Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
| * | | | Load multiple comma seperarated certificates in the leftcert option | Martin Willi | 2013-01-18 | 1 | -15/+32 | |
| | | | | ||||||
| * | | | Make AUTH_RULE_SUBJECT cert multi-valued | Martin Willi | 2013-01-18 | 1 | -11/+24 | |
| | | | | | | | | | | | | | | | | | | | | Constraints having multiple subject certs defined are fulfilled if authentication used one of the listed certificates. | |||||
* | | | | Merge branch 'systime' | Martin Willi | 2013-03-01 | 9 | -10/+525 | |
|\ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | Add a systime-fix plugin allowing an embedded system to validate certificates if the system time has not been synchronized after boot. Certificates of established tunnels can be re-validated after the system time gets valid. | |||||
| * | | | | systime-fix disables certificate lifetime validation if system time not synced | Martin Willi | 2013-02-19 | 4 | -0/+326 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The system time can be periodically checked. If it gets valid, certificates get rechecked with the current lifetime. If certificates are invalid, associated IKE_SAs can be closed or reauthenticated. | |||||
| * | | | | Add a stub for systime-fix, a plugin handling certificate lifetimes gracefully | Martin Willi | 2013-02-19 | 5 | -0/+130 | |
| | | | | | ||||||
| * | | | | Add a cert_validator hook allowing plugins to provide custom lifetime checking | Martin Willi | 2013-02-19 | 2 | -10/+64 | |
| | | | | | ||||||
| * | | | | Make cert_validator_t.validate optional to implement | Martin Willi | 2013-02-19 | 2 | -0/+5 | |
| | |_|/ | |/| | | ||||||
* | | | | Merge branch 'ikev1-rekeying' | Martin Willi | 2013-03-01 | 2 | -0/+25 | |
|\ \ \ \ | | | | | | | | | | | | | | | | | | | | | Migrates Quick Modes to the new Main Mode if an IKEv1 reauthentication replaces the old Main Mode having a uniqueids=replace policy. | |||||
| * | | | | After IKEv1 reauthentication, reinstall VIP routes after migrating CHILD_SAs | Martin Willi | 2013-02-20 | 1 | -0/+4 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | During IKEv1 reauthentication, the virtual IP gets removed, then reinstalled. The CHILD_SAs get migrated, but any associated route gets removed from the kernel. Reinstall routes after adding the virtual IP again. | |||||
| * | | | | When detecting a duplicate IKEv1 SA, adopt children, as it might be a rekeying | Martin Willi | 2013-02-20 | 1 | -0/+21 | |
| | | | | | ||||||
* | | | | | Merge branch 'vip-shunts' | Martin Willi | 2013-03-01 | 2 | -15/+19 | |
|\ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Installs bypass policies for the physical address if a virtual address is assigned, and installs a proper source route to actually use the physical address for bypassed destinations. Conflicts: src/libcharon/plugins/unity/unity_handler.c | |||||
| * | | | | | Install a route for shunt policies | Martin Willi | 2013-02-20 | 1 | -5/+13 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If we install a virtual IP, its source route would render the shunt policy useless, as locally generated traffic wouldn't match. Having a route for each shunt policy with higher priority chooses the correct source address for bypassed destinations. | |||||
| * | | | | | Include local address for Unity Split-Exclude shunt policies | Martin Willi | 2013-02-20 | 1 | -10/+5 | |
| |/ / / / | | | | | | | | | | | | | | | | | | | | | If we use a virtual IP, having a shunt policy for just that wouldn't work, as we want a shunt bypass using the local address. | |||||
* | | | | | Merge branch 'opaque-ports' | Martin Willi | 2013-03-01 | 19 | -118/+199 | |
|\ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | Adds a %opaque port option and support for port ranges in left/rightprotoport. Currently not supported by any of our kernel backends. | |||||
| * | | | | | Don't reject OPAQUE ports while verifying traffic selector substructure | Martin Willi | 2013-02-21 | 1 | -1/+5 | |
| | | | | | | ||||||
| * | | | | | Document ipsec.conf leftprotoport extensions in manpage | Martin Willi | 2013-02-21 | 1 | -0/+8 | |
| | | | | | | ||||||
| * | | | | | Optionally support port ranges in leftprotoport | Martin Willi | 2013-02-21 | 1 | -4/+20 | |
| | | | | | | ||||||
| * | | | | | Support %opaque keyword in leftprotoport for "opaque" ports | Martin Willi | 2013-02-21 | 1 | -0/+5 | |
| | | | | | | ||||||
| * | | | | | Pass complete port range over stroke interface for more flexibility | Martin Willi | 2013-02-21 | 7 | -24/+21 | |
| | | | | | | ||||||
| * | | | | | Use a complete port range in traffic_selector_create_from_{subnet,cidr} | Martin Willi | 2013-02-21 | 11 | -36/+46 | |
| | | | | | | ||||||
| * | | | | | Print OPAQUE traffic selectors as what they are, not as port range | Martin Willi | 2013-02-21 | 1 | -0/+4 | |
| | | | | | | ||||||
| * | | | | | Support "opaque" ports in traffic selector subset calculation | Martin Willi | 2013-02-21 | 1 | -6/+32 | |
| | | | | | | ||||||
| * | | | | | Slightly refactor traffic_selector_t.get_subset() | Martin Willi | 2013-02-21 | 1 | -61/+68 | |
| | | | | | | ||||||
| * | | | | | Migrate remaining traffic selector methods to METHOD macro | Martin Willi | 2013-02-21 | 1 | -19/+18 | |
| | |/ / / | |/| | | | ||||||
