Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | proposal: Remove RFC 5114 MODP DH groups from default proposal | Martin Willi | 2016-11-15 | 1 | -2/+4 |
| | | | | | | | | | | | | | | Recent research demonstrates that at least for 1024-bit DH groups, it is possible to create specially crafted primes having a backdoor. From the prime itself this is not detectable, creating a perfect NOBUS attack. http://eprint.iacr.org/2016/961 For the primes defined in RFC 5114 no information is provided on how these have been selected. In the default proposal we included one of the 2048-bit primes only, where it is questionable if constructing a backdoored prime is feasible. Nevertheless, this patch removes the group from the set of default proposals as well. | ||||
* | proposal: Add curve25519 and curve448 to default proposal | Tobias Brunner | 2016-11-14 | 1 | -0/+2 |
| | |||||
* | peer-cfg: Fix memory leak when replacing child configs | Tobias Brunner | 2016-11-11 | 1 | -0/+1 |
| | | | | | Fixes: 622c2b2c3386 ("peer-cfg: Add method to atomically replace child configs") | ||||
* | Fixed some typos, courtesy of codespell | Tobias Brunner | 2016-10-14 | 1 | -1/+1 |
| | |||||
* | proposal: Correctly add AES-GMAC for AH proposals | Tobias Brunner | 2016-10-05 | 1 | -0/+41 |
| | | | | | | We parse aes*gmac as encryption algorithm, which we have to map to an integrity algorithm. We also make sure we remove all other encryption algorithms and ensure there is an integrity algorithm. | ||||
* | proposal: Enforce separate proposals for AEAD and classic encryption algorithms | Tobias Brunner | 2016-10-05 | 1 | -16/+22 |
| | |||||
* | proposal: Make sure there is a PRF defined in IKE proposals | Tobias Brunner | 2016-10-05 | 1 | -14/+34 |
| | | | | But filter PRFs from ESP proposals. | ||||
* | proposal: Make DH groups mandatory in IKE proposals parsed from strings | Tobias Brunner | 2016-10-05 | 1 | -4/+11 |
| | | | | References #2051. | ||||
* | child-cfg: Add setting that controls whether outbound FWD policies are installed | Tobias Brunner | 2016-09-28 | 2 | -0/+24 |
| | |||||
* | Created newhope plugin implementing the New Hope key exchange algorithm | Andreas Steffen | 2016-08-10 | 1 | -0/+1 |
| | |||||
* | child-cfg: Add option to prefer supplied proposals over locally configured ones | Tobias Brunner | 2016-06-17 | 2 | -18/+33 |
| | |||||
* | ike-cfg: Add option to prefer supplied proposals over locally configured ones | Tobias Brunner | 2016-06-17 | 2 | -27/+43 |
| | |||||
* | proposal: Remove MODP_NONE from IKE proposals parsed from strings | Tobias Brunner | 2016-06-17 | 1 | -0/+10 |
| | |||||
* | proposal: Handle MODP_NONE in both directions when selecting proposals | Tobias Brunner | 2016-06-17 | 1 | -6/+14 |
| | |||||
* | vici list-conns sends reauthentication and rekeying time information | Andreas Steffen | 2016-05-04 | 3 | -4/+9 |
| | |||||
* | proposal: Remove some weaker and rarely used DH groups from the default proposal | Tobias Brunner | 2016-05-04 | 1 | -3/+5 |
| | | | | | | | | | | | This fixes an interoperability issue with Windows Server 2012 R2 gateways. They insist on using modp1024 for IKE, however, Microsoft's IKEv2 implementation seems only to consider the first 15 DH groups in the proposal. Depending on the loaded plugins modp1024 is now at position 17 or even later, causing the server to reject the proposal. By removing some of the weaker and rarely used DH groups from the default proposal we make sure modp1024 is among the first 15 DH groups. The removed groups may still be used by configuring custom proposals. | ||||
* | Implemented IPsec policies restricted to given network interface | Andreas Steffen | 2016-04-09 | 2 | -6/+27 |
| | |||||
* | Support manually-set IPsec policy priorities | Andreas Steffen | 2016-04-09 | 2 | -0/+25 |
| | |||||
* | peer-cfg: Use struct to pass data to constructor | Tobias Brunner | 2016-04-09 | 2 | -72/+72 |
| | |||||
* | child-cfg: Use struct to pass data to constructor | Tobias Brunner | 2016-04-09 | 2 | -76/+62 |
| | |||||
* | Use standard unsigned integer types | Andreas Steffen | 2016-03-24 | 8 | -84/+84 |
| | |||||
* | peer-cfg: Add method to atomically replace child configs | Tobias Brunner | 2016-03-08 | 2 | -2/+128 |
| | |||||
* | ike-cfg: Use new method to compare proposal lists in equals() | Tobias Brunner | 2016-03-08 | 1 | -20/+4 |
| | |||||
* | peer-cfg: Use new method to compare linked lists in equals() | Tobias Brunner | 2016-03-08 | 1 | -36/+3 |
| | | | | This also compares the complete lists not only the first two items. | ||||
* | child-cfg: Add equals() method | Tobias Brunner | 2016-03-08 | 2 | -2/+62 |
| | |||||
* | peer-cfg: Set DPD timeout to at least DPD delay | Tobias Brunner | 2016-02-01 | 1 | -0/+4 |
| | | | | | | If DPD timeout is set but to a value smaller than the DPD delay the code in task_manager_v1.c:queue_liveliness_check will run into an integer underrun. | ||||
