25
I Use This!
Moderate Activity
Analyzed 15 minutes ago. based on code collected about 12 hours ago.

Project Summary

strongSwan is an open source IPsec-based VPN solution. It features IKEv1 and IKEv2 keying capabilities and runs on Linux, Android, FreeBSD, macOS, iOS and Windows.

Tags

authentication c cross_platform cryptography dual_license encryption gateway ike ikev2 ipsec linux network networking ocsp pkcs11 security smartcard tunnel vpn x509

In a Nutshell, strongSwan...

GNU General Public License v2.0 or later
Permitted

Commercial Use

Modify

Distribute

Place Warranty

Forbidden

Sub-License

Hold Liable

Required

Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    65% of companies leverage OSS to speed application development in 2016
  • ...
    you can embed statistics from Open Hub on your site
  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    learn about Open Hub updates and features on the Open Hub blog
About Project Security

Languages

C
87%
19 Other
13%

30 Day Summary

Feb 1 2024 — Mar 2 2024

12 Month Summary

Mar 2 2023 — Mar 2 2024
  • 374 Commits
    Up + 12 (3%) from previous 12 months
  • 12 Contributors
    Down 0 (0%) from previous 12 months

Static Analysis ( Generated by Coverity Scan for strongSwan )

Repository URL: https://github.com/strongswan/strongswan

Version: strongswan-5.9.13rc1

2023-11-27
Last Analyzed
508,959
Lines of Code Analyze
0.06
Defect Density

Defects by status for current build

1,083
Total defects
32
Outstanding
328
Fixed

CWE Top 25 defects

ID CWE-Name Number of Defects
190 Integer Overflow or Wraparound 1
327 Use of a Broken or Risky Cryptographic Algorithm 1
676 Use of Potentially Dangerous Function 7