[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

openswan 2.6.28+dfsg-4 unblock request



Dear release team,

please unblock the new 2.6.28+dfsg-4 openswan upload, it includes two fixes for
Windows/MacOS compatibility as well as patch which enhances the upgrade process
and makes the package more lintian clean. If there arise any problems please cc
me when mailing as I'm not subscribed to this list. Attached is a
> debdiff openswan_2.6.28+dfsg-3.dsc openswan_2.6.28+dfsg-4.dsc
which should point out all changes.

Thanks for your help
Harald Jenny
diff -Nru openswan-2.6.28+dfsg/debian/changelog openswan-2.6.28+dfsg/debian/changelog
--- openswan-2.6.28+dfsg/debian/changelog	2010-09-28 11:24:17.000000000 +0200
+++ openswan-2.6.28+dfsg/debian/changelog	2010-11-26 10:01:06.000000000 +0100
@@ -1,3 +1,20 @@
+openswan (1:2.6.28+dfsg-4) unstable; urgency=medium
+
+  [Harald Jenny]
+  * Picked up patch from 2.6.29 to fix issue with L2TP and transport mode
+    IPSec.
+  * Created patch to allow line break in manpage and removed corresponding
+    lintian override.
+  * Added ${misc:Depends} to doc package and removed override.
+  * Set urgency to medium due to backported NETKEY patch.
+  * Added two other CVE numbers to previous changelog entry.
+  * Picked up patch from 2.6.30 to fix issue with Windows XP L2TP connect.
+  * Added a patch to enhance the init script's error checking when doing
+    start/restart/reload (forwarded upstream for inclusion).
+  * Removed lintian override for debug package linking to openswan docs.
+
+ -- Harald Jenny <harald@a-little-linux-box.at>  Thu, 25 Nov 2010 18:27:08 +0100
+
 openswan (1:2.6.28+dfsg-3) unstable; urgency=HIGH
 
   [Harald Jenny]
@@ -13,7 +30,7 @@
   * Changed Vcs-Fields as Debian project switched from svn to git.
   * Bump Standards for binary module package to 3.9.1 (no changes needed).
   * Added upstream security patch fixing XAUTH Cisco handling code
-    (CVE-2010-3302, CVE-2010-3308).
+    (CVE-2010-3302, CVE-2010-3308, CVE-2010-3752, CVE-2010-3753).
   * Set urgency to HIGH due to included security fix.
   * Added lintian override for docs in debug package.
 
diff -Nru openswan-2.6.28+dfsg/debian/control openswan-2.6.28+dfsg/debian/control
--- openswan-2.6.28+dfsg/debian/control	2010-09-28 11:24:17.000000000 +0200
+++ openswan-2.6.28+dfsg/debian/control	2010-11-26 10:01:06.000000000 +0100
@@ -46,6 +46,7 @@
 Package: openswan-doc
 Architecture: all
 Section: doc
+Depends: ${misc:Depends}
 Description: Internet Key Exchange daemon - documentation
  Openswan is an IPsec based VPN solution for the Linux kernel. It can use the
  native IPsec stack as well as the KLIPS kernel module. Both IKEv1 and IKEv2
diff -Nru openswan-2.6.28+dfsg/debian/openswan-dbg.lintian-overrides openswan-2.6.28+dfsg/debian/openswan-dbg.lintian-overrides
--- openswan-2.6.28+dfsg/debian/openswan-dbg.lintian-overrides	2010-09-28 11:24:17.000000000 +0200
+++ openswan-2.6.28+dfsg/debian/openswan-dbg.lintian-overrides	1970-01-01 01:00:00.000000000 +0100
@@ -1,2 +0,0 @@
-# we take care of the correct link
-openswan-dbg: cannot-check-whether-usr-share-doc-symlink-points-to-foreign-package
diff -Nru openswan-2.6.28+dfsg/debian/openswan.lintian-overrides openswan-2.6.28+dfsg/debian/openswan.lintian-overrides
--- openswan-2.6.28+dfsg/debian/openswan.lintian-overrides	2010-09-28 11:24:17.000000000 +0200
