aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* Add pt-tls-client to .gitignoreAndreas Steffen2013-08-152-228/+1
|
* Extract client identity and authentication type from SASL authenticationAndreas Steffen2013-08-157-9/+76
|
* Added some debug statementsAndreas Steffen2013-08-154-4/+47
|
* enabled SASL PLAIN authenticationAndreas Steffen2013-08-151-2/+2
|
* PT-TLS connection is properly terminatedAndreas Steffen2013-08-151-3/+2
|
* moved tnc_imv plugin to libtnccs thanks to recommendation callback functionAndreas Steffen2013-08-1528-130/+164
|
* Documented plugin move from libcharon to libtnccs in strongswan.confAndreas Steffen2013-08-151-15/+17
|
* Moved tnc-tnccs, tnc-imc, tnccs-11, tnccs-20 and tnccs-dynamic libcharon ↵Andreas Steffen2013-08-1573-63/+92
| | | | plugins to libtnccs
* rapid PT-TLS AR/PDP prototypeAndreas Steffen2013-08-1514-65/+769
|
* Add PT-TLS interface to strongSwan PDPAndreas Steffen2013-08-155-42/+74
|
* ikev1: Fix calculation of the number of fragmentsTobias Brunner2013-08-151-1/+1
| | | | The old code resulted in too few fragments in some cases.
* ikev1: When sending fragments, use ports to decide if a non-ESP marker is addedTobias Brunner2013-08-151-6/+8
| | | | | This is same same logic used by sender and might apply in some cases (e.g. when initiating to port 4500).
* ikev2: Fix segfault when reestablishing CHILD_SAs due to ↵Tobias Brunner2013-08-131-3/+4
| | | | | | closeaction=restart|hold This regression was introduced with c949a4d5.
* libipsec: Don't limit traditional algorithms to AES and SHA1/2Tobias Brunner2013-08-121-25/+7
| | | | Closes #377.
* kernel-netlink,pfroute: Properly update address flag within ROAM_DELAYTobias Brunner2013-08-122-2/+2
| | | | | | | 77d4a02 and 55da01f only updated the address flag when a job was created, which obviously had the same limitation as the old code. Fixes #374.
* kernel-pfroute: Implement roam event handling like in the kernel-netlink pluginTobias Brunner2013-08-121-13/+36
| | | | | There was no proper locking and the issue regarding the address flag also existed.
* kernel-netlink: Ensure address changes are not missed in roam eventsTobias Brunner2013-08-121-4/+15
| | | | | | | | | | | | | | | | If multiple roam events are triggered within ROAM_DELAY, only one job is created. The old code set the address flag to the value of the last triggering call. So if a route change followed an address change within ROAM_DELAY the address change was missed by the upper layers, e.g. causing it not to update the list of addresses via MOBIKE. The new code now keeps the state of the address flag until the job is actually executed, which still has some issues. For instance, if an address disappears and reappears within ROAM_RELAY, the flag would not have to be set to TRUE. So address updates might occasionally get triggered where none would actually be required. Fixes #374.
* backtrace: rename clone() method clashing with system callMartin Willi2013-08-091-2/+2
| | | | Fixes #376.
* updown: remove description of unsupported PLUTO_ variablesMartin Willi2013-08-083-59/+6
| | | | These have been set by pluto, but are not by charons updown plugin.
* scripts: link against librt only if requiredMartin Willi2013-08-081-3/+3
| | | | With glibc, this seems to be the case for 2.17 and older versions only.
* scripts: link malloc_speed against librtMartin Willi2013-08-081-1/+1
|
* strongswan.conf: Add note about reserved threadsTobias Brunner2013-08-071-1/+5
|
* tnc-pdp: Initialize struct msghdr properly when reading RADIUS messages5.1.0Tobias Brunner2013-07-311-10/+10
| | | | | Before this e.g. msg_controllen was not initialized properly which could cause invalid reads.
