Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Merge branch 'mid-sync' | Tobias Brunner | 2017-02-08 | 15 | -7/+1016 | |
|\ | | | | | | | | | | | Adds support for handling IKEV2_MESSAGE_ID_SYNC notifies as responder (usually the original initiator) as defined in RFC 6311. Some HA solutions use these notifies to set the new IKEv2 message IDs after a failover event. | |||||
| * | unit-tests: Add test cases for MID sync exchanges | Tobias Brunner | 2017-02-08 | 3 | -0/+537 | |
| | | ||||||
| * | ikev2: Ignore IKEV2_MESSAGE_ID_SYNC notifies if extension is disabled | Tobias Brunner | 2017-02-08 | 2 | -10/+37 | |
| | | | | | | | | | | | | | | | | | | | | If this is the first message by the peer, i.e. we expect MID 0, the message is not pre-processed in the task manager so we ignore it in the task. We also make sure to ignore such messages if the extension is disabled and the peer already sent us one INFORMATIONAL, e.g. a DPD (we'd otherwise consider the message with MID 0 as a retransmit). | |||||
| * | ikev2: Don't increase expected MID after handling MID sync message | Tobias Brunner | 2017-02-08 | 2 | -3/+4 | |
| | | | | | | | | | | | | | | | | If the responder never sent a message the expected MID is 0. While the sent MID (M1) SHOULD be increased beyond the known value, it's not necessarily the case. Since M2 - 1 would then equal UINT_MAX setting that MID would get ignored and while we'd return 0 in the notify we'd actually expect 1 afterwards. | |||||
| * | ikev2: Don't cache response to MID sync request | Tobias Brunner | 2017-02-08 | 1 | -1/+11 | |
| | | ||||||
| * | ikev2: Accept INFORMATIONAL messages with MID 0 if used to sync MIDs | Tobias Brunner | 2017-02-08 | 1 | -3/+42 | |
| | | | | | | | | | | | | We are very picky to only allow MID 0 for these messages (while we currently don't support IPSEC_REPLAY_COUNTER_SYNC notifies we accept them). | |||||
| * | ikev2: Negotiate support for IKE message ID synchronisation during IKE_AUTH | Tobias Brunner | 2017-02-08 | 2 | -0/+12 | |
| | | ||||||
| * | ikev2: Add task to handle IKEV2_MESSAGE_ID_SYNC notifies as responder | Tobias Brunner | 2017-02-08 | 7 | -0/+343 | |
| | | ||||||
| * | ike: Publish getter for the current message ID on IKE_SA | Tobias Brunner | 2017-02-08 | 2 | -1/+19 | |
| | | ||||||
| * | ike: Add getter for the current message ID to task manager | Tobias Brunner | 2017-02-08 | 3 | -1/+23 | |
|/ | ||||||
* | Merge branch 'bypass-lan' | Tobias Brunner | 2017-02-08 | 14 | -0/+907 | |
|\ | | | | | | | | | | | | | Adds a new plugin that automatically installs and updates bypass policies for locally attached subnets. This is useful for laptops etc. that are used in different networks and prefer maintaining access to local hosts (e.g. network printers or NAS) while connected to a VPN. | |||||
| * | kernel-pfroute: Implement enumeration of local subnets | Tobias Brunner | 2017-02-08 | 1 | -0/+194 | |
| | | ||||||
| * | bypass-lan: Allow ignoring or only considering subnets of specific interfaces | Tobias Brunner | 2017-02-08 | 5 | -6/+102 | |
| | | | | | | | | The config can also be reloaded by sending a SIGHUP to charon. | |||||
| * | bypass-lan: Configure interface on bypass policy | Tobias Brunner | 2017-02-08 | 1 | -1/+6 | |
| | | | | | | | | | | Currently, only the kernel-netlink plugin supports this, the others will just ignore it. | |||||
| * | kernel-netlink: Return interface name in local subnet enumerator | Tobias Brunner | 2017-02-08 | 1 | -5/+15 | |
| | | ||||||
| * | kernel-interface: Add interface name to local subnet enumerator | Tobias Brunner | 2017-02-08 | 4 | -4/+10 | |
| | | ||||||
| * | bypass-lan: Add plugin that installs bypass policies for locally attached ↵ | Tobias Brunner | 2017-02-08 | 7 | -0/+437 | |
| | | | | | | | | subnets | |||||
| * | kernel-netlink: Implement enumerator for local subnets | Tobias Brunner | 2017-02-08 | 1 | -0/+130 | |
| | | ||||||
| * | kernel-interface: Add method to enumerate locally attached subnets | Tobias Brunner | 2017-02-08 | 3 | -0/+29 | |
|/ | ||||||
* | kernel-pfkey: Use the same priority range for trap and regular policies | Tobias Brunner | 2017-02-08 | 1 | -15/+15 | |
| | | | | Same as the change in the kernel-netlink plugin. | |||||
* | kernel-netlink: Use the same priority range for trap and regular policies | Tobias Brunner | 2017-02-08 | 1 | -14/+14 | |
| | | | | | | | | | | | | | While trap and regular policies now often look the same (mainly because reqids are kept constant) trap policies still need to have a lower priority than regular policies to handle unroute/route correctly if e.g. IPComp is used or the mode changes. But if we use a completely different priority range that's lower than that of regular policies it is not possible to install overlapping trap policies. By differentiating trap from regular policies via the priority's LSB this issue is avoided while still maintaining the proper ordering of trap and regular policies. Fixes #1243. | |||||
* | kernel-netlink: Fix spacing in log message when policy is unchanged | Tobias Brunner | 2017-02-08 | 1 | -1/+1 | |
| | ||||||
* | ikev1: Factor out IV and QM management | Tobias Brunner | 2017-02-08 | 6 | -261/+500 | |
| | | | | This simplifies implementing a custom keymat_v1_t. | |||||
* | keymat: Allow keymat to modify signature scheme(s) | Thomas Egerer | 2017-02-08 | 9 | -20/+52 | |
| | | | | Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com> | |||||
* | forecast: Mark correct port in UDP NAT-T rule | James Laird-Wah | 2017-02-08 | 1 | -1/+1 | |
| | | | | Closes strongswan/strongswan#62. | |||||
* | android: New release after adding translation for Simplified Chinese | Tobias Brunner | 2017-02-07 | 1 | -2/+2 | |
| | ||||||
* | android: Add translation for Simplified Chinese | Tobias Brunner | 2017-02-07 | 6 | -4/+180 | |
| | | | | Courtesy of Yick Xie. | |||||
* | settings: Fix purge if order differs from alphabetical order | Tobias Brunner | 2017-02-07 | 1 | -1/+1 | |
| | ||||||
* | eap-dynamic: Publish the get_auth() method of the wrapped EAP method | Tobias Brunner | 2017-02-07 | 1 | -0/+12 | |
| | | | | Fixes #2238. | |||||
* | pkcs11: Fix documentation of load_certs option | Tobias Brunner | 2017-02-06 | 1 | -2/+8 | |
| | | | | This option is actually module-specific. | |||||
* | ike-auth: Don't send INITIAL_CONTACT if remote ID contains wildcards | Tobias Brunner | 2017-02-06 | 1 | -1/+2 | |
| | | | | | | Such an identity won't equal an actual peer's identity resulting in sending an INITIAL_CONTACT notify even if there might be an existing IKE_SA. | |||||
* | proposal: Copy SPI and proposal number from correct proposal in select() | Tobias Brunner | 2017-02-06 | 5 | -8/+47 | |
| | | | | | | | | If charon.prefer_configured_proposals is disabled select() is called on the received proposal. This incorrectly set the SPI to 0 as the configured proposal has no SPI set. Fixes #2190. | |||||
* | kernel-netlink: Set NODAD flag for virtual IPv6 addresses | Tobias Brunner | 2017-02-06 | 1 | -10/+16 | |
| | | | | | | | The Optimistic Duplicate Address Detection (DAD) seems to fail in some cases (`dadfailed` in `ip addr`) rendering the virtual IP address unusable. Fixes #2183. | |||||
* | kernel-netlink: Prefer matching label when selecting IPv6 source addresses | Tobias Brunner | 2017-02-06 | 1 | -3/+78 | |
| | | | | | | | | This implements rule 6 of RFC 6724 using the default priority table, so that e.g. global addresses are preferred over ULAs (which also have global scope) when the destination is a global address. Fixes #2138. | |||||
* | kernel-netlink: Use correct 4 byte alignment for AH with IPv4 | Tobias Brunner | 2017-01-25 | 1 | -0/+5 | |
| | | | | | | | | By default, the kernel incorrectly uses an 8 byte alignment, which is mandatory for IPv6 but prohibited for IPv4. For many algorithms this doesn't matter but that's not the case for HMAC_SHA2_256_128. Since 2.6.39 the kernel can be explicitly configured to use a 4 byte alignment. | |||||
* | kernel-netlink: Allow change of Netlink socket receive buffer size | Thomas Egerer | 2017-01-25 | 2 | -0/+61 | |
| | | | | Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com> | |||||
* | kernel-pfkey: Set state to SADB_SASTATE_MATURE when adding/updating SAs | Tobias Brunner | 2017-01-25 | 1 | -0/+2 | |
| | | | | | | | Picky kernels might otherwise reject our messages as RFC 2367 explicitly mandates this. Fixes #2212. | |||||
* | kernel-pfroute: Don't set a gateway if it is of a different address family ↵ | Tobias Brunner | 2017-01-25 | 1 | -1/+2 | |
| | | | | than the destination | |||||
* | libipsec: Add support for AES and Camellia in CCM mode | Tobias Brunner | 2017-01-25 | 1 | -3/+16 | |
| | | | | Fixes #2172. | |||||
* | libipsec: Fix Windows build via MinGW | Tobias Brunner | 2017-01-25 | 5 | -1/+43 | |
| | | | | Fixes #2118. | |||||
* | stroke: Default to %dynamic if no valid TS are specified in left|rightsubnet | Tobias Brunner | 2017-01-25 | 1 | -57/+44 | |
| | | | | | | | Otherwise, we'd end up with an empty TS list, which is not valid. Because end->tohost is set to !end->subnets in starter the removed branch was never used. | |||||
* | init: Let systemd restart daemons if they get terminated unexpectedly | Tobias Brunner | 2017-01-25 | 2 | -0/+2 | |
| | | | | Fixes #2205. | |||||
* | init: Depend on network-online.target instead of network.target in systemd units | Tobias Brunner | 2017-01-25 | 2 | -2/+2 | |
| | | | | | | | This makes sure the network is "up" before connections are loaded/initiated. Fixes #2205. | |||||
* | Merge branch 'charon-systemd-reload-loggers' | Tobias Brunner | 2017-01-25 | 14 | -48/+101 | |
|\ | | | | | | | | | | | | | | | | | | | Allows reloading strongswan.conf, the loggers, and the plugins in charon-systemd by sending a SIGHUP (as already supported by charon). Loggers are now also reloaded by VICI's `reload-settings` command (works with both daemons). Fixes #2222. | |||||
| * | vici: Reload loggers after reloading strongswan.conf via reload-setting command | Tobias Brunner | 2017-01-25 | 1 | -0/+1 | |
| | | ||||||
| * | daemon: Use separate method to set default loggers | Tobias Brunner | 2017-01-25 | 13 | -49/+85 | |
| | | | | | | | | | | This way it is not necessary to pass the same values to reload the loggers. | |||||
| * | charon-systemd: Handle SIGHUP the same way charon does | Tobias Brunner | 2017-01-25 | 1 | -0/+16 | |
|/ | | | | That is, reload strongswan.conf, the loggers and the plugins. | |||||
* | ha: Fix assignment of IP addresses if multiple pools are defined | Tobias Brunner | 2017-01-25 | 1 | -2/+6 | |
| | | | | Fixes #2146. | |||||
* | ha: Delete passive IKE_SA on other node after half-open timeout | Tobias Brunner | 2017-01-25 | 1 | -0/+15 | |
| | | | | Fixes #1192. | |||||
* | kernel-netlink: Return const pointer from lookup_algorithm() | Thomas Egerer | 2017-01-23 | 1 | -3/+4 | |
| | | | | Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com> |