+++ openswan-2.6.28+dfsg/debian/openswan.lintian-overrides	2010-11-26 10:01:06.000000000 +0100
@@ -4,5 +4,3 @@
 openswan: non-standard-dir-perm var/lib/openswan/ 0700 != 0755
 # we have a right link in it too
 openswan: copyright-refers-to-symlink-license usr/share/common-licenses/GPL
-# the config param in this line shouldn't be splitted
-openswan: manpage-has-errors-from-man usr/share/man/man5/ipsec.conf.5.gz 1018: warning [p 13, 0.7i]: can't break line
diff -Nru openswan-2.6.28+dfsg/debian/patches/00list openswan-2.6.28+dfsg/debian/patches/00list
--- openswan-2.6.28+dfsg/debian/patches/00list	2010-09-28 11:24:17.000000000 +0200
+++ openswan-2.6.28+dfsg/debian/patches/00list	2010-11-26 10:01:06.000000000 +0100
@@ -1,5 +1,9 @@
 01-2.6.26-2.6.28-CVE-2010-330x.dpatch
 02-CVE-2010-330x-patch-regression-fix.dpatch
+05-NETKEY-transport-mode+l2tp-fix.dpatch
+06-Windows_XP-NAT_OA-l2tp-fix.dpatch
+08-initd-configcheck.dpatch
 33-programs--pluto--makefile.options--libs.dpatch
 43-programs--pluto--ipsec.secrets.5-fixes.dpatch
+49-programs--_confread--ipsec.conf.5-linebreak.dpatch
 50-manpages-bad-whatis--multibyte-chars.dpatch
diff -Nru openswan-2.6.28+dfsg/debian/patches/05-NETKEY-transport-mode+l2tp-fix.dpatch openswan-2.6.28+dfsg/debian/patches/05-NETKEY-transport-mode+l2tp-fix.dpatch
--- openswan-2.6.28+dfsg/debian/patches/05-NETKEY-transport-mode+l2tp-fix.dpatch	1970-01-01 01:00:00.000000000 +0100
+++ openswan-2.6.28+dfsg/debian/patches/05-NETKEY-transport-mode+l2tp-fix.dpatch	2010-11-26 10:01:06.000000000 +0100
@@ -0,0 +1,150 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## /tmp/NETKEY-transport-mode+l2tp-fix.patch.dpatch by Paul Wouters <paul@xelerance.com>
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: fdebd
+## DP: Author: Paul Wouters <paul@xelerance.com>
+## DP:
+## DP:
+## DP:     Fixes issue where IPSec transport mode+L2TP wrongly
+## DP:     triggered opportunistic encryption code.
+
+@DPATCH@
+
+diff --git a/programs/pluto/initiate.c b/programs/pluto/initiate.c
+index f323576..5db0116 100644
+--- a/programs/pluto/initiate.c
++++ b/programs/pluto/initiate.c
+@@ -302,7 +302,7 @@ restart_connections_by_peer(struct connection *c)
+ }
+ 
+ /* (Possibly) Opportunistic Initiation:
+- * Knowing clients (single IP addresses), try to build an tunnel.
++ * Knowing clients (single IP addresses), try to build a tunnel.
+  * This may involve discovering a gateway and instantiating an
+  * Opportunistic connection.  Called when a packet is caught by
+  * a %trap, or when whack --oppohere --oppothere is used.
+@@ -401,10 +401,10 @@ cannot_oppo(struct connection *c
+ 	struct state *st;
+ 
+ 	passert(c->kind == CK_TEMPLATE);
+-	passert(c->policy_next->kind == CK_PERMANENT);
++	passert(nc->kind == CK_PERMANENT);
+ 
+ 	DBG(DBG_OPPO, DBG_log("OE failed for %s to %s, but %s overrides shunt"
+-			      , ocb, pcb, c->policy_next->name));
++			      , ocb, pcb, nc->name));
+ 
+ 	/*
+ 	 * okay, here we need add to the "next" policy, which is ought
+@@ -469,25 +469,23 @@ cannot_oppo(struct connection *c
+ 	return;
+     }
+ 
+-#ifdef KLIPS
++#ifdef KLIPS /* This should really be 'if opportunistic is supported' - netlink has acquires too */
+     if (b->held)
+     {
+ 	int failure_shunt = b->failure_shunt;
+ 
+ 	/* Replace HOLD with b->failure_shunt.
+-	 * If no b->failure_shunt specified, use SPI_PASS -- THIS MAY CHANGE.
++	 * If no failure_shunt specified, use SPI_PASS -- THIS MAY CHANGE.
+ 	 */
+-	if (b->failure_shunt == 0)
++	if (failure_shunt == 0)
+ 	{
+-	    DBG(DBG_OPPO, DBG_log("no explicit failure shunt for %s to %s; installing %%pass"
++	    DBG(DBG_OPPO, DBG_log("no explicit failure shunt for %s to %s; removing spurious hold shunt"
+ 				  , ocb, pcb));
+-	    failure_shunt = SPI_PASS;
+ 	}
+-
+ 	(void) replace_bare_shunt(&b->our_client, &b->peer_client
+ 	    , b->policy_prio
+ 	    , failure_shunt
+-	    , failure_shunt == SPI_PASS
++	    , failure_shunt != 0
+ 	    , b->transport_proto
+ 	    , ughmsg);
+     }
+@@ -753,10 +751,10 @@ initiate_ondemand_body(struct find_oppo_bundle *b
+ 	cannot_oppo(NULL, b, "impossible IP address");
+ 	work = 0;
+     }
+-    else if ((c = find_connection_for_clients(&sr
++    else if (!(c = find_connection_for_clients(&sr
+ 					      , &b->our_client
+ 					      , &b->peer_client
+-					      , b->transport_proto)) == NULL)
++					      , b->transport_proto)))
+     {
+ 	/* No connection explicitly handles the clients and there
+ 	 * are no Opportunistic connections -- whine and give up.
+diff --git a/programs/pluto/kernel.c b/programs/pluto/kernel.c
+index 8ee503c..d76adfe 100644
+--- a/programs/pluto/kernel.c
++++ b/programs/pluto/kernel.c
+@@ -118,7 +118,7 @@ DBG_bare_shunt_log(const char *op, const struct bare_shunt *bs)
+             subnettot(&(bs)->his, 0, hist, sizeof(hist));
+             satot(&(bs)->said, 0, sat, sizeof(sat));
+             fmt_policy_prio(bs->policy_prio, prio);
+-            DBG_log("%s bare shunt %p %s:%d -%d-> %s:%d => %s %s    %s"
++            DBG_log("%s bare shunt %p %s:%d --%d--> %s:%d => %s %s    %s"
+                 , op, (const void *)(bs), ourst, ourport, (bs)->transport_proto, hist, hisport
+                 , sat, prio, (bs)->why);
+         });
+@@ -133,7 +133,7 @@ record_and_initiate_opportunistic(const ip_subnet *ours
+ {
+     passert(samesubnettype(ours, his));
+ 
+-    /* Add to bare shunt list.
++    /* Add the kernel shunt to the pluto bare shunt list.
+      * We need to do this because the shunt was installed by KLIPS
+      * which can't do this itself.
+      */
+@@ -967,7 +967,7 @@ clear_narrow_holds(
+ 	    (void) replace_bare_shunt(&p->ours.addr, &p->his.addr
+ 		    , BOTTOM_PRIO
+ 		    , SPI_PASS	/* not used */
+-		    , FALSE, 0
++		    , FALSE, transport_proto
+ 		    , "removing clashing narrow holds");
+ 
+ 	    /* restart from beginning as we just removed and entry */
+@@ -1033,7 +1033,7 @@ replace_bare_shunt(const ip_address *src, const ip_address *dst
+                                 
+                                 bs->ours = this_broad_client;
+                                 bs->his =  that_broad_client;
+-                                bs->transport_proto = 0;
++                                bs->transport_proto = transport_proto;
+                                 bs->said.proto = SA_INT;
+                                 bs->why = clone_str(why, "bare shunt story");
+                                 bs->policy_prio = policy_prio;
+@@ -1083,9 +1083,12 @@ replace_bare_shunt(const ip_address *src, const ip_address *dst
+                 struct bare_shunt **bs_pp = bare_shunt_ptr(&this_client
+                                                            , &that_client, 0);
+                 
++		passert(bs_pp != NULL);
+                 if (repl)
+                     {
+-                        /* change over to new bare eroute */
++                        /* change over to new bare eroute
++			 * ours, his, transport_proto are the same.