* NEWS: Add info about CVE-2013-5018Tobias Brunner2013-07-311-1/+6
|
* whitelist: Fix compilation on FreeBSDTobias Brunner2013-07-311-0/+2
|
* host: Properly initialize struct sockaddr_in[6] when parsing stringsTobias Brunner2013-07-311-0/+2
| | | | | Otherwise struct members like sin6_flowinfo or sin6_scope_id might be set to bogus values.
* asn1: Fix handling of invalid ASN.1 length in is_asn1()Tobias Brunner2013-07-311-0/+5
| | | | Fixes CVE-2013-5018.
* Callback job is not needed any moreAndreas Steffen2013-07-311-4/+0
|
* charon-xpc: load missing ctr/ccm/gcm pluginsMartin Willi2013-07-311-2/+3
|
* charon-xpc: use kernel-libipsec instead of kernel-pfkeyMartin Willi2013-07-313-4/+9
|
* charon-xpc: fix TS getting after changing CHILD_SA APIMartin Willi2013-07-311-2/+6
|
* keychain: be less verbose when loading certificatesMartin Willi2013-07-311-2/+5
|
* receiver: Avoid cloning packet data when verifying COOKIE payloadsTobias Brunner2013-07-291-5/+1
| | | | | | | Besides being more efficient this removes a memory leak that occurred when a COOKIE payload was successfully verified. Fixes #369.
* unity: Handle multi-valued UNITY_SPLIT_INCLUDE/UNITY_LOCAL_LAN attributesTobias Brunner2013-07-291-50/+97
| | | | | | | Cisco devices seem to add 6 bytes of padding between each address/mask pair. Fixes #366.
* version bump to 5.0.1Andreas Steffen2013-07-291-1/+1
|
* tnc-pdp now uses watcher_tAndreas Steffen2013-07-291-92/+63
|
* Updated PTS database scheme to new workitems modelAndreas Steffen2013-07-291-39/+127
|
* ikev2: Only schedule half-open-timeout delete job after successfully ↵Tobias Brunner2013-07-291-8/+16
| | | | | | | handling IKE_SA_INIT We want to avoid this allocation if the initial message is invalid (e.g. if the message ID is != 0).
* NEWS: mention xauth-radius backend in eap-radius pluginMartin Willi2013-07-291-0/+6
|
* testing: enforce xauth-eap in ikev1/xauth-rsa-eap-md5-radiusMartin Willi2013-07-291-1/+1
| | | | | As eap-radius now provides its own XAuth backend and eap-radius is loaded before xauth-eap, we have to enforce the exact XAuth backend to use.
* Merge branch 'xauth-radius'Martin Willi2013-07-2932-100/+740
|\ | | | | | | | | | | | | Implements verification of XAuth credentials using simple RADIUS User-Name and (encrypted) User-Password attributes. The XAuth backend is implemented in the eap-radius plugin, reusing all existing infrastructure and features found in that plugin, including RADIUS accounting.
| * testing: add a testcase for plain XAuth RADIUS authenticationMartin Willi2013-07-2916-0/+209
| |
| * charon-cmd: add --eap-identity and --xauth-username optionsMartin Willi2013-07-294-0/+37
| |
| * eap-radius: do RADIUS/IKE attribute forwarding in XAuth backendMartin Willi2013-07-292-1/+5
| |
| * eap-radius: support plain XAuth RADIUS authentication using User-PasswordMartin Willi2013-07-294-0/+253
| |
| * libradius: support encryption of User-Password attributesMartin Willi2013-07-291-0/+27
| |
| * utils: add round_up/down() helper functionsMartin Willi2013-07-292-0/+49
| |
| * libradius: refactor generic RADIUS en-/decryption function to a message methodMartin Willi2013-07-293-44/+85
| |
| * eap-radius: export function to build common attributes of Access-RequestMartin Willi2013-07-292-24/+39
| |
| * eap-radius: export function to process common attributes of Access-AcceptMartin Willi2013-07-292-31/+36
|/