aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
| * testing: Add expect-connection calls for all tests and hostsTobias Brunner2016-06-16184-11/+236
| | | | | | | | There are some exceptions (e.g. those that use auto=start or p2pnat).
| * testing: Update test scenarios for Debian jessieTobias Brunner2016-06-16289-576/+576
| | | | | | | | | | | | | | The main difference is that ping now reports icmp_seq instead of icmp_req, so we match for icmp_.eq, which works with both releases. tcpdump now also reports port 4500 as ipsec-nat-t.
| * libimcv: Add Debian 8.5 to databaseTobias Brunner2016-06-161-3/+20
| |
| * testing: Fix posttest.dat for ikev2/rw-dnssec scenarioTobias Brunner2016-06-161-6/+6
| |
| * testing: Make sure tcpdump is actually terminated before ↵Tobias Brunner2016-06-161-11/+6
| | | | | | | | analyzing/collecting logs
| * testing: Correctly dis-/enable services with systemdTobias Brunner2016-06-162-4/+16
| |
| * testing: Install packages like the FIPS-enabled OpenSSL from a custom apt repoTobias Brunner2016-06-163-14/+28
| |
| * testing: Update base image to Debian jessieTobias Brunner2016-06-153-10/+30
| | | | | | | | | | | | | | | | | | | | | | | | | | Several packages got renamed/updated, libgcrypt was apparently installed by default previously. Since most libraries changed we have to completely rebuild all the tools installed in the root image. We currently don't provide a clean target in the recipes, and even if we did we'd have to track which base image we last built for. It's easier to just use a different build directory for each base image, at the cost of some additional disk space (if not manually cleaned). However, that's also the case when updating kernel or software versions.
| * testing: Update 4.x kernel configs to be compatible with Debian 8/systemdTobias Brunner2016-06-156-13/+130
| |
| * testing: Add root to fstabTobias Brunner2016-06-151-0/+1
| | | | | | | | This seems to be required for systemd to remount it.
| * testing: Update Apache config for newer Debian releasesTobias Brunner2016-06-159-62/+103
| | | | | | | | | | | | It is still compatible with the current release as the config in sites-available will be ignored, while conf-enabled does not exist and is not included in the main config.
| * testing: Explicitly enable RC4 in SSH server configTobias Brunner2016-06-151-0/+1
| | | | | | | | | | | | Newer OpenSSH versions disable this by default because it's unsafe. Since this is not relevant for our use case we enable it due to its speed.
| * testing: Add script to chroot into an imageTobias Brunner2016-06-151-0/+67
| | | | | | | | | | If changes are made to the base or root image the images depending on these have to be rebuilt.
| * testing: Add a patch to tnc-fhh that avoids building the tncsim packageTobias Brunner2016-06-152-1/+20
| | | | | | | | This sub-package does not build on Debian jessie.
| * testing: Don't attempt to stop services when building base imageTobias Brunner2016-06-151-2/+0
|/ | | | | | Unlike `apt-get install` in a chroot debootstrap does not seem to start the services but stopping them might cause problems if they were running outside the chroot.
* leak-detective: Make sure to actually call malloc() from calloc() hookTobias Brunner2016-06-151-3/+4
| | | | | | | | Newer versions of GCC are too "smart" and replace a call to malloc(X) followed by a call to memset(0,X) with a call co calloc(), which obviously results in an infinite loop when it does that in our own calloc() implementation. Using `volatile` for the variable storing the total size prevents the optimization and we actually call malloc().
* leak-detective: Whitelist __fprintf_chk as seen on newer systemsTobias Brunner2016-06-151-0/+1
|
* configure: Check for and explicitly link against -latomicMartin Willi2016-06-1413-12/+20
| | | | | Some C libraries, such as uClibc, require an explicit link for some atomic functions. Check for any libatomic, and explcily link it.
* testing: Fix scenarios that check /etc/resolv.confTobias Brunner2016-06-133-6/+6
|
* android: Catch exception if numbers are too large for IntegerTobias Brunner2016-06-131-1/+8
|
* android: Use non-aliased cipher identifiersTobias Brunner2016-06-131-12/+12
| | | | | | Some of these are also understood by BoringSSL. Fixes #1510.
* android: Update Gradle pluginTobias Brunner2016-06-131-1/+1
|
* android: Fix signature of get_nexthop()Tobias Brunner2016-06-131-1/+2
|
* resolve: Add refcounting for installed DNS serversTobias Brunner2016-06-101-27/+99
| | | | | | This fixes DNS server installation if make-before-break reauthentication is used as there the new SA and DNS server is installed before it then is removed again when the old IKE_SA is torn down.
* resolve: Use process abstraction when calling resolvconfTobias Brunner2016-06-101-18/+60
| | | | This allows us to capture output written to stderr/stdout.
* resolve: Make sure to clean up if calling resolvconf failedTobias Brunner2016-06-101-3/+4
| | | | | | If running resolvconf fails handle() fails release() is not called, which might leave an interface file on the system (or depending on which script called by resolvconf actually failed even the installed DNS server).