++			 */
+                         struct bare_shunt *bs = *bs_pp;
+                         
+                         pfree(bs->why);
+diff --git a/programs/pluto/kernel_netlink.c b/programs/pluto/kernel_netlink.c
+index 4a4456d..b44d705 100644
+--- a/programs/pluto/kernel_netlink.c
++++ b/programs/pluto/kernel_netlink.c
+@@ -457,7 +457,7 @@ netlink_raw_eroute(const ip_address *this_host
+ 		   , const ip_subnet *that_client
+ 		   , ipsec_spi_t spi
+ 		   , unsigned int proto
+-		   , unsigned int transport_proto UNUSED
++		   , unsigned int transport_proto
+ 		   , enum eroute_type esatype
+ 		   , const struct pfkey_proto_info *proto_info
+ 		   , time_t use_lifetime UNUSED
diff -Nru openswan-2.6.28+dfsg/debian/patches/06-Windows_XP-NAT_OA-l2tp-fix.dpatch openswan-2.6.28+dfsg/debian/patches/06-Windows_XP-NAT_OA-l2tp-fix.dpatch
--- openswan-2.6.28+dfsg/debian/patches/06-Windows_XP-NAT_OA-l2tp-fix.dpatch	1970-01-01 01:00:00.000000000 +0100
+++ openswan-2.6.28+dfsg/debian/patches/06-Windows_XP-NAT_OA-l2tp-fix.dpatch	2010-11-26 10:01:06.000000000 +0100
@@ -0,0 +1,35 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## /tmp/Windows_XP-NAT_OA-l2tp-fix.patch.dpatch by Wolfgang Nothdurft <wolfgang@linogate.de>
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: cebnd
+## DP: Author: Wolfgang Nothdurft <wolfgang@linogate.de>
+## DP:
+## DP:
+## DP:     Fixes an issue where, when both Windows 7 and XP are used,
+## DP:     XP can't establish the L2TP over IPSec connection.
+
+@DPATCH@
+
+diff --git a/programs/pluto/ikev1_quick.c b/programs/pluto/ikev1_quick.c
+index 86bcb3f..d3c26de 100644
+--- a/programs/pluto/ikev1_quick.c
++++ b/programs/pluto/ikev1_quick.c
+@@ -1224,11 +1224,12 @@ quick_inI1_outR1(struct msg_digest *md)
+ 	    hv = p1st->hidden_variables; 
+ 	    nat_traversal_natoa_lookup(md, &hv); 
+ 	    
+-	    addrtosubnet(&hv.st_nat_oa,&b.his.net);
+-	    subnettot(&b.his.net, 0, subnet_buf, sizeof(subnet_buf));
+-
+-	    loglog(RC_LOG_SERIOUS, "IDci was FQDN: %s, using NAT_OA=%s as IDci"
+-		   , idfqdn, subnet_buf);
++	    if (!isanyaddr(&hv.st_nat_oa)){
++	    	addrtosubnet(&hv.st_nat_oa,&b.his.net);
++	    	subnettot(&b.his.net, 0, subnet_buf, sizeof(subnet_buf));
++	    	loglog(RC_LOG_SERIOUS, "IDci was FQDN: %s, using NAT_OA=%s %d as IDci"
++			   , idfqdn, subnet_buf,isanyaddr(&hv.st_nat_oa));
++	    }
+ 	}
+ #endif
+     }
diff -Nru openswan-2.6.28+dfsg/debian/patches/08-initd-configcheck.dpatch openswan-2.6.28+dfsg/debian/patches/08-initd-configcheck.dpatch
--- openswan-2.6.28+dfsg/debian/patches/08-initd-configcheck.dpatch	1970-01-01 01:00:00.000000000 +0100
+++ openswan-2.6.28+dfsg/debian/patches/08-initd-configcheck.dpatch	2010-11-26 10:01:06.000000000 +0100
@@ -0,0 +1,83 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## /tmp/initd-configcheck.patch.dpatch by Harald Jenny <harald@a-little-linux-box.at>
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: jdefg
+## DP: Author: Harald Jenny <harald@a-little-linux-box.at>
+## DP:
+## DP:
+## DP:     check ipsec config before doing start/restart/reload
+
+@DPATCH@
+
+diff --git a/programs/setup/setup.in b/programs/setup/setup.in
+index bf233fb..ce7064d 100755
+--- a/programs/setup/setup.in
++++ b/programs/setup/setup.in
+@@ -68,6 +68,9 @@ then
+     export IPSEC_DIR IPSEC_CONFS IPSEC_LIBDIR IPSEC_EXECDIR
+ fi
+ 
++# Does not make any sense at all to continue without the main binary
++test -x $IPSEC_SBINDIR/ipsec || exit 5
++
+ # misc setup
+ umask 022
+ 
+@@ -75,21 +78,27 @@ mkdir -p /var/run/pluto
+ 
+ RETVAL=0
+ 
++verify_config() {
++    test -f $IPSEC_CONFS/ipsec.conf || exit 6
++    
++    config_error=`ipsec addconn --configsetup 2>&1 >/dev/null`
++    RETVAL=$?
