Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
| * | | | | After IKEv1 reauthentication, reinstall VIP routes after migrating CHILD_SAs | Martin Willi | 2013-02-20 | 1 | -0/+4 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | During IKEv1 reauthentication, the virtual IP gets removed, then reinstalled. The CHILD_SAs get migrated, but any associated route gets removed from the kernel. Reinstall routes after adding the virtual IP again. | |||||
| * | | | | When detecting a duplicate IKEv1 SA, adopt children, as it might be a rekeying | Martin Willi | 2013-02-20 | 1 | -0/+21 | |
| | | | | | ||||||
* | | | | | Merge branch 'vip-shunts' | Martin Willi | 2013-03-01 | 2 | -15/+19 | |
|\ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Installs bypass policies for the physical address if a virtual address is assigned, and installs a proper source route to actually use the physical address for bypassed destinations. Conflicts: src/libcharon/plugins/unity/unity_handler.c | |||||
| * | | | | | Install a route for shunt policies | Martin Willi | 2013-02-20 | 1 | -5/+13 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If we install a virtual IP, its source route would render the shunt policy useless, as locally generated traffic wouldn't match. Having a route for each shunt policy with higher priority chooses the correct source address for bypassed destinations. | |||||
| * | | | | | Include local address for Unity Split-Exclude shunt policies | Martin Willi | 2013-02-20 | 1 | -10/+5 | |
| |/ / / / | | | | | | | | | | | | | | | | | | | | | If we use a virtual IP, having a shunt policy for just that wouldn't work, as we want a shunt bypass using the local address. | |||||
* | | | | | Merge branch 'opaque-ports' | Martin Willi | 2013-03-01 | 19 | -118/+199 | |
|\ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | Adds a %opaque port option and support for port ranges in left/rightprotoport. Currently not supported by any of our kernel backends. | |||||
| * | | | | | Don't reject OPAQUE ports while verifying traffic selector substructure | Martin Willi | 2013-02-21 | 1 | -1/+5 | |
| | | | | | | ||||||
| * | | | | | Document ipsec.conf leftprotoport extensions in manpage | Martin Willi | 2013-02-21 | 1 | -0/+8 | |
| | | | | | | ||||||
| * | | | | | Optionally support port ranges in leftprotoport | Martin Willi | 2013-02-21 | 1 | -4/+20 | |
| | | | | | | ||||||
| * | | | | | Support %opaque keyword in leftprotoport for "opaque" ports | Martin Willi | 2013-02-21 | 1 | -0/+5 | |
| | | | | | | ||||||
| * | | | | | Pass complete port range over stroke interface for more flexibility | Martin Willi | 2013-02-21 | 7 | -24/+21 | |
| | | | | | | ||||||
| * | | | | | Use a complete port range in traffic_selector_create_from_{subnet,cidr} | Martin Willi | 2013-02-21 | 11 | -36/+46 | |
| | | | | | | ||||||
| * | | | | | Print OPAQUE traffic selectors as what they are, not as port range | Martin Willi | 2013-02-21 | 1 | -0/+4 | |
| | | | | | | ||||||
| * | | | | | Support "opaque" ports in traffic selector subset calculation | Martin Willi | 2013-02-21 | 1 | -6/+32 | |
| | | | | | | ||||||
| * | | | | | Slightly refactor traffic_selector_t.get_subset() | Martin Willi | 2013-02-21 | 1 | -61/+68 | |
| | | | | | | ||||||
| * | | | | | Migrate remaining traffic selector methods to METHOD macro | Martin Willi | 2013-02-21 | 1 | -19/+18 | |
| | |/ / / | |/| | | | ||||||
* | | | | | When running with an unprivileged user, initialize supplementary groups | Martin Willi | 2013-03-01 | 2 | -2/+38 | |
| | | | | | ||||||
* | | | | | Without MOBIKE, update remote host only if it is behind NAT | Martin Willi | 2013-03-01 | 1 | -2/+3 | |
| | | | | | ||||||
* | | | | | Merge branch 'ikev1-mm-retransmits' | Martin Willi | 2013-03-01 | 4 | -45/+55 | |
|\ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes retransmit of the last Main Mode or IKE_AUTH message, and correctly queues Main Mode messages when processing of the last message is still in progress. | |||||
| * | | | | | For IKEv1 Main Mode, use message hash to detect early retransmissions | Martin Willi | 2013-02-25 | 1 | -10/+23 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | As the message ID is zero in all Main Mode messages, it can't be used to detect if we are already processing a given message. | |||||
| * | | | | | Move initial message dropping to task manager | Martin Willi | 2013-02-25 | 3 | -19/+27 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When the last request message of the initial tunnel setup is retransmitted, we must retransmit the response instead of ignoring the request. Fixes #295. | |||||
| * | | | | | Use INIT macro to initialize IKE_SA manager entries | Martin Willi | 2013-02-25 | 1 | -17/+6 | |
| | | | | | | ||||||
* | | | | | | Merge branch 'tfc-notify' | Martin Willi | 2013-03-01 | 6 | -2/+68 | |
|\ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Introduces kernel backend features, sends ESP_TFC_PADDING_NOT_SUPPORTED if kernel does not support it. | |||||
