| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|\
| |
| |
| |
| |
| |
| | |
Adds a new plugin that automatically installs and updates bypass policies
for locally attached subnets. This is useful for laptops etc. that are
used in different networks and prefer maintaining access to local hosts
(e.g. network printers or NAS) while connected to a VPN.
|
| | |
|
| |
| |
| |
| | |
The config can also be reloaded by sending a SIGHUP to charon.
|
| |
| |
| |
| |
| | |
Currently, only the kernel-netlink plugin supports this, the others will
just ignore it.
|
| | |
|
| | |
|
| |
| |
| |
| | |
subnets
|
| | |
|
|/ |
|
|
|
|
| |
Same as the change in the kernel-netlink plugin.
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
While trap and regular policies now often look the same (mainly because
reqids are kept constant) trap policies still need to have a lower priority
than regular policies to handle unroute/route correctly if e.g. IPComp
is used or the mode changes. But if we use a completely different
priority range that's lower than that of regular policies it is not possible
to install overlapping trap policies. By differentiating trap from
regular policies via the priority's LSB this issue is avoided while
still maintaining the proper ordering of trap and regular policies.
Fixes #1243.
|
| |
|
|
|
|
| |
This simplifies implementing a custom keymat_v1_t.
|
|
|
|
| |
Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com>
|
|
|
|
| |
Closes strongswan/strongswan#62.
|
| |
|
|
|
|
| |
Courtesy of Yick Xie.
|
| |
|
|
|
|
| |
Fixes #2238.
|
|
|
|
| |
This option is actually module-specific.
|
|
|
|
|
|
| |
Such an identity won't equal an actual peer's identity resulting in
sending an INITIAL_CONTACT notify even if there might be an existing
IKE_SA.
|
|
|
|
|
|
|
|
| |
If charon.prefer_configured_proposals is disabled select() is called on
the received proposal. This incorrectly set the SPI to 0 as the
configured proposal has no SPI set.
Fixes #2190.
|
|
|
|
|
|
|
| |
The Optimistic Duplicate Address Detection (DAD) seems to fail in some
cases (`dadfailed` in `ip addr`) rendering the virtual IP address unusable.
Fixes #2183.
|
|
|
|
|
|
|
|
| |
This implements rule 6 of RFC 6724 using the default priority table,
so that e.g. global addresses are preferred over ULAs (which also have
global scope) when the destination is a global address.
Fixes #2138.
|
|
|
|
|
|
|
|
| |
By default, the kernel incorrectly uses an 8 byte alignment, which is
mandatory for IPv6 but prohibited for IPv4. For many algorithms this
doesn't matter but that's not the case for HMAC_SHA2_256_128.
Since 2.6.39 the kernel can be explicitly configured to use a 4 byte
alignment.
|
|
|
|
| |
Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com>
|
|
|
|
|
|
|
| |
Picky kernels might otherwise reject our messages as RFC 2367 explicitly
mandates this.
Fixes #2212.
|
|
|
|
| |
than the destination
|
|
|
|
| |
Fixes #2172.
|
|
|
|
| |
Fixes #2118.
|
|
|
|
|
|
|
| |
Otherwise, we'd end up with an empty TS list, which is not valid.
Because end->tohost is set to !end->subnets in starter the removed branch was
never used.
|
|
|
|
| |
Fixes #2205.
|
|
|
|
|
|
|
| |
This makes sure the network is "up" before connections are
loaded/initiated.
Fixes #2205.
|
|\
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Allows reloading strongswan.conf, the loggers, and the plugins in
charon-systemd by sending a SIGHUP (as already supported by charon).
Loggers are now also reloaded by VICI's `reload-settings` command (works
with both daemons).
Fixes #2222.
|
| | |
|
| |
| |
| |
| |
| | |
This way it is not necessary to pass the same values to reload the
loggers.
|
|/
|
|
| |
That is, reload strongswan.conf, the loggers and the plugins.
|
|
|
|
| |
Fixes #2146.
|
|
|
|
| |
Fixes #1192.
|
|
|
|
| |
Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com>
|
|\
| |
| |
| | |
Adds a VPN profile import feature.
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
The file format is documented on the wiki.
URLs to .sswan files may be intercepted and downloaded files with a media
type of application/vnd.strongswan.profile may also be opened (the file
extension doesn't matter in that case). Whether downloaded files for which
the media type is not correct but the extension is .sswan can be opened
depends on the app that issues the Intent. For instance, from the default
Downloads app it won't work due to the content:// URLs that do not contain
the file name but when opening the downloaded file from within Chrome's
Downloads view it works as these Intents use file:// URLs, which contain
the complete file name (the latter requires a new permission).
|
| |
| |
| |
| |
| | |
This allows other components to modify the profiles and notify about
changes.
|
|/
|
|
|
|
| |
All new or edited profiles get a random UUID. We currently don't
enforce one, though. Later we might change that and use the UUID as
primary key.
|
|\
| |
| |
| |
| |
| |
| | |
Fixes an issue with the ipsec script when used with sudo.
I'd usually rebase this but the commit ID was already referenced
elsewhere.
|
|/
|
|
|
| |
The previous fallback allowed running any executable as root if executing
ipsec via sudo was allowed, by using e.g. `sudo ipsec ../../../bin/sh`.
|
|
|
|
| |
Fixes #2204.
|