Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 837638 - net-vpn/openconnect-8.20 version bump
Summary: net-vpn/openconnect-8.20 version bump
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Mike Gilbert
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-04-10 11:56 UTC by Joakim Tjernlund
Modified: 2022-04-11 01:08 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Joakim Tjernlund 2022-04-10 11:56:55 UTC
http://www.infradead.org/openconnect/changelog.html :
OpenConnect v8.20 (PGP signature) — 2022-02-20

    When the queue length (-Q option) is 16 or more, try using vhost-net to accelerate tun device access.
    Use epoll() where available.
    Support non-AEAD ciphersuites in DTLSv1.2 with AnyConnect. (#249)
    Make tncc-emulate.py work with Python 3.7+. (#152, !120)
    Emulated a newer version of GlobalProtect official clients, 5.1.5-8; was 4.0.2-19 (!131)
    Support Juniper login forms containing both password and 2FA token (!121)
    Explicitly disable 3DES and RC4, unless enabled with --allow-insecure-crypto (!114)
    Add obsolete-server-crypto test (!114)
    Allow protocols to delay tunnel setup and shutdown (!117)
    Support for GlobalProtect IPv6 (!155 and !188; previous work in d6db0ec)
    SIGUSR1 causes OpenConnect to log detailed connection information and statistics (!154)
    Allow --servercert to be specified multiple times in order to accept server certificates matching more than one possible fingerprint (!162, #25)
    Add insecure debugging build mode for developers (!112)
    Demangle default routes sent as split routes by GlobalProtect (!118)
    Improve GlobalProtect login argument decoding (!143)
    Add detection of authentication expiration date, intended to allow front-ends to cache and reuse authentication cookies/sessions (!156)
    Small bug fixes and clarification of many logging messages.
    Support more Juniper login forms, including some SSO forms (!171)
    Automatically build Windows installers for OpenConnect command-line interface (!176)
    Restore compatibility with newer Cisco servers, by no longer sending them the X-AnyConnect-Platform header (#101, !175)
    Add support for PPP-based protocols, currently over TLS only (!165).
    Add support for two PPP-based protocols, F5 with --protocol=f5 and Fortinet with --protocol=fortinet (!169).
    Add experimental support for Wintun Layer 3 TUN driver under Windows (#231, !178).
    Clean up and improve Windows routing/DNS configuration script (vpnc-scripts!26, vpnc-scripts!41, vpnc-scripts!44).
    On Windows, reclaim needed IP addresses from down network interfaces so that configuration script can succeed (!178).
    Fix output redirection under Windows (#229)
    More gracefully handle idle timeouts and other fatal errors for Juniper and Pulse (!187)
    Ignore failures to fetch the Juniper/oNCP landing page if the authentication was successful (3e779436).
    Add support for Array Networks SSL VPN (#102)
    Support TLSv1.3 with TPMv2 EC and RSA keys, add test cases for swtpm and hardware TPM. (ed80bfac...ee1cd782)
    Add openconnect_get_connect_url() to simplify passing correct server information to the connecting openconnect process. (NetworkManager-openconnect #46, #53)
    Disable brittle "system policy" enforcement where it cannot be gracefully overridden at user request. (RH#1960763).
    Pass "portal cookie" fields from GlobalProtect portal to gateway to avoid repetition of password- or SAML-based login (!199)
    With --user, enter username supplied via command-line into all authentication forms, not just the first. (#267, !220).
    Fix a subtle bug which has prevented ESP rekey and ESP-to-TLS fallback from working reliably with the Juniper/oNCP protocol since v8.04. (#322, !293).
    Fix a bug in csd-wrapper.sh which has prevented it from correctly downloading compressed Trojan binaries since at least v8.00. (!305)
    Make Windows socketpair emulation more robust in the face of Windows's ability to break its localhost routes. (#228, #361, !320)
    Perform proper disconnect and routes cleanup on Windows when receiving Ctrl+C or Ctrl+Break. (#362, !323)
    Improve logging in routing/DNS configuration scripts. (!328, vpnc-scripts!45)
    Support modified configuration packet from Pulse 9.1R14 servers (#379, !331)
Comment 1 Joakim Tjernlund 2022-04-10 12:02:06 UTC
Possibly also include these from master:

    On Windows, fix crash on tunnel setup. (#370, 6a2ffbb)
    Bugfix RSA SecurID token decryption and PIN entry forms, broken in v8.20. (#388, !344)
Comment 2 Larry the Git Cow gentoo-dev 2022-04-11 01:08:16 UTC
The bug has been closed via the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=cb84d12940f854ce1704fa1afacc92422810b7b5

commit cb84d12940f854ce1704fa1afacc92422810b7b5
Author:     Mike Gilbert <floppym@gentoo.org>
AuthorDate: 2022-04-11 00:58:05 +0000
Commit:     Mike Gilbert <floppym@gentoo.org>
CommitDate: 2022-04-11 00:58:42 +0000

    net-vpn/openconnect: add 8.20
    
    Closes: https://bugs.gentoo.org/837638
    Signed-off-by: Mike Gilbert <floppym@gentoo.org>

 net-vpn/openconnect/Manifest                       |   1 +
 .../openconnect/files/8.20-insecure-crypto.patch   |  46 ++++++
 net-vpn/openconnect/files/8.20-rsa-securid.patch   |  51 +++++++
 net-vpn/openconnect/openconnect-8.20.ebuild        | 154 +++++++++++++++++++++
 4 files changed, 252 insertions(+)