25
I Use This!
Moderate Activity
Analyzed about 15 hours ago. based on code collected about 15 hours ago.

Project Summary

strongSwan is an open source IPsec-based VPN solution. It features IKEv1 and IKEv2 keying capabilities and runs on Linux, Android, FreeBSD, macOS, iOS and Windows.

Tags

authentication c cross_platform cryptography dual_license encryption gateway ike ikev2 ipsec linux network networking ocsp pkcs11 security smartcard tunnel vpn x509

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    55% of companies leverage OSS for production infrastructure
  • ...
    anyone with an Open Hub account can update a project's tags
  • ...
    65% of companies leverage OSS to speed application development in 2016
  • ...
    you can subscribe to e-mail newsletters to receive update from the Open Hub blog
About Project Security

Languages

C
87%
19 Other
13%

30 Day Summary

Mar 28 2025 — Apr 27 2025

12 Month Summary

Apr 27 2024 — Apr 27 2025
  • 277 Commits
    Down -82 (22%) from previous 12 months
  • 11 Contributors
    Down -5 (31%) from previous 12 months
 

Static Analysis ( Generated by Coverity Scan for strongSwan )

Repository URL: https://github.com/strongswan/strongswan

Version: strongswan-6.0.1rc1

2025-03-04
Last Analyzed
521,281
Lines of Code Analyze
0.08
Defect Density

Defects by status for current build

1,133
Total defects
39
Outstanding
332
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
190 Integer Overflow or Wraparound 27
327 Use of a Broken or Risky Cryptographic Algorithm 1
676 Use of Potentially Dangerous Function 7