* Merge branch 'interface-for-routes'Tobias Brunner2016-06-1010-166/+256
|\ | | | | | | | | | | | | | | | | | | | | | | | | Changes how the interface for routes installed with policies is determined. In most cases we now use the interface over which we reach the other peer, not the interface on which the local address (or the source IP) is installed. However, that might be the same interface depending on the configuration (i.e. in practice there will often not be a change). Routes are not installed anymore for drop policies and for policies with protocol/port selectors. Fixes #809, #824, #1347.
| * kernel-pfroute: Return interface to reach destination from get_nexthop()Tobias Brunner2016-06-101-4/+13
| |
| * kernel-pfkey: Install routes with OUT policiesTobias Brunner2016-06-101-31/+30
| |
| * kernel-netlink: Install routes with OUT policiesTobias Brunner2016-06-101-25/+24
| | | | | | | | | | This is the direction we actually need routes in and makes the code easier to read.
| * kernel-pfkey: Don't install routes for drop policies and if protocol/ports ↵Tobias Brunner2016-06-101-3/+10
| | | | | | | | are in the selector
| * kernel-netlink: Don't install routes for drop policies and if protocol/ports ↵Tobias Brunner2016-06-101-96/+106
| | | | | | | | | | | | | | | | | | are in the selector We don't need them for drop policies and they might even mess with other routes we install. Routes for policies with protocol/ports in the selector will always be too broad and might conflict with other routes we install.
| * kernel-pfkey: Also use interface returned by get_nexthop() for IPsec policiesTobias Brunner2016-06-101-1/+3
| | | | | | | | | | An exception is if the local address is virtual, in which case we want the route to be via TUN device.
| * kernel-netlink: Also use interface returned by get_nexthop() for IPsec policiesTobias Brunner2016-06-101-1/+2
| |
| * kernel-pfkey: Use interface to next hop for shunt policiesTobias Brunner2016-06-101-2/+3
| |
| * kernel-netlink: Use interface to next hop for shunt policiesTobias Brunner2016-06-101-10/+13
| | | | | | | | | | | | Using the source address to determine the interface is not correct for net-to-net shunts between two interfaces on which the host has IP addresses for each subnet.
| * kernel-netlink: Return outbound interface in get_nexthop()Tobias Brunner2016-06-101-5/+43
| |
| * kernel-net: Let get_nexthop() return an optional interface nameTobias Brunner2016-06-1010-21/+42
|/ | | | | The returned name should be the interface over which the destination address/net is reachable.
* kernel-interface: Always set `vip` if get_address_by_ts() returns successfullyTobias Brunner2016-06-101-0/+4
|
* kernel-netlink: Let only a single thread work on a specific policyTobias Brunner2016-06-101-25/+69
| | | | | | | | | | | | | Other threads are free to add/update/delete other policies. This tries to prevent race conditions caused by releasing the mutex while sending messages to the kernel. For instance, if break-before-make reauthentication is used and one thread on the responder is delayed in deleting the policies that another thread is concurrently adding for the new SA. This could have resulted in no policies being installed eventually. Fixes #1400.
* kernel-netlink: Add priority and refcount to policy logTobias Brunner2016-06-101-9/+30
|
* kernel-netlink: Consistently print mark in log messages only if setTobias Brunner2016-06-101-108/+82
|
* kernel-netlink: Provide error information for Netlink socketsTobias Brunner2016-06-103-19/+25
| | | | #1467.
* kernel-netlink: Allow definition of a custom priority calculation functionTobias Brunner2016-06-102-3/+18
|
* Merge branch 'ipsec-sa-cfg-equals'Tobias Brunner2016-06-094-3/+29
|\ | | | | | | | | | | | | Fixes the comparison of ipsec_sa_cfg_t instances in case there is padding that's not initialized to zero. Fixes #1503.
| * kernel-pfkey: Use ipsec_sa_cfg_equals()Tobias Brunner2016-06-081-1/+1
| |
| * kernel-netlink: Use ipsec_sa_cfg_equals() and compare marks properlyTobias Brunner2016-06-081-2/+3
| |
| * ipsec: Add function to compare two ipsec_sa_cfg_t instancesTobias Brunner2016-06-082-0/+25
|/ | | | | | memeq() is currently used to compare these but if there is padding that is not initialized the same for two instances the comparison fails. Using this function ensures the objects are compared correctly.
* eap-simaka-pseudonym: Properly store mappingsTobias Brunner2016-06-061-44/+38
| | | | | | | | | | | If a pseudonym changed a new entry was added to the table storing permanent identity objects (that are used as keys in the other table). However, the old mapping was not removed while replacing the mapping in the pseudonym table caused the old pseudonym to get destroyed. This eventually caused crashes when a new pseudonym had the same hash value as such a defunct entry and keys had to be compared. Fixes strongswan/strongswan#46.
* child-sa: Use non-static variable to store generated unique markTobias Brunner2016-06-061-1/+2
| | | | | | If two CHILD_SAs with mark=%unique are created concurrently they could otherwise end up with either the same mark or different marks in both directions.