Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | nm: Bump NetworkManager plugin version to 1.3.1 | Martin Willi | 2014-04-24 | 3 | -2/+8 | |
| | ||||||
* | pacman.sh now fetches Ubuntu 14.04 security updates | Andreas Steffen | 2014-04-24 | 1 | -1/+22 | |
| | ||||||
* | Merge branch 'reauth-collision' | Martin Willi | 2014-04-17 | 2 | -2/+53 | |
|\ | | | | | | | Fixes two collisions between IKE_SA re-authentication and CHILD_SA rekeying. | |||||
| * | ike: Delay actively initiated reauthentication when other exchanges in progress | Martin Willi | 2014-04-17 | 1 | -2/+47 | |
| | | | | | | | | | | If any other IKE or CHILD_SA operation takes places, we should not start initiating reauthentication to avoid any potential races. | |||||
| * | ikev2: Reject CHILD_SA creation/rekeying while deleting an IKE_SA | Martin Willi | 2014-04-17 | 1 | -0/+6 | |
|/ | | | | | | | | | | | If one peer starts reauthentication by deleting the IKE_SA, while the other starts CHILD_SA rekeying, we run in a race condition. To avoid it, temporarily reject the rekey attempt while we are in the IKE_SA deleting state. RFC 4306/5996 is not exactly clear about this collision, but it should be safe to reject CHILD_SA rekeying during this stage, as the reauth will re-trigger the CHILD_SA. For non-rekeying CHILD_SA creations, it's up to the peer to retry establishing the CHILD_SA on the reauthenticated IKE_SA. | |||||
* | ikev2: Apply extensions and conditions before starting rekeying | Martin Willi | 2014-04-17 | 1 | -0/+6 | |
| | | | | | | The extensions and conditions apply to the rekeyed IKE_SA as well, so we should migrate them. Especially when using algorithms from private space, we need EXT_STRONGSWAN to properly select these algorithms during IKE rekeying. | |||||
* | ikev2: Add inherit_pre() to apply config and hosts before IKE_SA rekeying | Martin Willi | 2014-04-17 | 4 | -22/+30 | |
| | ||||||
* | ikev1: Add an option to accept unencrypted ID/HASH payloads | Martin Willi | 2014-04-17 | 2 | -1/+35 | |
| | | | | | | | | | Even in Main Mode, some Sonicwall boxes seem to send ID/HASH payloads in unencrypted form, probably to allow PSK lookup based on the ID payloads. We by default reject that, but accept it if the charon.accept_unencrypted_mainmode_messages option is set in strongswan.conf. Initial patch courtesy of Paul Stewart. | |||||
* | ikev2: Fix reauthentication if peer assigns a different virtual IP | Tobias Brunner | 2014-04-15 | 1 | -1/+1 | |
| | | | | | | | | | | | | | | | | | Before this change a reqid set on the create_child_t task was used as indicator of the CHILD_SA being rekeyed. Only if that was not the case would the local traffic selector be changed to 0.0.0.0/0|::/0 (as we don't know which virtual IP the gateway will eventually assign). On the other hand, in case of a rekeying the VIP is expected to remain the same, so the local TS would simply equal the VIP. Since c949a4d5016e33c5 reauthenticated CHILD_SAs also have the reqid set. Which meant that the local TS would contain the previously assigned VIP, basically rendering the gateway unable to assign a different VIP to the client as the resulting TS would not match the client's proposal anymore. Fixes #553. | |||||
* | Added NEWS for 5.2.0dr15.2.0dr1 | Andreas Steffen | 2014-04-15 | 1 | -0/+12 | |
| | ||||||
* | Handle tag separators | Andreas Steffen | 2014-04-15 | 2 | -13/+16 | |
| | ||||||
* | Renewed expired user certificate | Andreas Steffen | 2014-04-15 | 7 | -49/+75 | |
| | ||||||
* | Updated SWID scenarios | Andreas Steffen | 2014-04-15 | 6 | -4/+18 | |
| | ||||||
* | swid_generator software-id does not generate empty lines any more | Andreas Steffen | 2014-04-15 | 1 | -5/+0 | |
| | ||||||
* | Added result information to TPMRA workitems | Andreas Steffen | 2014-04-15 | 8 | -62/+94 | |
| | | | | On the occasion got rid of complicated functional component stuff | |||||
* | Indicate IMV in assessment log statement | Andreas Steffen | 2014-04-15 | 1 | -4/+14 | |
| | ||||||
* | Implemented segmented SWID tag attributes on IMV side | Andreas Steffen | 2014-04-15 | 58 | -71/+178 | |
| | ||||||
* | Use python-based swidGenerator to generated SWID tags | Andreas Steffen | 2014-04-15 | 38 | -232/+717 | |
| | ||||||
* | Updated imv database templates | Andreas Steffen | 2014-04-15 | 2 | -14/+15 | |
| | ||||||
* | Optimized PTS measurements | Andreas Steffen | 2014-04-15 | 12 | -294/+132 | |
| | ||||||
* | Use cached pid for product-based package access | Andreas Steffen | 2014-04-15 | 2 | -40/+17 | |
| | ||||||
* | Make Attestation IMV independent of OS IMV | Andreas Steffen | 2014-04-15 | 27 | -52/+446 | |
| | ||||||
* | Separated IMV session management from IMV policy database | Andreas Steffen | 2014-04-15 | 38 | -1343/+1786 | |
| | ||||||
* | Renamed the AIK public key parameter to imc-attestation.aik_pubkey | Andreas Steffen | 2014-04-15 | 2 | -2/+2 | |
| | ||||||
* | Implemented configurable Device ID in OS IMC | Andreas Steffen | 2014-04-15 | 2 | -11/+97 | |
| | ||||||
* | Version bump to 5.2.0dr1 | Andreas Steffen | 2014-04-15 | 1 | -1/+1 | |
| | ||||||
* | Version bump to 5.1.35.1.3 | Andreas Steffen | 2014-04-14 | 1 | -1/+1 | |
| | ||||||
* | NEWS: Added info about CVE-2014-2338 | Tobias Brunner | 2014-04-14 | 1 | -0/+6 | |
| | ||||||
* | ikev2: Reject CREATE_CHILD_SA exchange on unestablished IKE_SAs | Martin Willi | 2014-04-14 | 1 | -0/+9 | |
| | | | | | | | Prevents a responder peer to trick us into established state by starting IKE_SA rekeying before the IKE_SA has been authenticated during IKE_AUTH. Fixes CVE-2014-2338. | |||||
* | eap-mschapv2: Fix potential leaks in case of invalid messages from servers | Tobias Brunner | 2014-04-09 | 1 | -0/+4 | |
| | ||||||
* | pts: Make sure the complete AIK blob has been read | Tobias Brunner | 2014-04-09 | 1 | -1/+2 | |
| | ||||||
* | attr: Don't shift the 32-bit netmask by 32 | Tobias Brunner | 2014-04-09 | 1 | -3/+6 | |
| | | | | | | | | | | This is undefined behavior as per the C99 standard (sentence 1185): "If the value of the right operand is negative or is greater or equal to the width of the promoted left operand, the behavior is undefined." Apparently shifts may be done modulo the width on some platforms so a shift by 32 would not shift at all. | |||||
* | nm: Fix NULL-pointer dereference when handling TUN device failure | Tobias Brunner | 2014-04-09 | 1 | -1/+0 | |
| | ||||||
* | x509: Don't include authKeyIdentifier in self-signed certificates | Tobias Brunner | 2014-04-09 | 1 | -1/+1 | |
| | | | | | As the comment indicates this was the intention in d7be2906433a7dcfefc1fd732587865688dbfe1b all along. | |||||
* | x509: Initialize certs when building optionalSignature for OCSP requests | Tobias Brunner | 2014-04-09 | 1 | -1/+1 | |
| | ||||||
* | stroke: Fix memory leak when printing unknown AC group OIDs | Tobias Brunner | 2014-04-09 | 1 | -0/+1 | |
| | ||||||
* | pki: Fix memory leak when printing unknown AC group OIDs | Tobias Brunner | 2014-04-09 | 1 | -0/+1 | |
| | ||||||
* | pki: Removed extra continue statement | Tobias Brunner | 2014-04-09 | 1 | -1/+0 | |
| | ||||||
* | Added support for msSmartcardLogon EKU | Andreas Steffen | 2014-04-08 | 6 | -16/+37 | |
| | ||||||
* | Added some more OIDs | Andreas Steffen | 2014-04-08 | 1 | -1/+20 | |
| | ||||||
* | Initialize m1 to suppress compiler warning | Andreas Steffen | 2014-04-07 | 1 | -1/+1 | |
| | ||||||
* | Fixed another dirname/basename refactoring bug. | Andreas Steffen | 2014-04-07 | 1 | -1/+3 | |
| | | | | file was freed before use. | |||||
* | Fixed dirname/basename refactoring bug. | Andreas Steffen | 2014-04-07 | 1 | -11/+10 | |
| | | | | Variables used in a database query have to be kept until the end of the enumeration | |||||
* | Added SHA3 OIDs | Andreas Steffen | 2014-04-04 | 1 | -6/+12 | |
| | ||||||
* | Fixed pretest script in tnc/tnccs-20-pt-tls scenario | Andreas Steffen | 2014-04-04 | 1 | -1/+1 | |
| | ||||||
* | ike-cfg: Properly compare IKE proposals for equality5.1.3rc1 | Tobias Brunner | 2014-04-03 | 1 | -1/+1 | |
| | ||||||
* | leak-detective: LEAK_DETECTIVE_DISABLE completely disables LD | Tobias Brunner | 2014-04-03 | 3 | -17/+23 | |
| | | | | | If lib->leak_detective is non-null some code parts (e.g. the plugin loader) assume LD is actually used. | |||||
* | testing: Run 'conntrack -F' before all test scenarios | Tobias Brunner | 2014-04-02 | 28 | -41/+14 | |
| | | | | This prevents failures due to remaining conntrack entries. | |||||
* | unit-tests: Verify two bytes at once when testing chunk_clear() | Tobias Brunner | 2014-04-02 | 1 | -3/+6 | |
| | | | | | This reduces the chances of arbitrary test failures if the memory area already got overwritten. | |||||
* | Merge branch 'tls-unit-tests' | Martin Willi | 2014-04-01 | 24 | -38/+988 | |
|\ | | | | | | | | | | | Add some initial unit-tests to libtls, testing all supported cipher suites against self, both with and without client authentication, for all supported TLS versions. |