Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | libipsec: Don't limit traditional algorithms to AES and SHA1/2 | Tobias Brunner | 2013-08-12 | 1 | -25/+7 | |
| | | | | Closes #377. | |||||
* | kernel-netlink,pfroute: Properly update address flag within ROAM_DELAY | Tobias Brunner | 2013-08-12 | 2 | -2/+2 | |
| | | | | | | | 77d4a02 and 55da01f only updated the address flag when a job was created, which obviously had the same limitation as the old code. Fixes #374. | |||||
* | kernel-pfroute: Implement roam event handling like in the kernel-netlink plugin | Tobias Brunner | 2013-08-12 | 1 | -13/+36 | |
| | | | | | There was no proper locking and the issue regarding the address flag also existed. | |||||
* | kernel-netlink: Ensure address changes are not missed in roam events | Tobias Brunner | 2013-08-12 | 1 | -4/+15 | |
| | | | | | | | | | | | | | | | | If multiple roam events are triggered within ROAM_DELAY, only one job is created. The old code set the address flag to the value of the last triggering call. So if a route change followed an address change within ROAM_DELAY the address change was missed by the upper layers, e.g. causing it not to update the list of addresses via MOBIKE. The new code now keeps the state of the address flag until the job is actually executed, which still has some issues. For instance, if an address disappears and reappears within ROAM_RELAY, the flag would not have to be set to TRUE. So address updates might occasionally get triggered where none would actually be required. Fixes #374. | |||||
* | backtrace: rename clone() method clashing with system call | Martin Willi | 2013-08-09 | 1 | -2/+2 | |
| | | | | Fixes #376. | |||||
* | updown: remove description of unsupported PLUTO_ variables | Martin Willi | 2013-08-08 | 3 | -59/+6 | |
| | | | | These have been set by pluto, but are not by charons updown plugin. | |||||
* | scripts: link against librt only if required | Martin Willi | 2013-08-08 | 1 | -3/+3 | |
| | | | | With glibc, this seems to be the case for 2.17 and older versions only. | |||||
* | scripts: link malloc_speed against librt | Martin Willi | 2013-08-08 | 1 | -1/+1 | |
| | ||||||
* | strongswan.conf: Add note about reserved threads | Tobias Brunner | 2013-08-07 | 1 | -1/+5 | |
| | ||||||
* | tnc-pdp: Initialize struct msghdr properly when reading RADIUS messages5.1.0 | Tobias Brunner | 2013-07-31 | 1 | -10/+10 | |
| | | | | | Before this e.g. msg_controllen was not initialized properly which could cause invalid reads. | |||||
* | NEWS: Add info about CVE-2013-5018 | Tobias Brunner | 2013-07-31 | 1 | -1/+6 | |
| | ||||||
* | whitelist: Fix compilation on FreeBSD | Tobias Brunner | 2013-07-31 | 1 | -0/+2 | |
| | ||||||
* | host: Properly initialize struct sockaddr_in[6] when parsing strings | Tobias Brunner | 2013-07-31 | 1 | -0/+2 | |
| | | | | | Otherwise struct members like sin6_flowinfo or sin6_scope_id might be set to bogus values. | |||||
* | asn1: Fix handling of invalid ASN.1 length in is_asn1() | Tobias Brunner | 2013-07-31 | 1 | -0/+5 | |
| | | | | Fixes CVE-2013-5018. | |||||
* | Callback job is not needed any more | Andreas Steffen | 2013-07-31 | 1 | -4/+0 | |
| | ||||||
* | charon-xpc: load missing ctr/ccm/gcm plugins | Martin Willi | 2013-07-31 | 1 | -2/+3 | |
| | ||||||
* | charon-xpc: use kernel-libipsec instead of kernel-pfkey | Martin Willi | 2013-07-31 | 3 | -4/+9 | |
| | ||||||
* | charon-xpc: fix TS getting after changing CHILD_SA API | Martin Willi | 2013-07-31 | 1 | -2/+6 | |
| | ||||||
* | keychain: be less verbose when loading certificates | Martin Willi | 2013-07-31 | 1 | -2/+5 | |
| | ||||||
* | receiver: Avoid cloning packet data when verifying COOKIE payloads | Tobias Brunner | 2013-07-29 | 1 | -5/+1 | |
| | | | | | | | Besides being more efficient this removes a memory leak that occurred when a COOKIE payload was successfully verified. Fixes #369. | |||||
* | unity: Handle multi-valued UNITY_SPLIT_INCLUDE/UNITY_LOCAL_LAN attributes | Tobias Brunner | 2013-07-29 | 1 | -50/+97 | |
| | | | | | | | Cisco devices seem to add 6 bytes of padding between each address/mask pair. Fixes #366. | |||||
* | version bump to 5.0.1 | Andreas Steffen | 2013-07-29 | 1 | -1/+1 | |
| | ||||||
* | tnc-pdp now uses watcher_t | Andreas Steffen | 2013-07-29 | 1 | -92/+63 | |
| | ||||||
* | Updated PTS database scheme to new workitems model | Andreas Steffen | 2013-07-29 | 1 | -39/+127 | |
| | ||||||
* | ikev2: Only schedule half-open-timeout delete job after successfully ↵ | Tobias Brunner | 2013-07-29 | 1 | -8/+16 | |
| | | | | | | | handling IKE_SA_INIT We want to avoid this allocation if the initial message is invalid (e.g. if the message ID is != 0). | |||||