* | | | | | When running with an unprivileged user, initialize supplementary groups | Martin Willi | 2013-03-01 | 2 | -2/+38 | |
| | | | | | ||||||
* | | | | | Without MOBIKE, update remote host only if it is behind NAT | Martin Willi | 2013-03-01 | 1 | -2/+3 | |
| | | | | | ||||||
* | | | | | Merge branch 'ikev1-mm-retransmits' | Martin Willi | 2013-03-01 | 4 | -45/+55 | |
|\ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes retransmit of the last Main Mode or IKE_AUTH message, and correctly queues Main Mode messages when processing of the last message is still in progress. | |||||
| * | | | | | For IKEv1 Main Mode, use message hash to detect early retransmissions | Martin Willi | 2013-02-25 | 1 | -10/+23 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | As the message ID is zero in all Main Mode messages, it can't be used to detect if we are already processing a given message. | |||||
| * | | | | | Move initial message dropping to task manager | Martin Willi | 2013-02-25 | 3 | -19/+27 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When the last request message of the initial tunnel setup is retransmitted, we must retransmit the response instead of ignoring the request. Fixes #295. | |||||
| * | | | | | Use INIT macro to initialize IKE_SA manager entries | Martin Willi | 2013-02-25 | 1 | -17/+6 | |
| | | | | | | ||||||
* | | | | | | Merge branch 'tfc-notify' | Martin Willi | 2013-03-01 | 6 | -2/+68 | |
|\ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Introduces kernel backend features, sends ESP_TFC_PADDING_NOT_SUPPORTED if kernel does not support it. | |||||
| * | | | | | | Send ESP_TFC_PADDING_NOT_SUPPORTED if the used kernel doesn't support it | Martin Willi | 2013-03-01 | 1 | -0/+9 | |
| | | | | | | | ||||||
| * | | | | | | Indicate support for processing ESPv3 TFC padding in Netlink IPsec backend | Martin Willi | 2013-03-01 | 1 | -1/+7 | |
| | | | | | | | ||||||
| * | | | | | | Introduce "features" for the kernel backends returning kernel capabilities | Martin Willi | 2013-03-01 | 4 | -1/+52 | |
| | |/ / / / | |/| | | | | ||||||
* | | | | | | testing: Add a script to easily connect to a host via SSH | Tobias Brunner | 2013-02-28 | 1 | -0/+20 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This doesn't require any entries in /etc/hosts and the correct SSH config is used to allow password-less access. | |||||
* | | | | | | openssl: Provide AES-GCM implementation | Tobias Brunner | 2013-02-28 | 4 | -1/+312 | |
| | | | | | | ||||||
* | | | | | | Fix cleanup in crypto_tester if AEAD implementation fails | Tobias Brunner | 2013-02-28 | 1 | -1/+4 | |
| | | | | | | ||||||
* | | | | | | Order of arguments in Doxygen comment fixed | Tobias Brunner | 2013-02-28 | 2 | -2/+2 | |
| | | | | | | ||||||
* | | | | | | Fix auth_cfg_t.clone() for single-valued auth rules | Tobias Brunner | 2013-02-28 | 1 | -10/+11 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | By using the default list enumerator and adding the rules with the public add() method, clones of auth_cfg_t objects would return the values for single-valued auth rules in the wrong order (i.e. the oldest instead of the newest value was returned). Using the internal enumerator (which the comment already suggested) fixes this, but the clone will not be a full clone as it does not contain any old values for single-valued auth rules. Since these will never be used anyway, this should be fine. | |||||
* | | | | | | Trigger an updown event when destroying an IKE_SA based on INITIAL_CONTACT | Tobias Brunner | 2013-02-28 | 1 | -0/+1 | |
| |_|_|_|/ |/| | | | | | | | | | | | | | | | | | | | In other cases (i.e. when functions return DESTROY_ME) the event should already be triggered, but not in this forced situation. | |||||
* | | | | | Use SIGUSR2 for SIG_CANCEL on Android | Tobias Brunner | 2013-02-26 | 1 | -0/+4 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | SIGRTMIN is defined as 32 while sigset_t is defined as unsigned long (i.e. holds 32 signals). Hence, the signal could never be blocked. Sending the signal still canceled threads, but sometimes in situations where they shouldn't have been canceled (e.g. while holding a lock). Fixes #298. | |||||
* | | | | | Android.mk updated to latest Makefiles | Tobias Brunner | 2013-02-26 | 3 | -1/+3 | |
| |/ / / |/| | | | | | | | | | | | Fixes #300. | |||||
* | | | | Check kvm command existence in start-testing | Reto Buerki | 2013-02-22 | 1 | -1/+1 | |
| | | | | ||||||
* | | | | openssl: Disable PKCS#7/CMS when building against OpenSSL < 0.9.8g | Tobias Brunner | 2013-02-20 | 2 | -1/+5 | |
| |/ / |/| | | | | | | | | Fixes #292. | |||||
* | | | version bump to 5.0.3dr25.0.3dr2 | Andreas Steffen | 2013-02-19 | 2 | -1/+5 | |
| | | | ||||||
* | | | treat IF-M and IF-TNCCS remediation instructions/parameters in an equal way | Andreas Steffen | 2013-02-19 | 4 | -107/+204 | |
| | | | ||||||
* | | | Merge branch 'dnssec' | Tobias Brunner | 2013-02-19 | 103 | -7/+3723 | |
|\ \ \ | ||||||
| * | | | NEWS about ipseckey and unbound plugins added | Tobias Brunner | 2013-02-19 | 1 | -0/+9 | |
| | | | | ||||||
| * | | | Added ikev2/rw-dnssec scenario | Andreas Steffen | 2013-02-19 | 21 | -0/+301 | |
| | | | | ||||||
| * | | | Added ikev2/net2net-dnssec scenario | Andreas Steffen | 2013-02-19 | 17 | -0/+220 | |
| | | | |