* | 128 bit default security strength for IKE and ESP algorithms | Andreas Steffen | 2015-12-17 | 1 | -40/+140 |
| | | | | | | | | | | | | | | | | | The default ESP cipher suite is now AES_CBC-128/HMAC_SHA2_256_128 and requires SHA-2 HMAC support in the Linux kernel (correctly implemented since 2.6.33). The default IKE cipher suite is now AES_CBC-128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/ECP_256 if the openssl plugin is loaded or AES_CBC-128/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_3072 if ECC is not available. The use of the SHA-1 hash algorithm and the MODP_2048 DH group has been deprecated and ENCR_CHACHA20_POLY1305 has been added to the default IKE AEAD algorithms. | ||||
* | traffic-selector: Don't end printf'ed list of traffic selectors with a space | Tobias Brunner | 2015-11-10 | 1 | -1/+1 |
| | |||||
* | Fix some Doxygen issues | Tobias Brunner | 2015-08-27 | 1 | -3/+3 |
| | |||||
* | ike-cfg: Add helper function to determine address family of IP addresses | Tobias Brunner | 2015-07-27 | 2 | -1/+59 |
| | | | | | All configured static addresses (hostnames, ranges or subnets are not considered) must be of the same family, otherwise AF_UNSPEC is returned. | ||||
* | proposal: Add default PRF for HMAC-MD5-128 and HMAC-SHA1-160 integrity ↵ | Tobias Brunner | 2014-10-31 | 1 | -0/+2 |
| | | | | algorithms | ||||
* | ike-cfg: Use host_create_from_range() helper | Tobias Brunner | 2014-10-30 | 1 | -16/+1 |
| | |||||
* | child-cfg: Ignore duplicate proposals | Tobias Brunner | 2014-09-12 | 1 | -0/+11 |
| | | | | | If ESP proposals are added once with and once without DH groups duplicates result during IKE_AUTH when DH groups are stripped. | ||||
* | proposal: Fix equals() | Tobias Brunner | 2014-09-12 | 1 | -5/+5 |
| | |||||
* | child-cfg: Store connection specific replay window on CHILD_SA config | Martin Willi | 2014-06-17 | 2 | -0/+38 |
| | |||||
* | peer-cfg: Add missing UNIQUE_NEVER to unique_policy_names | Martin Willi | 2014-05-19 | 1 | -1/+2 |
| | |||||
* | proposal: Don't return a default IKE proposal without encryption/AEAD algs | Martin Willi | 2014-05-16 | 1 | -3/+23 |
| | |||||
* | child-cfg: Allow passing NULL as proposal to add_proposal() | Martin Willi | 2014-05-16 | 2 | -4/+7 |
| | | | | Making the API consistent to the one of ike_cfg. | ||||
* | ike-cfg: Allow passing NULL to add_proposal() | Martin Willi | 2014-05-16 | 2 | -3/+7 |
| | | | | | This simplifies adding default proposals with constructors potentially returning NULL. | ||||
* | proposal: Use an additional "default" constructor specific to AEAD algorithms | Martin Willi | 2014-05-16 | 2 | -0/+31 |
| | | | | | This allows a caller to create a separated proposal for supported AEAD algorithms, as required by RFC 5996. | ||||
* | proposal: Don't include AEAD algorithms in the default proposal | Martin Willi | 2014-05-16 | 1 | -61/+66 |
| | | | | | | According to RFC 5996 3.3 we should use a separate proposal for AEAD algorithms. This was not clear in RFC 5282, hence we previously included both AEAD and non-AEAD algorithms in a single proposal. | ||||
* | child-cfg: Fix removal of redundant traffic selectors | Tobias Brunner | 2014-04-25 | 1 | -1/+1 |
| | | | | | | | We have to make sure we compare every selected traffic selector with every other in the list. Fixes #577. | ||||
* | ike-cfg: Properly compare IKE proposals for equality5.1.3rc1 | Tobias Brunner | 2014-04-03 | 1 | -1/+1 |
| | |||||
* | proposal: Don't fail DH proposal matching if peer includes NONE | Tobias Brunner | 2014-03-31 | 1 | -4/+19 |
| | | | | | | | | The DH transform is optional for ESP/AH proposals. The initiator can include NONE (0) in its proposal to indicate that while it prefers to do a DH exchange, the responder may still decide to not do so. Fixes #532. | ||||
* | uclibc only defines strndup(3) if _GNU_SOURCE is defined | Tobias Brunner | 2014-02-19 | 1 | -3/+3 |
| | | | | References #516. | ||||
* | Added NTRU key exchange to default IKE proposal | Andreas Steffen | 2013-11-27 | 1 | -0/+4 |
| | |||||
* | proposal: Add ECC Brainpool DH groups to the default proposal | Tobias Brunner | 2013-10-17 | 1 | -0/+4 |
| | |||||
* | Doxygen fixes | Tobias Brunner | 2013-10-15 | 1 | -1/+1 |
| | |||||
* | proposal: Strip redundant integrity algos for ESP proposals only | Martin Willi | 2013-10-11 | 1 | -16/+19 |
| | |||||
* | ike: support multiple addresses, ranges and subnets in IKE address config | Martin Willi | 2013-09-04 | 2 | -46/+211 |
| | | | | | | | Replace the allowany semantic by a more powerful subnet and IP range matching. Multiple addresses, DNS names, subnets and ranges can be specified in a comma separated list. Initiators ignore the ranges/subnets, responders match configurations against all addresses, ranges and subnets. |