| * | | | | | | Send ESP_TFC_PADDING_NOT_SUPPORTED if the used kernel doesn't support it | Martin Willi | 2013-03-01 | 1 | -0/+9 | |
| | | | | | | | ||||||
| * | | | | | | Indicate support for processing ESPv3 TFC padding in Netlink IPsec backend | Martin Willi | 2013-03-01 | 1 | -1/+7 | |
| | | | | | | | ||||||
| * | | | | | | Introduce "features" for the kernel backends returning kernel capabilities | Martin Willi | 2013-03-01 | 4 | -1/+52 | |
| | |/ / / / | |/| | | | | ||||||
* | | | | | | testing: Add a script to easily connect to a host via SSH | Tobias Brunner | 2013-02-28 | 1 | -0/+20 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This doesn't require any entries in /etc/hosts and the correct SSH config is used to allow password-less access. | |||||
* | | | | | | openssl: Provide AES-GCM implementation | Tobias Brunner | 2013-02-28 | 4 | -1/+312 | |
| | | | | | | ||||||
* | | | | | | Fix cleanup in crypto_tester if AEAD implementation fails | Tobias Brunner | 2013-02-28 | 1 | -1/+4 | |
| | | | | | | ||||||
* | | | | | | Order of arguments in Doxygen comment fixed | Tobias Brunner | 2013-02-28 | 2 | -2/+2 | |
| | | | | | | ||||||
* | | | | | | Fix auth_cfg_t.clone() for single-valued auth rules | Tobias Brunner | 2013-02-28 | 1 | -10/+11 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | By using the default list enumerator and adding the rules with the public add() method, clones of auth_cfg_t objects would return the values for single-valued auth rules in the wrong order (i.e. the oldest instead of the newest value was returned). Using the internal enumerator (which the comment already suggested) fixes this, but the clone will not be a full clone as it does not contain any old values for single-valued auth rules. Since these will never be used anyway, this should be fine. | |||||
* | | | | | | Trigger an updown event when destroying an IKE_SA based on INITIAL_CONTACT | Tobias Brunner | 2013-02-28 | 1 | -0/+1 | |
| |_|_|_|/ |/| | | | | | | | | | | | | | | | | | | | In other cases (i.e. when functions return DESTROY_ME) the event should already be triggered, but not in this forced situation. | |||||
* | | | | | Use SIGUSR2 for SIG_CANCEL on Android | Tobias Brunner | 2013-02-26 | 1 | -0/+4 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | SIGRTMIN is defined as 32 while sigset_t is defined as unsigned long (i.e. holds 32 signals). Hence, the signal could never be blocked. Sending the signal still canceled threads, but sometimes in situations where they shouldn't have been canceled (e.g. while holding a lock). Fixes #298. | |||||
* | | | | | Android.mk updated to latest Makefiles | Tobias Brunner | 2013-02-26 | 3 | -1/+3 | |
| |/ / / |/| | | | | | | | | | | | Fixes #300. | |||||
* | | | | Check kvm command existence in start-testing | Reto Buerki | 2013-02-22 | 1 | -1/+1 | |
| | | | | ||||||
* | | | | openssl: Disable PKCS#7/CMS when building against OpenSSL < 0.9.8g | Tobias Brunner | 2013-02-20 | 2 | -1/+5 | |
| |/ / |/| | | | | | | | | Fixes #292. | |||||
* | | | version bump to 5.0.3dr25.0.3dr2 | Andreas Steffen | 2013-02-19 | 2 | -1/+5 | |
| | | | ||||||
* | | | treat IF-M and IF-TNCCS remediation instructions/parameters in an equal way | Andreas Steffen | 2013-02-19 | 4 | -107/+204 | |
| | | | ||||||
* | | | Merge branch 'dnssec' | Tobias Brunner | 2013-02-19 | 103 | -7/+3723 | |
|\ \ \ | ||||||
| * | | | NEWS about ipseckey and unbound plugins added | Tobias Brunner | 2013-02-19 | 1 | -0/+9 | |
| | | | | ||||||
| * | | | Added ikev2/rw-dnssec scenario | Andreas Steffen | 2013-02-19 | 21 | -0/+301 | |
| | | | | ||||||
| * | | | Added ikev2/net2net-dnssec scenario | Andreas Steffen | 2013-02-19 | 17 | -0/+220 | |
| | | | | ||||||
| * | | | Configure winnetou as a DNSSEC enabled nameserver for the strongswan.org, ↵ | Andreas Steffen | 2013-02-19 | 23 | -2/+378 | |
| | | | | | | | | | | | | | | | | org, and root zones | |||||
| * | | | Build unbound and ipseckey plugins on KVM image | Andreas Steffen | 2013-02-19 | 2 | -2/+4 | |
| | | | | ||||||
| * | | | Streamlined log messages in ipseckey plugin | Andreas Steffen | 2013-02-19 | 2 | -58/+30 | |
| | | | | ||||||
| * | | | Encode RSA public keys in RFC 3110 DNSKEY format | Andreas Steffen | 2013-02-19 | 8 | -3/+155 | |
| | | | | ||||||
| * | | | Moved configuration from resolver manager to unbound plugin | Andreas Steffen | 2013-02-19 | 7 | -52/+47 | |
| | | | | | | | | | | | | | | | | Also streamlined log messages in unbound plugin. | |||||
| * | | | ipseckey: Report IPSECKEYs with invalid DNSSEC security state | Reto Guadagnini | 2013-02-19 | 1 | -2/+12 | |
| | | | | ||||||
| * | | | ipseckey: Added "enable" option for the IPSECKEY plugin to strongswan.conf | Reto Guadagnini | 2013-02-19 | 2 | -3/+19 | |
| | | | | ||||||
| * | | | Added ipseckey plugin, which provides support for public keys in IPSECKEY RRs | Reto Guadagnini | 2013-02-19 | 9 | -0/+863 | |
| | | | |