25
I Use This!
Moderate Activity
Analyzed 2 days ago. based on code collected 2 days ago.

Project Summary

strongSwan is an open source IPsec-based VPN solution. It features IKEv1 and IKEv2 keying capabilities and runs on Linux, Android, FreeBSD, macOS, iOS and Windows.

Tags

authentication c cross_platform cryptography dual_license encryption gateway ike ikev2 ipsec linux network networking ocsp pkcs11 security smartcard tunnel vpn x509

In a Nutshell, strongSwan...

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    55% of companies leverage OSS for production infrastructure
  • ...
    data presented on the Open Hub is available through our API
  • ...
    65% of companies leverage OSS to speed application development in 2016
  • ...
    check out hot projects on the Open Hub
About Project Security

Languages

C
87%
19 Other
13%

30 Day Summary

Oct 21 2024 — Nov 20 2024

12 Month Summary

Nov 20 2023 — Nov 20 2024
  • 227 Commits
    Down -164 (41%) from previous 12 months
  • 16 Contributors
    Up + 8 (100%) from previous 12 months

Static Analysis ( Generated by Coverity Scan for strongSwan )

Repository URL: https://github.com/strongswan/strongswan

Version: strongswan-5.9.14rc1

2024-03-14
Last Analyzed
508,991
Lines of Code Analyze
0.06
Defect Density

Defects by status for current build

1,081
Total defects
31
Outstanding
328
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
190 Integer Overflow or Wraparound 1
327 Use of a Broken or Risky Cryptographic Algorithm 1
676 Use of Potentially Dangerous Function 7