aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* added ikev2/dynamic-responder scenarioAndreas Steffen2012-06-0814-0/+219
|
* added ikev2/dynamic-initiator scenarioAndreas Steffen2012-06-0814-0/+218
|
* implemented the right|leftallowany featureAndreas Steffen2012-06-0819-77/+137
|
* Enforce uniqueness policy in IKEv1 main and aggressive modesMartin Willi2012-06-082-0/+29
|
* starter: Go back to single threaded mode.Tobias Brunner2012-06-082-22/+7
| | | | | Mixing multiple threads and fork(2) wasn't a very good idea it seems. At least in some environments this caused strange side-effects.
* Disabled listening for kernel events in starter.Tobias Brunner2012-06-084-74/+110
|
* Try to rekey without KE exchange if peer returns INVALID_KE_PAYLOAD(NONE)Martin Willi2012-06-081-1/+8
| | | | | | According to RFC5996, implementations should just ignore the KE payload if they select a non-PFS proposals. Some implementations don't, but return MODP_NONE in INVALID_KE_PAYLOAD, hence we accept that, too.
* While checking for redundant quick modes, compare traffic selectorsMartin Willi2012-06-081-0/+22
| | | | | If a configuration is instanced more than once using narrowing, we should keep all unique quick modes up during rekeying.
* Store shorter soft lifetime of in- and outbound SAs onlyMartin Willi2012-06-081-1/+8
|
* Initiate quick mode rekeying with narrowed traffic selectorsMartin Willi2012-06-081-1/+18
|
* Use traffic selectors passed to quick mode constructor as initiatorMartin Willi2012-06-081-2/+10
|
* Instead of rekeying, delete a quick mode if we have a fresher instanceMartin Willi2012-06-081-6/+42
| | | | | | | | If both peers initiate quick mode rekeying simultaneously, we end up with duplicate SAs for a configuration. This can't be avoided, nor do the standards provide an appropriate solution. Instead of closing one SA immediately, we keep both. But once rekeying triggers, we don't refresh the SA with the shorter soft lifetime, but delete it.
* Properly handle empty RDN values in DN strings.Tobias Brunner2012-06-071-3/+11
|
* Properly install policies with ports in PF_KEY kernel interface.Tobias Brunner2012-06-071-27/+28
|
* As responder, enforce the same configuration while rekeying CHILD_SAsMartin Willi2012-06-063-1/+19
|
* starter: Only handle SIGCHLD asynchronously and the rest in pselect(2).Tobias Brunner2012-06-061-8/+17
|
* Show expiration time of rekeyed CHILD_SAs in statusallMartin Willi2012-06-051-1/+6
|
* starter: (De-)Initialize logging when forking.Tobias Brunner2012-06-051-0/+2
|
* starter: Close open file descriptors when forking daemons.Tobias Brunner2012-06-042-0/+2
|
* starter: Changed signal handling now that starter is multi-threaded.Tobias Brunner2012-06-042-15/+57
|
* Mark CHILD_SAs used for trap policies to uninstall them properly.Tobias Brunner2012-06-041-6/+13
| | | | | | | If the installation failed the state is not CHILD_ROUTED which means the wrong priority is used to uninstall the policies. This is a problem for kernel interfaces that keep track of installed policies as now the proper policy is not found (if the priority is considered).
* NEWS for 4.6.4 added.Tobias Brunner2012-05-311-0/+10
|
* Fixed return values of several functions (e.g. return FALSE for pointer types).Tobias Brunner2012-05-318-10/+10
|
* Fix boolean return value if an empty RSA signature is detected in gmp pluginMartin Willi2012-05-311-1/+1
| | | | Fixes CVE-2012-2388.
* Avoid queueing more than one retry initiate job.Tobias Brunner2012-05-303-4/+35
|
* Retry IKE_SA initiation if DNS resolution failed.Tobias Brunner2012-05-302-4/+43
| | | | | This is disabled by default and can be enabled with the charon.retry_initiate_interval option in strongswan.conf.
* Job added to re-initiate an IKE_SA.Tobias Brunner2012-05-303-0/+144
|
* added nonce plugin to gcrypt scenariosAndreas Steffen2012-05-3020-20/+20
|
* upgraded ipv6 scenarios to 5.0.0Andreas Steffen2012-05-29121-282/+737
|
* Fix MOBIKE address update if responder address changed.Tobias Brunner2012-05-251-2/+2
| | | | | Use the source address of the current MOBIKE message as peer address instead of assuming the address cached on the IKE_SA is still valid.
* Resolve hosts before reauthenticating due to address change.Tobias Brunner2012-05-251-0/+2
|
* Don't queue delete_ike_sa job when setting IKE_DELETING.Tobias Brunner2012-05-252-9/+1
| | | | | This avoids deleting IKE_SAs during reauthentication (without trying to reestablish them).
* During reauthentication reestablish IKE_SA even if deleting the old one fails.Tobias Brunner2012-05-251-0/+6
|
* Integrated main parts of IKE_REAUTH task into ike_sa_t.reestablish.Tobias Brunner2012-05-252-115/+77
|
* Fixed route lookup in case MOBIKE is not enabled.Tobias Brunner2012-05-251-3/+9
|
* enable xauth-eap plugin in UML scenariosAndreas Steffen2012-05-252-0/+6
|
* added nonce plugin in default host configurationsAndreas Steffen2012-05-257-7/+7
|
* upgraded ike scenarios to 5.0.0Andreas Steffen2012-05-2513-54/+74
|
* added IKEv1 IPCOMP pluto-charon interoperability scenariosAndreas Steffen2012-05-2523-0/+273
|
* Added encapsulation mode transform attribute to IPComp proposal.Tobias Brunner2012-05-253-5/+10
|
* upgraded ikev1/compress to 5.0.0Andreas Steffen2012-05-249-0/+93
|
* Updated ipsec.conf(5) to reflect changes to IPComp support.Tobias Brunner2012-05-241-4/+2
|
* Add an additional proposal without IPComp to SA payload.Tobias Brunner2012-05-241-17/+15
|
* Added log message if peer does not accept/provide IPComp proposal.Tobias Brunner2012-05-241-2/+12
|
* Added support to negotiate IPComp during Quick Mode.Tobias Brunner2012-05-241-11/+91
|
* Added support for IKEv1 IPComp proposals in SA payload.Tobias Brunner2012-05-245-14/+98
|
* Added support for IKEv1 IPComp proposals in proposal substructure.Tobias Brunner2012-05-244-10/+129
|
* Fix memleak during Quick Mode in case no SPI can be allocated from kernel.Tobias Brunner2012-05-241-8/+8
|
* Properly filter IKEv1 proposals consisting of multiple proposal payloads.Tobias Brunner2012-05-241-9/+15
| | | | | | | Since a proposal_t object is created for each transform contained in the proposal payload, it does not work to simply remove the last proposal_t object added to the list (there may be several other extracted from the previous proposal payload).
* Fixed check for loaded plugins with feature types that are not compared exactly.Tobias Brunner2012-05-241-25/+13
| | | | | Previously e.g. RNGs with weaker strength would have overwritten stronger ones.