| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
When requiring unique flags for CHILD_SAs, allow the configuration to
request different marks for each direction by using the %unique-dir keyword.
This is useful when different marks are desired for each direction but the
number of peers is not predefined.
An example use case is when implementing a site-to-site route-based VPN
without VTI devices.
A use of 0.0.0.0/0 - 0.0.0.0/0 traffic selectors with identical in/out marks
results in outbound traffic being wrongfully matched against the 'fwd'
policy - for which the underlay 'template' does not match - and dropped.
Using different marks for each direction avoids this issue as the 'fwd' policy
uses the 'in' mark will not match outbound traffic.
Closes strongswan/strongswan#78.
|
|
|
|
| |
\w does not match e.g. / but \S does.
|
|
|
|
|
|
|
|
| |
Initiation might later fail, of course, but we don't really
require an IP address when installing, that is, unless the remote
traffic selector is dynamic. As that would result in installing a
0.0.0.0/0 remote TS which is not ideal when a single IP is expected as
remote.
|
| |
|
| |
|
| |
|
|\
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This fixes CHILD_SA rekeying with TKM and changes how we switch to the
outbound IPsec SA with Netlink/XFRM (using SPIs on the outbound policy
instead of installing the outbound SA delayed).
For charon-tkm it changes when esa_select() and esa_reset() are called,
now with the outbound policy and the inbound SA, respectively, instead
of the outbound SA in both cases.
Also fixed is a potential traffic loss when a rekey collision is lost.
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
After a rekeying the outbound SA and policy is deleted immediately, however,
the inbound SA is not removed until a few seconds later, so delayed packets
can still be processed.
This adds a flag to get_esa_id() that specifies the location of the
given SPI.
|
| | |
|
| |
| |
| |
| |
| |
| |
| | |
This splits the SA installation also on the initiator, so we can avoid
installing the outbound SA if we lost a rekey collision, which might
have caused traffic loss depending on the timing of the DELETEs that are
sent in both directions.
|
| |
| |
| |
| | |
The output was not correct otherwise due to the reordering of commands.
|
| | |
|
| |
| |
| |
| |
| | |
Similar to the xfrmproxy-expire scenario but here the TKM host is the
responder to a rekeying.
|
| | |
|
| | |
|
| |
| |
| |
| |
| |
| |
| | |
Specifying an integer instead of YES in evaltest.dat causes the number to get
compared against the actual number of lines matching the pattern.
This may be used to count matching packets or log lines.
|
| |
| |
| |
| | |
We don't trigger it either when they are deleted individually.
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This tries to avoid packet loss during rekeying by delaying the usage of
the new outbound IKE_SA until the old one is deleted.
Note that esa_select() is a no-op in the current TKM implementation. And
the implementation also doesn't benefit from the delayed deletion of the
inbound SA as it calls esa_reset() when the outbound SA is deleted.
|
| |
| |
| |
| |
| | |
This fixes rekeying as the delayed installation of the outbound SA
caused the nonce context to be expired already.
|
| | |
|
| | |
|
| |
| |
| |
| |
| | |
This should cause the right SA to get used if there are multiple outbound
SAs and the policies are installed properly.
|
|/ |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|\
| |
| |
| | |
Build and run unit tests on AppVeyor Windows containers.
|
| |
| |
| |
| | |
This is mainly for the RNG needed for the exchange tests.
|
| |
| |
| |
| |
| | |
That's required when these are used as include paths in settings file
strings.
|
| |
| |
| |
| | |
x86_64-w64-mingw32-gcc on Windows requires this.
|
| |
| |
| |
| | |
We currently don't have an RNG in Windows builds.
|
|/
|
|
|
| |
We can't enable leak detective as it is so slow then that we run into a
timeout (60 minutes).
|
|
|
|
|
|
|
|
|
|
| |
If multiple threads want to enumerate child-cfgs and potentially lock
other locks (e.g. check out IKE_SAs) while doing so a deadlock could
be caused (as was the case with VICI configs with start_action=start).
It should also improve performance for roadwarrior connections and lots
of clients connecting concurrently.
Fixes #2374.
|
| |
|
|
|
|
| |
Otherwise this won't work if the certificate is only locally available.
|
|
|
|
|
|
|
| |
Also read from swanctl.plugins.vici.socket so we get
libstrongswan.plugins.vici.socket if it is defined.
Fixes #2372.
|
|
|
|
| |
Fixes #2371.
|
| |
|
|
|
|
|
|
|
| |
The maximum number of redirects can be limited. The functionality can also
be disabled.
Fixes #2366.
|
|
|
|
| |
References #2377.
|
|
|
|
|
|
|
| |
This prevented new listeners from receiving notifies if they joined
after another listener disconnected previously, and if they themselves
disconnected their old connection would prevent them again from getting
notifies.
|
|
|
|
|
|
|
|
|
| |
Multiple CHILD_SAs sharing the same traffic selectors (e.g. during
make-before-break reauthentication) also have the same reqid assigned.
If all matching entries are removed we could end up without entry even
though an SA exists that still uses these traffic selectors.
Fixes #2373.
|
|
|
|
|
|
|
|
| |
This way we get the log message in stroke and swanctl as last message
when establishing a connection. It's already like this for the IKE_SA
where IKE_ESTABLISHED is set after the corresponding log message.
Fixes #2364.
|
|
|
|
| |
file stats
|
| |
|
| |
|
| |
|
| |
|