aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* testing: attr-sql is a charon plugin5.4.0dr8Andreas Steffen2016-03-0511-42/+10
|
* testing: Added swanctl/rw-psk-ikev1 scenarioAndreas Steffen2016-03-0511-0/+271
|
* testing: Include IKE port information in evaltestsAndreas Steffen2016-03-0568-238/+221
|
* Version bump to 5.4.0dr8Andreas Steffen2016-03-041-1/+1
|
* ike-sa-manager: Log some additional details like SPIs when checking out SAsTobias Brunner2016-03-041-7/+16
|
* smp: Correctly return IKE SPIs stored in network orderTobias Brunner2016-03-041-4/+4
|
* vici: Correctly return IKE SPIs stored in network orderTobias Brunner2016-03-041-2/+4
|
* stroke: Correctly print IKE SPIs stored in network orderTobias Brunner2016-03-041-2/+4
|
* byteorder: Simplify htoun64/untoh64 functionsTobias Brunner2016-03-041-27/+0
|
* byteorder: Always define be64toh/htobe64 macrosTobias Brunner2016-03-041-20/+30
|
* Merge branch 'ike-sig-contraints'Tobias Brunner2016-03-0412-90/+316
|\ | | | | | | | | Signature scheme constraints against IKEv2 authentication may now be configured independently of constraints against trustchains.
| * NEWS: Add note about IKEv2 signature scheme constraintsTobias Brunner2016-03-041-0/+4
| |
| * swanctl: Document signature scheme constraintsTobias Brunner2016-03-041-1/+30
| |
| * vici: Add support for pubkey constraints with EAP-TLSTobias Brunner2016-03-041-0/+8
| | | | | | | | This is a feature currently supported by stroke.
| * auth-cfg: Make IKE signature schemes configurableTobias Brunner2016-03-048-46/+203
| | | | | | | | | | | | This also restores the charon.signature_authentication_constraints functionality, that is, if no explicit IKE signature schemes are configured we apply all regular signature constraints as IKE constraints.
| * ikev2: Always store signature scheme in auth-cfgTobias Brunner2016-03-041-12/+1
| | | | | | | | As we use a different rule we can always store the scheme.
| * ikev2: Diversify signature scheme ruleThomas Egerer2016-03-044-33/+72
|/ | | | | | | This allows for different signature schemes for IKE authentication and trustchain verification. Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com>
* NEWS: Document RFC 5685 supportTobias Brunner2016-03-041-0/+6
|
* Merge branch 'ike-redirect'Tobias Brunner2016-03-0450-122/+2168
|\ | | | | | | | | | | | | | | This adds support for IKEv2 redirection (RFC 5685). There is currently no default implementation of the redirect_provider_t interface provided. Plugins may implement the interface to decide if and when to redirect connecting clients. It is also possible to redirect established IKE_SAs via VICI/swanctl.
| * ike-init: Verify REDIRECT notify before processing IKE_SA_INIT messageTobias Brunner2016-03-041-7/+51
| | | | | | | | | | | | An attacker could blindly send a message with invalid nonce data (or none at all) to DoS an initiator if we just destroy the SA. To prevent this we ignore the message and wait for the one by the correct responder.
| * ikev2: Allow tasks to verify request messages before processing themTobias Brunner2016-03-041-4/+47
| |
| * ikev2: Allow tasks to verify response messages before processing themTobias Brunner2016-03-041-1/+27
| |
| * task: Add optional pre_process() methodTobias Brunner2016-03-041-1/+13
| | | | | | | | | | This will eventually allow tasks to pre-process and verify received messages.
| * testing: Add ikev2/redirect-active scenarioTobias Brunner2016-03-0420-0/+322
| |
| * ike-init: Ignore notifies related to redirects during rekeyingTobias Brunner2016-03-041-3/+13
| | | | | | | | Also don't query redirect providers in this case.
| * ike-sa: Add limit for the number of redirects within a defined time periodTobias Brunner2016-03-042-0/+54
| |
| * ike-sa: Reauthenticate to the same addresses we currently useTobias Brunner2016-03-041-2/+5
| | | | | | | | | | | | If the SA got redirected this would otherwise cause a reauthentication with the original gateway. Reestablishing the SA to the original gateway, if e.g. the new gateway is not reachable makes sense though.
| * vici: Don't redirect all SAs if no selectors are givenTobias Brunner2016-03-041-1/+1
| | | | | | | | | | This avoid confusion and redirecting all SAs can now easily be done explicitly (e.g. peer_ip=0.0.0.0/0).
| * vici: Match subnets and ranges against peer IP in redirect commandTobias Brunner2016-03-043-13/+43
| |
| * vici: Match identity with wildcards against remote ID in redirect commandTobias Brunner2016-03-043-6/+10
| |
| * swanctl: Add --redirect commandTobias Brunner2016-03-044-1/+138
| |
| * vici: Add redirect commandTobias Brunner2016-03-045-0/+150
| | | | | | | | | | This allows redirecting IKE_SAs by multiple different selectors, if none are given all SAs are redirected.
| * redirect-job: Add job to redirect an active IKE_SATobias Brunner2016-03-044-0/+159
| |
| * ike-sa: Add redirect() method to actively redirect an IKE_SATobias Brunner2016-03-042-0/+50
| |
| * ike-redirect: Add task to redirect active IKE_SAsTobias Brunner2016-03-047-0/+220
| |
| * ike-auth: Handle REDIRECT notifies during IKE_AUTHTobias Brunner2016-03-041-22/+44
| |
| * ike-sa: Handle redirect requests for established SAs as reestablishmentTobias Brunner2016-03-041-82/+174
| | | | | | | | | | | | | | We handle this similar to how we do reestablishing IKE_SAs with all CHILD_SAs, which also includes the one actively queued during IKE_AUTH. To delete the old SA we use the recently added ike_reauth_complete task.
| * ike-auth: Send REDIRECT notify during IKE_AUTH if requested by providersTobias Brunner2016-03-041-27/+51
| | | | | | | | | | | | To prevent the creation of the CHILD_SA we set a condition on the IKE_SA. We also schedule a delete job in case the client does not terminate the IKE_SA (which is a SHOULD in RFC 5685).
| * ike-config: Do not assign attributes for redirected IKE_SAsTobias Brunner2016-03-041-0/+5
| |
| * child-create: Don't create CHILD_SA if the IKE_SA got redirected in IKE_AUTHTobias Brunner2016-03-041-0/+4
| |
| * ike-sa: Add a condition to mark redirected IKE_SAsTobias Brunner2016-03-041-0/+5
| |
| * ike-init: Handle REDIRECTED_FROM similar to REDIRECT_SUPPORTED as serverTobias Brunner2016-03-041-0/+17
| |
| * ike-init: Send REDIRECTED_FROM instead of REDIRECT_SUPPORTED if appropriateTobias Brunner2016-03-041-1/+19
| |
| * ike-sa: Keep track of the address of the gateway that redirected usTobias Brunner2016-03-042-1/+27
| |
| * ikev2: Add option to disable following redirects as clientTobias Brunner2016-03-043-1/+23
| |
| * ikev2: Handle REDIRECT notifies during IKE_SA_INITTobias Brunner2016-03-043-0/+64
| |
| * ike-init: Send REDIRECT notify during IKE_SA_INIT if requested by providersTobias Brunner2016-03-041-0/+17
| |
| * redirect-manager: Add helper function to create and parse REDIRECT notify dataTobias Brunner2016-03-042-11/+162
| | | | | | | | The same encoding is also used for the REDIRECT_FROM notifies.
| * redirect-manager: Verify type of returned gateway IDTobias Brunner2016-03-041-1/+12
| |
| * ike-init: Send REDIRECT_SUPPORTED as initiatorTobias Brunner2016-03-041-0/+5
| |