Import release 0.1.9
[secnet] / NEWS
CommitLineData
8dea8d37
SE
1* Planned for the future
2
3New configuration syntax for netlinks: basic 'netlink' closure yields
4a pure closure that can be applied in each site() to generate a
5netlink for that site (with routes, options, etc.). Works well for
6point-to-point: that netlink can be used directly by just one site.
7Much cleaner separation between site() and netlink code this way.
8
9(Backward compatibility will be kept for a while.)
10
11* New in version 0.1.9
12
13The netlink code may now generate ICMP responses to ICMP messages that
14are not errors, eg. ICMP echo-request. This makes Windows NT
15traceroute output look a little less strange.
16
17configure.in and config.h.bot now define uint32_t etc. even on systems
18without stdint.h and inttypes.h (needed for Solaris 2.5.1)
19
20GNU getopt is included for systems that lack it.
21
22We check for LOG_AUTHPRIV before trying to use it in log.c (Solaris
232.5.1 doesn't have it.)
24
25Portable snprintf.c from http://www.ijs.si/software/snprintf/ is
26included for systems that lack snprintf/vsnprintf.
27
28make-secnet-sites.py renamed to make-secnet-sites and now installed in
29$prefix/sbin/make-secnet-sites; ipaddr.py library installed in
30$prefix/share/secnet/ipaddr.py. make-secnet-sites searches
31/usr/local/share/secnet and /usr/share/secnet for ipaddr.py
32
c6f79b17
SE
33* New in version 0.1.8
34
35Netlink devices now support a 'point-to-point' mode. In this mode the
36netlink device does not require an IP address; instead, the IP address
37of the other end of the tunnel is specified using the 'ptp-address'
38option. Precisely one site must be configured to use the netlink
8dea8d37
SE
39device. (I haven't had a chance to test this because 0.1.8 turned into
40a 'quick' release to enable secnet to cope with the network problems
41affecting connections going via LINX on 2001-10-16.)
c6f79b17
SE
42
43The tunnel code in site.c now initiates a key setup if the
44reverse-transform function fails (wrong key, bad MAC, too much skew,
45etc.) - this should make secnet more reliable on dodgy links, which
46are much more common than links with active attackers... (an attacker
47can now force a new key setup by replaying an old packet, but apart
48from minor denial of service on slow links or machines this won't
8dea8d37 49achieve them much). This should eventually be made configurable.
c6f79b17
SE
50
51The sequence number skew detection code in transform.c now only
52complains about 'reverse skew' - replays of packets that are too
53old. 'Forward skew' (gaps in the sequence numbers of received packets)
54is now tolerated silently, to cope with large amounts of packet loss.