* | NEWS: mention xauth-radius backend in eap-radius plugin | Martin Willi | 2013-07-29 | 1 | -0/+6 | |
| | ||||||
* | testing: enforce xauth-eap in ikev1/xauth-rsa-eap-md5-radius | Martin Willi | 2013-07-29 | 1 | -1/+1 | |
| | | | | | As eap-radius now provides its own XAuth backend and eap-radius is loaded before xauth-eap, we have to enforce the exact XAuth backend to use. | |||||
* | Merge branch 'xauth-radius' | Martin Willi | 2013-07-29 | 32 | -100/+740 | |
|\ | | | | | | | | | | | | | Implements verification of XAuth credentials using simple RADIUS User-Name and (encrypted) User-Password attributes. The XAuth backend is implemented in the eap-radius plugin, reusing all existing infrastructure and features found in that plugin, including RADIUS accounting. | |||||
| * | testing: add a testcase for plain XAuth RADIUS authentication | Martin Willi | 2013-07-29 | 16 | -0/+209 | |
| | | ||||||
| * | charon-cmd: add --eap-identity and --xauth-username options | Martin Willi | 2013-07-29 | 4 | -0/+37 | |
| | | ||||||
| * | eap-radius: do RADIUS/IKE attribute forwarding in XAuth backend | Martin Willi | 2013-07-29 | 2 | -1/+5 | |
| | | ||||||
| * | eap-radius: support plain XAuth RADIUS authentication using User-Password | Martin Willi | 2013-07-29 | 4 | -0/+253 | |
| | | ||||||
| * | libradius: support encryption of User-Password attributes | Martin Willi | 2013-07-29 | 1 | -0/+27 | |
| | | ||||||
| * | utils: add round_up/down() helper functions | Martin Willi | 2013-07-29 | 2 | -0/+49 | |
| | | ||||||
| * | libradius: refactor generic RADIUS en-/decryption function to a message method | Martin Willi | 2013-07-29 | 3 | -44/+85 | |
| | | ||||||
| * | eap-radius: export function to build common attributes of Access-Request | Martin Willi | 2013-07-29 | 2 | -24/+39 | |
| | | ||||||
| * | eap-radius: export function to process common attributes of Access-Accept | Martin Willi | 2013-07-29 | 2 | -31/+36 | |
|/ | ||||||
* | mem-pool: add option for reusing online leases, and disable it by default | Martin Willi | 2013-07-29 | 1 | -1/+13 | |
| | | | | | | | | | | | Mainly for reauthentication with third party implementations, we allowed to reuse an online lease, but only for the same peer identity and when it explicitly requested the same address. This has always been problematic, because it changes the reqid of the CHILD_SA with the same traffic selectors, breaking the old tunnel. As we now reject such policy overwrites, this usually lets the installation of the new policies fail. We therefore disable reassignment of online leases by default. | |||||
* | mem-pool: replace per-identity online/offline lists by more efficient arrays | Martin Willi | 2013-07-29 | 1 | -48/+52 | |
| | | | | This saves two lists per connected peer identity, up to 0.4KB. | |||||
* | mem-pool: refcount online lease when reassigning it to another tunnel | Martin Willi | 2013-07-26 | 1 | -5/+28 | |
| | | | | | | | When we reassign an online lease for the same peer, we have to refcount it. Otherwise we would set it offline if one of the tunnels goes down, but it is actually still in use by a the second tunnel. This can finally lead in assigning the same virtual IP to different peers. | |||||
* | ikev1: Always send ID payloads (traffic selectors) during Quick Mode | Tobias Brunner | 2013-07-25 | 1 | -26/+4 | |
| | | | | | | | Especially Windows 7 has problems if the peer does not send ID payloads for host-to-host connections (tunnel and transport mode). Fixes #319. | |||||
* | watcher: Made notify array initialization compatible with older GCC versions | Tobias Brunner | 2013-07-25 | 1 | -2/+1 | |
| | ||||||
* | unit-tests: Add additional tests for host_t | Tobias Brunner | 2013-07-25 | 1 | -3/+551 | |
| | ||||||
* | imv-attestation: Properly measure complete directories | Tobias Brunner | 2013-07-25 | 1 | -1/+1 | |
| | ||||||
* | array: Number of items in get_size() is unsigned | Tobias Brunner | 2013-07-25 | 1 | -1/+1 | |
| | | | | | | Otherwise, array->esize is promoted to int and if array->esize * num results in a value > 0x7fffffff the return value would be incorrect due the implicit sign extension when getting cast to size_t. | |||||
* | stream: Ensure UNIX socket path is null terminated | Tobias Brunner | 2013-07-24 | 1 | -0/+1 | |
| | ||||||
* | kernel-pfkey: Add sanity check when deleting policies | Tobias Brunner | 2013-07-24 | 1 | -0/+5 | |
| | ||||||
* | imv-os: check_packages() fails if product query fails | Tobias Brunner | 2013-07-24 | 1 | -0/+1 | |
| | ||||||
* | pkcs5: Add missing break statements when checking crypto primitives | Tobias Brunner | 2013-07-24 | 1 | -0/+2 | |
| | ||||||
* | imv-scanner: Properly check snprintf() return value | Tobias Brunner | 2013-07-24 | 1 | -5/+9 | |
| |