isx86_64 [
-
"--enable-aesni"
-
"--enable-rdrand"
-
]
-
++ lib.optional (stdenv.hostPlatform.system == "i686-linux") "--enable-padlock"
-
++ lib.optionals enableTNC [
-
"--disable-gmp"
-
"--disable-aes"
-
"--disable-md5"
-
"--disable-sha1"
-
"--disable-sha2"
-
"--disable-fips-prf"
-
"--enable-eap-tnc"
-
"--enable-eap-ttls"
-
"--enable-eap-dynamic"
-
"--enable-tnccs-20"
-
"--enable-tnc-imc"
-
"--enable-imc-os"
-
"--enable-imc-attestation"
-
"--enable-tnc-imv"
-
"--enable-imv-attestation"
-
"--enable-tnc-ifmap"
-
"--enable-tnc-imc"
-
"--enable-tnc-imv"
-
"--with-tss=trousers"
-
"--enable-aikgen"
-
"--enable-sqlite"
-
]
-
++ lib.optionals enableTPM2 [
-
"--enable-tpm"
-
"--enable-tss-tss2"
-
]
-
++ lib.optionals enableNetworkManager [
-
"--enable-nm"
-
"--with-nm-ca-dir=/etc/ssl/certs"
-
]
-
# Taken from: https://wiki.strongswan.org/projects/strongswan/wiki/MacOSX
-
++ lib.optionals stdenv.hostPlatform.isDarwin [
-
"--disable-systemd"
-
"--disable-xauth-pam"
-
"--disable-kernel-netlink"
-
"--enable-kernel-pfkey"
-
"--enable-kernel-pfroute"
-
"--enable-kernel-libipsec"
-
"--enable-osx-attr"
-
"--disable-scripts"
];
installFlags = [
"sysconfdir=${placeholder "out"}/etc"
];
-
NIX_LDFLAGS = lib.optionalString stdenv.cc.isGNU "-lgcc_s";
passthru.tests = { inherit (nixosTests) strongswan-swanctl; };
-
meta = with lib; {
-
description = "OpenSource IPsec-based VPN Solution";
-
homepage = "https://www.strongswan.org";
-
license = licenses.gpl2Plus;
-
platforms = platforms.all;
};
}
···
lib,
stdenv,
fetchFromGitHub,
+
autoreconfHook,
pkg-config,
bison,
flex,
+
curl,
+
perl,
+
gperf,
openssl,
pcsclite,
+
networkmanager,
openresolv,
+
glib,
systemd,
+
tpm2-tss,
+
libxml2,
pam,
+
iptables,
trousers,
sqlite,
+
unbound,
+
ldns,
+
gmp,
nixosTests,
+
enableNetworkManager ? false,
+
enableTNC ? false,
+
enableTPM2 ? false,
}:
+
let
+
features = rec {
+
nm = enableNetworkManager;
+
cmd = true;
+
stroke = true;
+
swanctl = true;
+
systemd = stdenv.hostPlatform.isLinux;
+
openssl = true;
+
+
farp = stdenv.hostPlatform.isLinux;
+
dhcp = stdenv.hostPlatform.isLinux;
+
af-alg = stdenv.hostPlatform.isLinux;
+
resolve = stdenv.hostPlatform.isLinux;
+
scripts = stdenv.hostPlatform.isLinux;
+
connmark = stdenv.hostPlatform.isLinux;
+
forecast = stdenv.hostPlatform.isLinux;
+
kernel-netlink = stdenv.hostPlatform.isLinux;
+
+
aesni = stdenv.hostPlatform.isx86_64;
+
rdrand = stdenv.hostPlatform.isx86_64;
+
padlock = stdenv.hostPlatform.system == "i686-linux";
+
+
kernel-pfkey = stdenv.hostPlatform.isDarwin || stdenv.hostPlatform.isFreeBSD;
+
kernel-pfroute = stdenv.hostPlatform.isDarwin || stdenv.hostPlatform.isFreeBSD;
+
kernel-libipsec = stdenv.hostPlatform.isDarwin || stdenv.hostPlatform.isFreeBSD;
+
keychain = false; # breaks build
+
osx-attr = stdenv.hostPlatform.isDarwin;
+
+
ml = true;
+
# Note on curl support: If curl is built with gnutls as its backend, the
+
# strongswan curl plugin may break.
+
# See https://wiki.strongswan.org/projects/strongswan/wiki/Curl for more info.
+
curl = true;
+
acert = true;
+
pkcs11 = true;
+
dnscert = true;
+
unbound = true;
+
chapoly = true;
+
ext-auth = true;
+
socket-dynamic = stdenv.hostPlatform.isLinux;
+
+
eap-sim = true;
+
eap-sim-file = true;
+
eap-sim-pcsc = true;
+
eap-simaka-pseudonym = true;
+
eap-simaka-reauth = true;
+
eap-identity = true;
+
eap-md5 = true;
+
eap-gtc = true;
+
eap-aka = true;
+
eap-aka-3gpp = true;
+
eap-aka-3gpp2 = true;
+
eap-mschapv2 = true;
+
eap-tls = true;
+
eap-peap = true;
+
eap-radius = true;
+
+
xauth-eap = true;
+
xauth-pam = stdenv.hostPlatform.isLinux;
+
xauth-noauth = true;
+
+
gmp = eap-aka-3gpp2;
+
}
+
// lib.optionalAttrs enableTNC {
+
eap-tnc = true;
+
eap-ttls = true;
+
eap-dynamic = true;
+
+
tnccs-20 = true;
+
+
tnc-imc = true;
+
tnc-imv = true;
+
tnc-ifmap = true;
+
+
imc-os = true;
+
imv-os = true;
+
imc-attestation = true;
+
imv-attestation = true;
+
+
aikgen = true;
+
tss-trousers = true;
+
+
sqlite = true;
+
}
+
// lib.optionalAttrs enableTPM2 {
+
tpm = true;
+
tss-tss2 = true;
+
};
+
in
stdenv.mkDerivation rec {
pname = "strongswan";
+
version = "6.0.2"; # Make sure to also update <nixpkgs/nixos/modules/services/networking/strongswan-swanctl/swanctl-params.nix> when upgrading!
src = fetchFromGitHub {
owner = "strongswan";
repo = "strongswan";
+
tag = version;
+
hash = "sha256-wjz41gt+Xu4XJkEXRRVl3b3ryEoEtijeqmfVFoRjnA4=";
};
+
patches = [
+
./ext_auth-path.patch
+
./firewall_defaults.patch
+
./updown-path.patch
+
];
nativeBuildInputs = [
+
autoreconfHook
pkg-config
bison
flex
+
perl
+
gperf
];
+
buildInputs =
+
lib.optional (features.gmp or false) gmp
+
++ lib.optional (features.eap-sim-pcsc or false) pcsclite
+
++ lib.optional (features.openssl or false) openssl
+
++ lib.optional (features.curl or false) curl
+
++ lib.optional (features.systemd or false) systemd
+
++ lib.optional (features.tnc-ifmap or false) libxml2
+
++ lib.optional (features.xauth-pam or false) pam
+
++ lib.optional (features.forecast or false || features.connmark or false) iptables
+
++ lib.optional (features.tss-trousers or false) trousers
+
++ lib.optional (features.tss-tss2 or false) tpm2-tss
+
++ lib.optional (features.sqlite or false) sqlite
+
++ lib.optionals (features.unbound or false) [
+
unbound
+
ldns
+
]
+
++ lib.optionals (features.nm or false) [
+
networkmanager
+
glib
+
];
+
configureFlags = (lib.mapAttrsToList (lib.flip lib.enableFeature)) features ++ [
"--sysconfdir=/etc"
+
(lib.withFeatureAs (features.nm or false) "nm-ca-dir" "/etc/ssl/certs")
+
(lib.withFeatureAs (features.systemd or false
+
) "systemdsystemunitdir" "${placeholder "out"}/etc/systemd/system")
];
installFlags = [
"sysconfdir=${placeholder "out"}/etc"
];
+
enableParallelBuilding = true;
+
+
dontPatchELF = true;
passthru.tests = { inherit (nixosTests) strongswan-swanctl; };
+
postPatch = lib.optionalString features.resolve ''
+
substituteInPlace src/libcharon/plugins/resolve/resolve_handler.c \
+
--replace-fail "/sbin/resolvconf" "${openresolv}/sbin/resolvconf"
+
'';
+
+
meta = {
+
description = "OpenSource IPsec-based VPN solution";
+
homepage = "https://www.strongswan.org/";
+
changelog = "https://github.com/strongswan/strongswan/blob/${src.rev}/ChangeLog";
+
license = lib.licenses.gpl2Plus;
+
maintainers = with lib.maintainers; [ nickcao ];
+
mainProgram = "swanctl";
+
platforms = lib.platforms.unix;
};
}