++    if [ $RETVAL != 0 ]
++    then
++        echo "openswan failed to exec the requested action - the following error occured:"
++        echo $config_error
++        exit $RETVAL
++    fi
++}
++
+ start() {
++    verify_config
+-
+-    test -x $IPSEC_SBINDIR/ipsec || exit 5
+-    test -f /etc/ipsec.conf || exit 6
+     
+     # Pick up IPsec configuration (until we have done this, successfully, we
+     # do not know where errors should go, hence the explicit "daemon.error"s.)
+     # Note the "--export", which exports the variables created.
+     variables=`ipsec addconn /etc/ipsec.conf --varprefix IPSEC --configsetup`
+     eval $variables
+-    if [ $? != 0 ]
+-    then
+-         echo "Failed to parse config setup portion of ipsec.conf"
+-         exit $?
+-    fi
+     
+     IPSEC_confreadsection=${IPSEC_confreadsection:-setup}
+     export IPSEC_confreadsection
+@@ -117,18 +126,18 @@ stop() {
+ }
+ 
+ restart() {
++    verify_config
+     stop
+     start
+ }
+ 
+ condrestart() {
+-    test -x $IPSEC_SBINDIR/ipsec || exit 5
++    verify_config
+     ipsec _realsetup status || exit 0
+     restart
+ }
+ 
+ status() {
+-    test -x $IPSEC_SBINDIR/ipsec || exit 5
+     ipsec _realsetup status
+     RETVAL=$?	
+     return $RETVAL
diff -Nru openswan-2.6.28+dfsg/debian/patches/10-initd-header.dpatch openswan-2.6.28+dfsg/debian/patches/10-initd-header.dpatch
--- openswan-2.6.28+dfsg/debian/patches/10-initd-header.dpatch	1970-01-01 01:00:00.000000000 +0100
+++ openswan-2.6.28+dfsg/debian/patches/10-initd-header.dpatch	2010-11-26 10:01:06.000000000 +0100
@@ -0,0 +1,31 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## /tmp/initd-header.patch.dpatch by Jari Aalto <jari.aalto@cante.net>
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: fdebd
+## DP: Author: Jari Aalto <jari.aalto@cante.net>
+## DP: 
+## DP: 
+## DP:     programs/setup/setup.in: Add remote_fs
+
+@DPATCH@
+
+diff --git a/programs/setup/setup.in b/programs/setup/setup.in
+index 44d99b1..21b1bdd 100755
+--- a/programs/setup/setup.in
++++ b/programs/setup/setup.in
+@@ -4,10 +4,10 @@
+ # IPsec startup and shutdown script
+ #
+ ### BEGIN INIT INFO
+-# Provides:          openswan
+-# Required-Start:    $network $syslog $named
+-# Required-Stop:     $syslog
+-# Default-Start:
++# Provides:          ipsec
++# Required-Start:    $network $remote_fs $syslog $named
++# Required-Stop:     $syslog $remote_fs
++# Default-Start:     2 3 4 5
+ # Default-Stop:      0 1 6
+ # Short-Description: Start Openswan IPsec at boot time
+ # Description:       Enable automatic key management for IPsec (KLIPS and NETKEY)
diff -Nru openswan-2.6.28+dfsg/debian/patches/10-initd.dpatch openswan-2.6.28+dfsg/debian/patches/10-initd.dpatch
--- openswan-2.6.28+dfsg/debian/patches/10-initd.dpatch	2010-09-28 11:24:17.000000000 +0200
+++ openswan-2.6.28+dfsg/debian/patches/10-initd.dpatch	1970-01-01 01:00:00.000000000 +0100
@@ -1,31 +0,0 @@
-#! /bin/sh /usr/share/dpatch/dpatch-run
-## /tmp/initd.patch.dpatch by Jari Aalto <jari.aalto@cante.net>
-##
-## All lines beginning with `## DP:' are a description of the patch.
