Updated openswan packages that fix two bugs are now available for Red HatEnterprise Linux 6 Extended Update Support.

Openswan is a free implementation of Internet Protocol Security (IPsec) andInternet Key Exchange (IKE). IPsec uses strong cryptography to provide bothauthentication and encryption services. These services allow you to build securetunnels through untrusted networks. This update fixes the following bug:* Previously, when Openswan was stopped or restarted, the openswan scripts(called by the ipsec initscript) logged a harmless error message which had noimpact on functionality. The message read that Openswan is not being able tounload the IPsec kernel modules. With this update, initscripts no longer attemptto unload the IPsec kernel modules once loaded, and error messages are no longerreturned. (BZ#1096635)* Prior to this update, the openswan IKE (Internet Key Exchange) daemon did notreconnect the specified source IP route when the remote IPsec peer wasrestarted. As a consequence, IPsec traffic between the gateway running the IKEdaemon itself and the remote secured network terminated unexpectedly. This bughas been fixed, and IPsec traffic no longer fails. (BZ#1089394)Users of openswan are advised to upgrade to these updated packages, which fixthese bugs.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
openswan-2.6.32-21.4.el6_4.src.rpm
    MD5: d58468c7f85efbff983e9f01931b05dbSHA-256: 5fcbe744366a652b47d60442d9f993e3d8f6d2a33923ee4e46816d0bf733f178
 
x86_64:
openswan-2.6.32-21.4.el6_4.x86_64.rpm
    MD5: 13830523f2d4d7e62e52f6ced2dbb3b1SHA-256: 076a46c679d087ea68cec04bcc2c9ae0e508a9d26a8eb5765d0270d2be55bbad
openswan-debuginfo-2.6.32-21.4.el6_4.x86_64.rpm
    MD5: c35ea65298518ae7a039ac43ec5d8533SHA-256: ab31e5ecbe3b4801cab8281699388b692680346611a4bdd07d71257139226111
openswan-doc-2.6.32-21.4.el6_4.x86_64.rpm
    MD5: 5e204b2f243152c6f0eec428a952de41SHA-256: 8c9ee084a8dfeb1b1629fdf3e70a5c8c1113a9844c5982dd24327d23e9cdafde
 
Red Hat Enterprise Linux Server EUS (v. 6.4.z)

SRPMS:
openswan-2.6.32-21.4.el6_4.src.rpm
    MD5: d58468c7f85efbff983e9f01931b05dbSHA-256: 5fcbe744366a652b47d60442d9f993e3d8f6d2a33923ee4e46816d0bf733f178
 
IA-32:
openswan-2.6.32-21.4.el6_4.i686.rpm
    MD5: 3d4ba7be2bcae8a99dd2d06ae7659815SHA-256: c7c5568372c71bbb10b0947834c389ac6c9c881a49e74bcc6c81d8130b538d34
openswan-debuginfo-2.6.32-21.4.el6_4.i686.rpm
    MD5: e13c3d7251951e6a83423b9484151199SHA-256: 37b0ac1da403584dfc38fcf43cb157a2f213f23af461a61553fa19549e0d7014
openswan-doc-2.6.32-21.4.el6_4.i686.rpm
    MD5: 7f995a6e17688a85dad780b3f68a4c28SHA-256: f2cb08f1d8d728c61172a524d18d8e130a7a6f56bbfd4a70530939d0ce6ec15f
 
PPC:
openswan-2.6.32-21.4.el6_4.ppc64.rpm
    MD5: 37e91c9f7bb4bb0327636c1d1f1d957bSHA-256: c944eb3171c683307d99593e177039b27a247885b36737fa39bbe7defcc24f22
openswan-debuginfo-2.6.32-21.4.el6_4.ppc64.rpm
    MD5: 4289fc23f0f36174ced1e8fc925c670bSHA-256: 008deae704aec4d39a417f643e1e6ddaf3d47e5a7cd9efee3f70d45a289180a0
openswan-doc-2.6.32-21.4.el6_4.ppc64.rpm
    MD5: 8de65de909f1f17f760ceb0f0d71ecbeSHA-256: b40bffd3d3d98cfa04ce2ff0b0e3c5f236f09cd116a8911cf4a0647542639ee8
 
s390x:
openswan-2.6.32-21.4.el6_4.s390x.rpm
    MD5: 64295d37d0f45688a76a8f7c754a582cSHA-256: c3d76e2e3749e8c99bf0bcb4116389d803fa176a5b4911a6124d2295bac34ecd
openswan-debuginfo-2.6.32-21.4.el6_4.s390x.rpm
    MD5: 70a9ad2a413d6baa3f2c91bc4c756f07SHA-256: 7c53038409fbd5c2529b317801d451e7ebfcca2fea6e0f2d71bfea080ee4b0a4
openswan-doc-2.6.32-21.4.el6_4.s390x.rpm
    MD5: 1f1bee99f9bde35b770350d2fc489dd7SHA-256: b2c4a17147421e167279255d9bcf48af3f8accb2eb1a1568fb2062f9f9950b3b
 
x86_64:
openswan-2.6.32-21.4.el6_4.x86_64.rpm
    MD5: 13830523f2d4d7e62e52f6ced2dbb3b1SHA-256: 076a46c679d087ea68cec04bcc2c9ae0e508a9d26a8eb5765d0270d2be55bbad
openswan-debuginfo-2.6.32-21.4.el6_4.x86_64.rpm
    MD5: c35ea65298518ae7a039ac43ec5d8533SHA-256: ab31e5ecbe3b4801cab8281699388b692680346611a4bdd07d71257139226111
openswan-doc-2.6.32-21.4.el6_4.x86_64.rpm
    MD5: 5e204b2f243152c6f0eec428a952de41SHA-256: 8c9ee084a8dfeb1b1629fdf3e70a5c8c1113a9844c5982dd24327d23e9cdafde
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply