diff options
author | Tobias Brunner <tobias@strongswan.org> | 2015-09-25 19:24:44 +0200 |
---|---|---|
committer | Tobias Brunner <tobias@strongswan.org> | 2015-11-09 16:25:59 +0100 |
commit | 8484d2b01d5475abd1ded60b6b451a22cec99a61 (patch) | |
tree | 58e2f31b0bab0056b09ea40b69fa0d31770d85a5 /src/libcharon/plugins | |
parent | 2533c857ba3f5e003a8b7e113227030b75aef51a (diff) | |
download | strongswan-8484d2b01d5475abd1ded60b6b451a22cec99a61.tar.bz2 strongswan-8484d2b01d5475abd1ded60b6b451a22cec99a61.tar.xz |
ike-natd: Create fake NAT-D payloads in a more static way
In some scenarios an IKE_SA might get restarted multiple times (e.g.
due to retransmits and delayed INVALID_KE_PAYLOAD notifies) so that
two IKE_SA_INIT messages might be sent that only differ in the
previously randomly generated NAT_DETECTION_SOURCE_IP payload.
This could cause an authentication failure on the responder if the two
peers don't use the same IKE_SA_INIT message in their InitiatorSignedOctets.
While the payload is generated in a reproducible way it will still change
when the daemon is restarted, which should make detecting the payloads
as fake a bit harder (compared to e.g. just using 0.0.0.0:0 as address).
Fixes #1131.
Diffstat (limited to 'src/libcharon/plugins')
0 files changed, 0 insertions, 0 deletions