aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
| * vici: Document the ruby gem and add some simple examplesMartin Willi2014-10-101-0/+58
| |
| * vici: Add some simple libvici examples to the READMEMartin Willi2014-10-101-2/+116
| |
| * vici: Document the available vici command and event messagesMartin Willi2014-10-101-1/+509
| |
| * vici: Use "gem"-assisted vici ruby gem building and installationMartin Willi2014-10-105-1/+30
| |
| * configure: Add global --enable-ruby-gems and --with-rubygemdir optionsMartin Willi2014-10-101-0/+14
| | | | | | | | | | This provides the options to build and install ruby gems for components providing them, such as vici.
| * vici: Add a ruby gem providing a native vici interfaceMartin Willi2014-10-103-0/+586
| |
| * vici: Return a success result for the clear-creds commandMartin Willi2014-10-101-4/+1
| | | | | | | | | | Even if the command actually can't fail, this looks more aligned to similar commands.
| * vici: Fix message encoding type values in documentationMartin Willi2014-10-101-6/+6
|/
* ikev1: Add fragmentation support for Windows peersVolker RĂ¼melin2014-10-103-13/+58
| | | | | | | | I still think ipsec/l2tp with fragmentation support is a useful fallback option in case the Windows IKEv2 connection fails because of fragmentation problems. Tested with Windows XP, 7 and 8.1.
* eap-radius: Add option to set interval for interim accounting updatesTobias Brunner2014-10-102-1/+15
| | | | | | Any interval returned by the RADIUS server in the Access-Accept message overrides the configured interval. But it might be useful if RADIUS is only used for accounting.
* NEWS: IKEv2 fragmentation mentionedTobias Brunner2014-10-101-0/+3
|
* Merge branch 'ikev2-fragmentation'Tobias Brunner2014-10-1036-1211/+2658
|\ | | | | | | This adds support for IKEv2 fragmentation as per RFC 7383.
| * testing: Add ikev2/net2net-fragmentation scenarioTobias Brunner2014-10-109-0/+116
| |
| * testing: Update ikev1/net2net-fragmentation scenarioTobias Brunner2014-10-101-2/+2
| |
| * message: Limit maximum number of IKEv2 fragmentsTobias Brunner2014-10-101-1/+11
| | | | | | | | | | | | | | | | The maximum for IKEv1 is already 255 due to the 8-bit fragment number. With an overhead of 17 bytes (x64) per fragment and a default maximum of 10000 bytes per packet the maximum memory required is 14 kB for a fragmented message.
| * packet: Define a global default maximum size for IKE packetsTobias Brunner2014-10-105-18/+9
| |
| * message: Ensure a minimum fragment lengthTobias Brunner2014-10-101-8/+18
| |
| * ikev2: Send retransmits using the latest known addressesTobias Brunner2014-10-101-1/+3
| | | | | | | | | | | | | | For instance, if a DPD exchange is initiated by the gateway when a mobile client is roaming and it then gets a new IP address and sends an address update via MOBIKE, the DPD retransmits would still be sent to the old address and the SA would eventually get closed.
| * ikev2: Send and receive fragmented IKE messagesTobias Brunner2014-10-101-44/+169
| | | | | | | | | | If a fragmented message is retransmitted only the first packet is passed to the alert() hook.
| * ike: IKE_SA may fragment IKEv2 messagesTobias Brunner2014-10-101-1/+1
| |
| * ike: Do not cache MID of IKEv2 fragmentsTobias Brunner2014-10-101-2/+3
| | | | | | | | | | This fails if there are unencrypted payloads before an encrypted fragment payload in the first fragment.
| * message: Fragment and reassemble IKEv2 messagesTobias Brunner2014-10-102-133/+366
| |
| * message: Handle encrypted fragment payload similar to the encrypted payloadTobias Brunner2014-10-101-16/+91
| |
| * ikev2: Add encrypted fragment payloadTobias Brunner2014-10-105-12/+455
| |
| * encrypted_payload: Encrypted payload can be constructed from plaintextTobias Brunner2014-10-102-0/+38
| |
| * encrypted_payload: Expose generate() to generate the plaintextTobias Brunner2014-10-102-1/+17
| |
| * encrypted_payload: Extract some utility functionsTobias Brunner2014-10-101-74/+110
| |
| * message: Split generate() in multiple functionsTobias Brunner2014-10-101-67/+122
| |
| * ikev2: Negotiate support for IKEv2 fragmentationTobias Brunner2014-10-102-1/+24
| |
| * ikev2: Add notify for IKEv2 fragmentationTobias Brunner2014-10-102-7/+15
| |
| * ikev1: Move defragmentation to message_tTobias Brunner2014-10-103-169/+240
| |
| * ike: Move fragmentation to ike_sa_tTobias Brunner2014-10-103-62/+94
| | | | | | | | | | | | | | | | | | The message() hook on bus_t is now called exactly once before (plain) and once after fragmenting (!plain), not twice for the complete message and again for each individual fragment, as was the case in earlier iterations. For inbound messages the hook is called once for each fragment (!plain) and twice for the reassembled message.
| * message: fragment() generates message and fragments and caches themTobias Brunner2014-10-103-58/+109
| |
| * message: Make packet argument optional in generate()Tobias Brunner2014-10-101-1/+4
| |
| * ikev1: Move fragment generation to message_tTobias Brunner2014-10-105-139/+251
| |
| * ike: Rename encryption_payload to encrypted_payloadTobias Brunner2014-10-1010-102/+98
|/
* ipsec: Remove unsupported listcards and rereadgroups commandsTobias Brunner2014-10-081-10/+0
|
* ipsec: Document missing commandsTobias Brunner2014-10-081-1/+11
|
* ipsec: Update usage outputTobias Brunner2014-10-081-18/+17
|
* ipsec: Remove duplicate check for internal commandsTobias Brunner2014-10-081-4/+0
|
* ipsec: Only set PATH if it is not already setTobias Brunner2014-10-081-1/+1
| | | | | | | | | | The comment indicated this but it was always set anyway. All internal commands are called via their absolute paths, so the script only uses PATH for the uname command, but if that is not located in one of the configured directories the script will fail. Also, since the internal commands are called via their absolute paths there is no need to add the directories to PATH.
* ikev1: Fix handling of UNITY_LOAD_BALANCETobias Brunner2014-10-071-3/+3
| | | | | The re-authentication is now handled within the original IKE_SA if it has not yet been established, so we don't want to destroy it.
* ikev1: Don't queue more than one mode config or XAuth taskTobias Brunner2014-10-071-7/+22
| | | | | | | | At the time we reset an IKE_SA (e.g. when re-authenticating a not yet established SA due to a roaming event) such tasks might already be queued by one of the phase 1 tasks. If the SA is initiated again another task will get queued by the phase 1 task. This results in e.g. multiple mode config requests, which most gateways will have problems with.
* testing: Don't check for the actual number of SWID tags in PDP scenariosTobias Brunner2014-10-072-8/+8
| | | | | The number of SWID tags varies depending on the base image, but lets assume the number is in the hundreds.
* testing: Make TNC scenarios agnostic to the actual Debian versionTobias Brunner2014-10-0718-45/+52
| | | | | The scenarios will work with new or old base images as long as the version in use is included as product in the master data (src/libimcv/imv/data.sql).
* testing: Make TKM related build recipes future-proofTobias Brunner2014-10-076-24/+36
| | | | | | | | The tkm scenarios recently failed due to a segmentation fault on my host because I had an old build of the tkm library already built in the build directory. Because the stamp file was not versioned the new release was never checked out or built and charon-tkm was linked against the old version causing a segmentation fault during key derivation.
* version bump to 5.2.1rc1Andreas Steffen2014-10-061-1/+1
|
* Merge branch 'ext-auth'5.2.1dr1Martin Willi2014-10-0618-249/+1644
|\ | | | | | | | | | | Integrates the ext-auth plugin by Vyronas Tsingaras. The new child process abstraction simplifies implementation in both the new ext-auth and the existing updown plugin, and makes them available on the Windows platform.
| * NEWS: Mention new ext-auth pluginMartin Willi2014-10-061-0/+3
| |
| * ext-auth: Add an ext-auth plugin invoking an external authorization scriptMartin Willi2014-10-069-0/+512
| | | | | | | | Original patch courtesy of Vyronas Tsingaras.