aboutsummaryrefslogtreecommitdiffstats
path: root/conf/plugins
Commit message (Collapse)AuthorAgeFilesLines
* swid-gen: Share SWID generator between sw-collector, imc-swima and imc-swidAndreas Steffen2017-08-042-6/+0
|
* curl: Enable following redirectsTobias Brunner2017-07-271-0/+3
| | | | | | | The maximum number of redirects can be limited. The functionality can also be disabled. Fixes #2366.
* imv-swima: Implemented SW event processingAndreas Steffen2017-07-081-2/+2
|
* imv-swima: Created SWIMA IMV pluginAndreas Steffen2017-07-081-0/+5
|
* imc-swima: Created SWIMA IMC pluginAndreas Steffen2017-07-081-0/+19
|
* eap-aka-3gpp: Add plugin that implements 3GPP MILENAGE algorithm in softwareTobias Brunner2017-07-053-1/+7
| | | | | | | | | | This is similar to the eap-aka-3gpp2 plugin. K (optionally concatenated with OPc) may be configured as binary EAP secret in ipsec.secrets or swanctl.conf. Based on a patch by Thomas Strangert. Fixes #2326.
* kernel-netlink: Use total retransmit timeout as acquire timeoutTobias Brunner2017-05-231-3/+3
| | | | | | | By using the total retransmit timeout, modifications of timeout settings automatically reflect on the value of xfrm_acq_expires. If set, the value of xfrm_acq_expires configured by the user takes precedence over the calculated value.
* socket-default: Add an option to force the sending interface via IP_PKTINFOMartin Willi2017-05-231-0/+6
| | | | | | | | | | | | | | | | | | | | | | | | | On Linux, setting the source address is insufficient to force a packet to be sent over a certain path. The kernel uses the best route to select the outgoing interface, even if we set a source address of a lower priority interface. This is not only true for interfaces attaching to the same subnet, but also for unrelated interfaces; the kernel (at least on 4.7) sends out the packet on whatever interface it sees fit, even if that network does not expect packets from the source address we force to. When a better interface becomes available, strongSwan sends its MOBIKE address list update using the old source address. But the kernel sends that packet over the new best interface. If that network drops packets having the unexpected source address from the old path, the MOBIKE update fails and the SA finally times out. To enforce a specific interface for our packet, we explicitly set the interface index from the interface where the source address is installed. According to ip(7), this overrules the specified source address to the primary interface address. As this could have side effects to installations using multiple addresses on a single interface, we disable the option by default for now. This also allows using IPv6 link-local addresses, which won't work if the outbound interface is not set explicitly.
* attr-sql: Make release of online leases during startup optionalTobias Brunner2017-05-191-0/+4
| | | | This cleanup prevents sharing the same DB between multiple VPN gateways.
* The tpm plugin offers random number generationAndreas Steffen2017-03-201-0/+2
| | | | | | The tpm plugin can be used to derive true random numbers from a TPM 2.0 device. The get_random method must be explicitly enabled in strongswan.conf with the plugin.tpm.use_rng = yes option.
* addrblock: Support an optional non-strict mode accepting certs without addrblockMartin Willi2017-03-021-0/+8
| | | | | | | This allows a gateway to enforce the addrblock policy on certificates that actually have the extension only. For (legacy) certificates not having the extension, traffic selectors are validated/narrowed by other means, most likely by the configuration.
* revocation: More accurately describe the flags to disable OCSP/CRL validationTobias Brunner2017-02-151-2/+2
| | | | | | These options disable validation as such, e.g. even from cached CRLs, not only the fetching. Also made the plugin's validate() implementation a no-op if both options are disabled.
* bypass-lan: Allow ignoring or only considering subnets of specific interfacesTobias Brunner2017-02-081-0/+8
| | | | The config can also be reloaded by sending a SIGHUP to charon.
* pkcs11: Fix documentation of load_certs optionTobias Brunner2017-02-061-2/+8
| | | | This option is actually module-specific.
* kernel-netlink: Allow change of Netlink socket receive buffer sizeThomas Egerer2017-01-251-0/+17
| | | | Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com>
* revocation: OCSP and/or CRL fetching can be disabledAndreas Steffen2016-12-301-0/+7
|
* kernel-netlink: Support configuring XFRM policy hashing thresholdsTobias Brunner2016-09-301-0/+29
| | | | | | | | | | | | | | | | | | | | | | | | If the number of flows over a gateway exceeds the flow cache size of the Linux kernel, policy lookup gets very expensive. Policies covering more than a single address don't get hash-indexed by default, which results in wasting most of the cycles in xfrm_policy_lookup_bytype() and its xfrm_policy_match() use. Starting with several hundred policies the overhead gets inacceptable. Starting with Linux 3.18, Linux can hash the first n-bit of a policy subnet to perform indexed lookup. With correctly chosen netbits, this can completely eliminate the performance impact of policy lookups, freeing the resources for ESP crypto. WARNING: Due to a bug in kernels 3.19 through 4.7, the kernel crashes with a NULL pointer dereference if a socket policy is installed while hash thresholds are changed. And because the hashtable rebuild triggered by the threshold change that causes this is scheduled it might also happen if the socket policies are seemingly installed after setting the thresholds. The fix for this bug - 6916fb3b10b3 ("xfrm: Ignore socket policies when rebuilding hash tables") - is included since 4.8 (and might get backported). As a workaround `charon.plugins.kernel-netlink.port_bypass` may be enabled to replace the socket policies that allow IKE traffic with port specific bypass policies.
* conf: Extend description of charon.plugins.kernel-netlink.xfrm_acq_expiresTobias Brunner2016-08-291-5/+9
|
* libtpmtss: Implemented TSS2 quote() methodAndreas Steffen2016-06-261-0/+3
|
* libimcv: migrate pts to tpm_tssAndreas Steffen2016-06-221-0/+3
|
* p-cscf: Make sending requests configurable and disable it by defaultTobias Brunner2016-03-101-0/+11
|
* eap-radius: Add ability to configure RADIUS retransmission behaviorThom Troy2015-11-171-1/+12
| | | | Closes strongswan/strongswan#19.
* conf: Add documentation for new osx-attr optionTobias Brunner2015-08-281-0/+3
|
* conf: Fix declaration of default values for imc-hcd optionsTobias Brunner2015-08-271-5/+5
|
* stroke: Add an option to disable side-swapping of configuration optionsTobias Brunner2015-08-211-0/+5
| | | | | In some scenarios it might be preferred to ensure left is always local and no unintended swaps occur.
* Added imc-hcd attributes to strongswan.confAndreas Steffen2015-08-181-0/+71
|
* conf: Clarify resolution for two time settingsTobias Brunner2015-08-101-2/+2
| | | | Fixes #1061.
* eap-radius: Change trigger for Accounting Start messages for IKEv1Tobias Brunner2015-08-061-1/+1
| | | | | | | | | | | | | | | | | | | | | Some clients won't do Mode Config or XAuth during reauthentication. Because Start messages previously were triggered by TRANSACTION exchanges none were sent for new SAs of such clients, while Stop messages were still sent for the old SAs when they were destroyed. This resulted in an incorrect state on the RADIUS server. Since 31be582399 the assign_vips() event is also triggered during reauthentication if the client does not do a Mode Config exchange. So instead of waiting for a TRANSACTION exchange we trigger the Start message when a virtual IP is assigned to a client. With this the charon.plugins.eap-radius.accounting_requires_vip option would not have any effect for IKEv1 anymore. However, it previously also only worked if the client did an XAuth exchange, which is probably rarely used without virtual IPs, so this might not be much of a regression. Fixes #937.
* kernel-netlink: Use PAGE_SIZE as default size for the netlink receive bufferTobias Brunner2015-08-041-1/+1
| | | | | | | | The kernel uses NLMSG_GOODSIZE as default buffer size, which defaults to the PAGE_SIZE if it is lower than 8192 or to that value otherwise. In some cases (e.g. for dump messages) the kernel might use up to 16k for messages, which might require increasing this value.
* kernel-netlink: Make buffer size for received Netlink messages configurableTobias Brunner2015-05-211-0/+3
|
* Added PB-TNC test options to strongswan.conf man pageAndreas Steffen2015-03-271-0/+6
|
* Fixed strongswan.conf man page entry of imc-attestationAndreas Steffen2015-03-272-18/+18
|
* Optionally announce PB-TNC mutual protocol capabilityAndreas Steffen2015-03-231-0/+3
|
* kernel-pfkey: Add option to set receive buffer size of event socketTobias Brunner2015-03-061-0/+7
| | | | | | | | If many requests are sent to the kernel the events generated by these requests may fill the receive buffer before the daemon is able to read these messages. Fixes #783.
* Implemented improved BLISS-B signature algorithmAndreas Steffen2015-02-251-0/+2
|
* forecast: Document strongswan.conf optionsMartin Willi2015-02-201-0/+29
|
* kernel-netlink: Add missing documentation for two optionsTobias Brunner2014-12-191-0/+6
|
* kernel-netlink: Alternatively support global port based IKE bypass policiesMartin Willi2014-11-211-0/+9
| | | | | | The socket based IKE bypass policies are usually superior, but not supported on all networking stacks. The port based variant uses global policies for the UDP ports we have IKE sockets for.
* conf: Document kernel-netlink retransmission and parallelization optionsMartin Willi2014-11-211-0/+17
|
* eap-radius: Add option to set interval for interim accounting updatesTobias Brunner2014-10-101-1/+5
| | | | | | Any interval returned by the RADIUS server in the Access-Accept message overrides the configured interval. But it might be useful if RADIUS is only used for accounting.
* ext-auth: Add an ext-auth plugin invoking an external authorization scriptMartin Willi2014-10-061-0/+15
| | | | Original patch courtesy of Vyronas Tsingaras.
* stroke: Allow specifying the ipsec.secrets location in strongswan.confShea Levy2014-10-021-0/+3
|
* kernel-netlink: Optionally install protocol and ports on transport mode SAsTobias Brunner2014-09-121-0/+9
|
* kernel-netlink: Add global option to configure MSS-clamping on installed routesTobias Brunner2014-09-121-0/+3
|
* kernel-netlink: Add global option to set MTU on installed routesTobias Brunner2014-09-121-0/+3
|
* conf: Document load-tester.crl optionTobias Brunner2014-06-301-0/+4
|
* Remove kernel-klips pluginTobias Brunner2014-06-191-5/+0
|
* Fixed typo in strongswan.confAndreas Steffen2014-06-051-1/+1
|
* Updated IMC/IMV entries in strongswan.conf man pageAndreas Steffen2014-05-3110-35/+40
|
* Implemented PT-EAP protocol (RFC 7171)Andreas Steffen2014-05-122-1/+4
|