-## DP: fdebd
-## DP: Author: Jari Aalto <jari.aalto@cante.net>
-## DP: 
-## DP: 
-## DP:     programs/setup/setup.in: Add remote_fs
-
-@DPATCH@
-
-diff --git a/programs/setup/setup.in b/programs/setup/setup.in
-index 44d99b1..21b1bdd 100755
---- a/programs/setup/setup.in
-+++ b/programs/setup/setup.in
-@@ -4,10 +4,10 @@
- # IPsec startup and shutdown script
- #
- ### BEGIN INIT INFO
--# Provides:          openswan
--# Required-Start:    $network $syslog $named
--# Required-Stop:     $syslog
--# Default-Start:
-+# Provides:          ipsec
-+# Required-Start:    $network $remote_fs $syslog $named
-+# Required-Stop:     $syslog $remote_fs
-+# Default-Start:     2 3 4 5
- # Default-Stop:      0 1 6
- # Short-Description: Start Openswan IPsec at boot time
- # Description:       Enable automatic key management for IPsec (KLIPS and NETKEY)
diff -Nru openswan-2.6.28+dfsg/debian/patches/49-programs--_confread--ipsec.conf.5-linebreak.dpatch openswan-2.6.28+dfsg/debian/patches/49-programs--_confread--ipsec.conf.5-linebreak.dpatch
--- openswan-2.6.28+dfsg/debian/patches/49-programs--_confread--ipsec.conf.5-linebreak.dpatch	1970-01-01 01:00:00.000000000 +0100
+++ openswan-2.6.28+dfsg/debian/patches/49-programs--_confread--ipsec.conf.5-linebreak.dpatch	2010-11-26 10:01:06.000000000 +0100
@@ -0,0 +1,25 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## /tmp/programs--_confread--ipsec.conf.5-linebreak.patch.dpatch by Harald Jenny <harald@a-little-linux-box.at>
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: fdebd
+## DP: Author: Harald Jenny <harald@a-little-linux-box.at>
+## DP:
+## DP:
+## DP:     fix manpage to allow line break
+
+@DPATCH@
+
+diff --git a/programs/_confread/ipsec.conf.5 b/programs/_confread/ipsec.conf.5
+index 0a6f41b..fd22a78 100644
+--- a/programs/_confread/ipsec.conf.5
++++ b/programs/_confread/ipsec.conf.5
+@@ -1015,7 +1015,7 @@ contains the networks that are allowed as subnet= for the remote client\&. In ot
+ and IPv6 is denoted as
+ \fI%v6:aaaa::bbbb:cccc:dddd:eeee/mm\fR\&. One can exclude subnets by using the
+ \fB!\fR\&. For example, if the VPN server is giving access to 192\&.168\&.1\&.0/24, this option should be set to:
+-\fIvirtual_private=%v4:10\&.0\&.0\&.0/8,%v4:192\&.168\&.0\&.0/16,%v4:172\&.16\&.0\&.0/12,%v4:!192\&.168\&.1\&.0/24\fR\&. This parameter is only needed on the server side and not on the client side that resides behind the NAT router, as the client will just use its IP address for the inner IP setting\&. This parameter may eventually become per\-connection\&.
++\fIvirtual_private=\:%v4:10\&.0\&.0\&.0/8,\:%v4:192\&.168\&.0\&.0/16,\:%v4:172\&.16\&.0\&.0/12,\:%v4:!192\&.168\&.1\&.0/24\fR\&. This parameter is only needed on the server side and not on the client side that resides behind the NAT router, as the client will just use its IP address for the inner IP setting\&. This parameter may eventually become per\-connection\&.
+ .RE
+ .PP
+ \fBoe\fR
diff -Nru openswan-2.6.28+dfsg/debian/source.lintian-overrides openswan-2.6.28+dfsg/debian/source.lintian-overrides
--- openswan-2.6.28+dfsg/debian/source.lintian-overrides	2010-09-28 11:24:17.000000000 +0200
+++ openswan-2.6.28+dfsg/debian/source.lintian-overrides	2010-11-26 10:01:06.000000000 +0100
@@ -1,4 +1,2 @@
-# openswan-doc is just doc but gets made in build
-openswan source: debhelper-but-no-misc-depends openswan-doc
 # temporary override until manpage fixes are in openswan upstream and number of patches drop
 openswan source: more-than-one-patch-system

Reply to: