Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Version bump to 5.3.5 | Andreas Steffen | 2015-11-26 | 1 | -1/+1 | |
| | ||||||
* | testing: Updated expired mars.strongswan.org certificate | Andreas Steffen | 2015-11-26 | 13 | -168/+195 | |
| | ||||||
* | travis: Enable OS X build | Tobias Brunner | 2015-11-23 | 2 | -5/+43 | |
| | ||||||
* | sigwaitinfo() may fail with EINTR if interrupted by an unblocked signal not ↵ | Tobias Brunner | 2015-11-23 | 9 | -32/+35 | |
| | | | | | | in the set Fixes #1213. | |||||
* | kernel-pfkey: Enable ENCR_CAMELLIA_CBC when it's available | Tobias Brunner | 2015-11-23 | 1 | -0/+3 | |
| | | | | Fixes #1214. | |||||
* | man: Update description of the actions performed for different dpdaction values | Tobias Brunner | 2015-11-18 | 1 | -7/+8 | |
| | | | | | For instance, charon does not unroute `auto=route` connections with `dpdaction=clear`. | |||||
* | utils: Use the more low-level __NR_ prefix to refer to the syscall number | Tobias Brunner | 2015-11-17 | 1 | -1/+1 | |
| | | | | The __NR_ constants are also defined in the Android headers. | |||||
* | eap-radius: Add ability to configure RADIUS retransmission behavior | Thom Troy | 2015-11-17 | 7 | -18/+205 | |
| | | | | Closes strongswan/strongswan#19. | |||||
* | Version bump to 5.4.0dr1 | Andreas Steffen | 2015-11-16 | 1 | -1/+1 | |
| | ||||||
* | Version bump to 5.3.45.3.4 | Andreas Steffen | 2015-11-16 | 1 | -1/+1 | |
| | ||||||
* | NEWS: Add info about CVE-2015-8023 | Tobias Brunner | 2015-11-16 | 1 | -1/+6 | |
| | ||||||
* | eap-mschapv2: Keep internal state to prevent authentication from succeeding ↵ | Tobias Brunner | 2015-11-16 | 1 | -24/+67 | |
| | | | | | | | | | prematurely We can't allow a client to send us MSCHAPV2_SUCCESS messages before it was authenticated successfully. Fixes CVE-2015-8023. | |||||
* | android: Suppress compiler warnings about missing field initializers | Tobias Brunner | 2015-11-13 | 1 | -0/+1 | |
| | | | | | Triggered by -Wextra for many INIT usages where we only partially initialize a struct. | |||||
* | utils: Provide a fallback for sigwaitinfo() if needed | Tobias Brunner | 2015-11-13 | 4 | -31/+37 | |
| | | | | | Apparently, not available on Mac OS X 10.10 Yosemite. We don't provide this on Windows. | |||||
* | testing: Error messages of curl plugin have changed5.3.4rc1 | Andreas Steffen | 2015-11-13 | 3 | -4/+4 | |
| | ||||||
* | testing: Fixed another timing issue | Andreas Steffen | 2015-11-13 | 1 | -1/+1 | |
| | ||||||
* | Version bump to 5.3.4rc1 | Andreas Steffen | 2015-11-13 | 1 | -1/+1 | |
| | ||||||
* | init: Make sure basic networking is up in systemd unit | Tobias Brunner | 2015-11-13 | 1 | -1/+1 | |
| | | | | | | Connections with auto=route might otherwise not work. References #1188. | |||||
* | vici: Attribute certificates are not trusted | Tobias Brunner | 2015-11-12 | 1 | -1/+3 | |
| | ||||||
* | vici: Properly add CRLs to the credential set | Tobias Brunner | 2015-11-12 | 1 | -2/+8 | |
| | | | | add_crl() ensures that old CLRs are not stored in the credential set. | |||||
* | mode-config: Reassign migrated virtual IP if client requests %any | Tobias Brunner | 2015-11-12 | 1 | -1/+3 | |
| | | | | | | | | | If we mistakenly detect a new IKE_SA as a reauthentication the client won't request the previous virtual IP, but since we already migrated it we already triggered the assign_vips() hook, so we should reassign the migrated virtual IP. Fixes #1152. | |||||
* | revocation: Allow CRLs to be encoded in PEM format | Tobias Brunner | 2015-11-12 | 1 | -1/+1 | |
| | | | | | | | | | | Since the textual representation for a CRL is now standardized in RFC 7468 one could argue that we should accept that too, even though RFC 5280 explicitly demands CRLs fetched via HTTP/FTP to be in DER format. But in particular for file URIs enforcing that seems inconvenient. Fixes #1203. | |||||
* | curl: Be less strict when considering status codes as errors | Tobias Brunner | 2015-11-12 | 1 | -3/+3 | |
| | | | | | | | For file:// URIs the code is 0 on success. We now do the same libcurl would do with CURLOPT_FAILONERROR enabled. Fixes #1203. | |||||
* | eap-radius: Compare address family when handing out virtual IPs | Tobias Brunner | 2015-11-12 | 1 | -6/+26 | |
| | | | | | | | This also ensures that the actually released virtual IP is removed from the list of claimed IPs. Fixes #1199. | |||||
* | Merge branch 'eap-mschapv2-eap-identity' | Tobias Brunner | 2015-11-12 | 2 | -6/+24 | |
|\ | | | | | | | | | | | | | | | | | | | | | | | This replaces the EAP-Identity with the EAP-MSCHAPv2 username, which ensures the client is known with an authenticated identity. Previously a client with a valid username could use a different identity (e.g. the name of a different user) in the EAP-Identity exchange. Since we use the EAP-Identity for uniqueness checks etc. this could be problematic. The EAP-MSCHAPv2 username is now explicitly logged if it is different from the EAP-Identity (or IKE identity). Fixes #1182. | |||||
| * | eap-mschapv2: Report username if different from EAP-Identity (or IKE identity) | Tobias Brunner | 2015-11-12 | 1 | -1/+4 | |
| | | ||||||
| * | eap-mschapv2: Provide EAP-MSCHAPv2 username as EAP-Identity | Tobias Brunner | 2015-11-12 | 1 | -2/+17 | |
| | | ||||||
| * | auth-cfg: Prefer merged rules over existing ones when moving them | Tobias Brunner | 2015-11-12 | 1 | -3/+3 | |
|/ | | | | | | This is particularly important for single valued rules (e.g. identities). When copying values this is already handled correctly by the enumerator and add(). | |||||
* | android: Add some (older) unit tests | Tobias Brunner | 2015-11-12 | 3 | -0/+381 | |
| | ||||||
* | android: Properly handle shorter types in BufferedByteWriter | Tobias Brunner | 2015-11-12 | 1 | -0/+86 | |
| | | | | | | | | In Java all integer types are signed, when a negative integer is casted to a larger type (e.g. int to long) then due to sign extension the upper bytes are not 0. So writing that value to a byte array does not produce the expected result. By overloading the putX() methods we make sure to upcast the values correctly. | |||||
* | android: Migrate to the Gradle build system | Tobias Brunner | 2015-11-12 | 139 | -71/+327 | |
| | | | | | This uses a manual way to trigger the NDK build (the default with on-the-fly Android.mk files does not work for us). | |||||
* | android: Provide a fallback for sigwaitinfo() | Tobias Brunner | 2015-11-12 | 1 | -1/+29 | |
| | ||||||
* | android: Replace AndroidConfigLocal.h with a header in utils/compat | Tobias Brunner | 2015-11-12 | 4 | -5/+16 | |
| | ||||||
* | android: Fix build after updating Linux headers | Tobias Brunner | 2015-11-12 | 3 | -3/+0 | |
| | | | | | | | | Since we don't use the kernel-netlink plugin anymore and the headers in the NDK are reasonably recent, we don't need this anymore (at least when building the app). Fixes #1172. | |||||
* | Merge branch 'tkm-spi-label' | Tobias Brunner | 2015-11-11 | 9 | -22/+279 | |
|\ | | | | | | | | | Adds the charon-tkm.spi_label and charon-tkm.spi_mask options to encode a specific value/label in otherwise randomly generated IKE SPIs. | |||||
| * | charon-tkm: Register SPI generator callback | Adrian-Ken Rueegsegger | 2015-11-11 | 1 | -0/+4 | |
| | | | | | | | | Set get_spi callback of IKE SA manager to TKM-specific implementation. | |||||
| * | charon-tkm: Implement SPI generator | Adrian-Ken Rueegsegger | 2015-11-11 | 2 | -0/+134 | |
| | | | | | | | | | | The get_spi callback returns a random SPI with a label encoded according to the spi_label and spi_mask parameters read from the strongswan.conf. | |||||
| * | settings: Add settings_value_as_uint64() helper function | Tobias Brunner | 2015-11-11 | 3 | -0/+58 | |
| | | ||||||
| * | ike-sa-manager: Allow plugins to provide IKE SPIs via a callback | Tobias Brunner | 2015-11-11 | 2 | -11/+54 | |
| | | | | | | | | | | Plugins must depend on `libcharon-sa-managers` to ensure the manager exists. | |||||
| * | libcharon: Publish IKE_SA/CHILD_SA managers as custom plugin feature | Tobias Brunner | 2015-11-11 | 1 | -11/+29 | |
|/ | ||||||
* | ikev1: Also use message hashes for Quick Mode for the early retransmission check | Tobias Brunner | 2015-11-11 | 1 | -4/+8 | |
| | | | | | | | | | | We already did so during Phase 1 but because all three Quick Mode message have the same message ID we occasionally dropped the third message as retransmit, so we do it there too. For INFORMATIONAL and TRANSACTION exchanges we don't expect more than one inbound message with the same message ID so we still use them there. Fixes #1198. | |||||
* | testing: Check for leases in swanctl/ip-pool scenario | Andreas Steffen | 2015-11-11 | 1 | -0/+2 | |
| | ||||||
* | Version bump to 5.3.4dr35.3.4dr3 | Andreas Steffen | 2015-11-10 | 1 | -1/+1 | |
| | ||||||
* | testing: Fixed some more timing issues | Andreas Steffen | 2015-11-10 | 10 | -8/+10 | |
| | ||||||
* | kernel-netlink: Allow IPsec policies to replace shunt policies | Tobias Brunner | 2015-11-10 | 1 | -3/+3 | |
| | | | | | Shunt policies don't have a reqid set, so we allow unequal reqids in this particular case (i.e. if one of the reqids is 0). | |||||
* | kernel-pfkey: Make absolutely sure we always delete the right policy cache entry | Tobias Brunner | 2015-11-10 | 1 | -3/+8 | |
| | ||||||
* | kernel-netlink: Make absolutely sure we always delete the right policy cache ↵ | Tobias Brunner | 2015-11-10 | 1 | -2/+9 | |
| | | | | entry | |||||
* | kernel-interface: Pass the same data to del_policy() that was passed to ↵ | Tobias Brunner | 2015-11-10 | 12 | -150/+162 | |
| | | | | | | | add_policy() The additional data can be helpful to identify the exact policy to delete. | |||||
* | kernel-netlink: Remove the unused policy_history flag | Tobias Brunner | 2015-11-10 | 1 | -41/+20 | |
| | | | | This was used with pluto, which had its own policy tracking. | |||||
* | kernel-interface: Return bool for kernel interface registration | Thomas Egerer | 2015-11-10 | 4 | -20/+40 | |
| | | | | | | | | If the (un)registering of a kernel interface (net or ipsec) fails, the plugin loader will never know, since the appropriate functions always returns TRUE. By making the (un)register functions return a boolean value, the loader can detect a failure during initializing the kernel interface and abort charon startup if desired. |