Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Use exact mask when calling umask(2) | Tobias Brunner | 2013-10-29 | 2 | -2/+2 | |
| | | | | | | Due to the previous negation the high bits of the mask were set, which at least some versions of the Android build system prevent with a compile-time check. | |||||
* | whitelist: Read multiple commands until client closes connection | Martin Willi | 2013-10-29 | 1 | -30/+28 | |
| | | | | | This restores the same behavior we had before e11c02c8, and fixes the whitelist add/remove-from command. | |||||
* | Fixed some typos | Tobias Brunner | 2013-10-29 | 1 | -1/+1 | |
| | ||||||
* | check it specified IF-TNCCS protocol is enabled | Andreas Steffen | 2013-10-21 | 1 | -0/+6 | |
| | ||||||
* | updown: Pass ICMP[v6] message type and code to updown script | Tobias Brunner | 2013-10-17 | 1 | -2/+23 | |
| | | | | The type is passed in $PLUTO_MY_PORT and the code in $PLUTO_PEER_PORT. | |||||
* | stroke: Reuse reqids of established CHILD_SAs when routing connections | Tobias Brunner | 2013-10-17 | 1 | -1/+45 | |
| | ||||||
* | Doxygen fixes | Tobias Brunner | 2013-10-15 | 1 | -2/+1 | |
| | ||||||
* | eap-radius: Forward RAT_FRAMED_IP_NETMASK as INTERNAL_IP4_NETMASK | Tobias Brunner | 2013-10-11 | 1 | -0/+5 | |
| | ||||||
* | eap-radius: Forward UNITY_SPLIT_INCLUDE or UNITY_LOCAL_LAN attributes | Tobias Brunner | 2013-10-11 | 1 | -0/+93 | |
| | | | | | | | | | | | | | | | Depending on the value of the CVPN3000-IPSec-Split-Tunneling-Policy(55) radius attribute, the subnets in the CVPN3000-IPSec-Split-Tunnel-List(27) attribute are sent in either a UNITY_SPLIT_INCLUDE (if the value is 1) or a UNITY_LOCAL_LAN (if the value is 2). So if the following attributes would be configured for a RADIUS user CVPN3000-IPSec-Split-Tunnel-List := "10.0.1.0/255.255.255.0,10.0.2.0/255.255.255.0" CVPN3000-IPSec-Split-Tunneling-Policy := 1 A UNITY_SPLIT_INCLUDE configuration payload containing these two subnets would be sent to the client during the ModeCfg exchange. | |||||
* | eap-radius: Forward UNITY_DEF_DOMAIN and UNITY_SPLITDNS_NAME attributes | Tobias Brunner | 2013-10-11 | 1 | -3/+25 | |
| | | | | | | The contents of the CVPN3000-IPSec-Default-Domain(28) and CVPN3000-IPSec-Split-DNS-Names(29) radius attributes are forwarded in the corresponding Unity configuration attributes. | |||||
* | dnscert: Add DNS CERT support for pubkey authentication | Ruslan N. Marchenko | 2013-10-11 | 7 | -0/+821 | |
| | | | | | | | | | | | Add DNSSEC protected CERT RR delivered certificate authentication. The new dnscert plugin is based on the ipseckey plugin and relies on the existing PEM decoder as well as x509 and PGP parsers. As such the plugin expects PEM encoded PKIX(x509) or PGP(GPG) certificate payloads. The plugin is targeted to improve interoperability with Racoon, which supports this type of authentication, ignoring in-stream certificates and using only DNS provided certificates for FQDN IDs. | |||||
* | ipseckey: Properly handle failure to create a certificate | Tobias Brunner | 2013-10-11 | 1 | -33/+28 | |
| | | | | Also, try the next key (if available) if parsing an IPSECKEY failed. | |||||
* | ipseckey: Refactor creation of certificate enumerator | Tobias Brunner | 2013-10-11 | 1 | -86/+81 | |
| | | | | Reduces nesting and fixes a memory leak (rrsig_enum). | |||||
* | ipseckey: Depend on plugin features to create public key and certificate objects | Tobias Brunner | 2013-10-11 | 1 | -0/+2 | |
| | ||||||
* | kernel-libipsec: Don't ignore policies of type != POLICY_IPSEC | Tobias Brunner | 2013-10-11 | 1 | -5/+0 | |
| | | | | | | This actually broke rekeying due to the DROP policies that are temporarily added, which broke the refcount as the ignored policies were not ignored in del_policy() (the type is not known there). | |||||
* | kernel-libipsec: Add an option to allow remote TS to match the IKE peer | Tobias Brunner | 2013-10-11 | 1 | -2/+9 | |
| | | | | | | | | Setting the fwmark options for the kernel-netlink and socket-default plugins allow this kind of setup. It is probably required to set net.ipv4.conf.all.rp_filter to 2 to make it work. | |||||
* | socket-default: Allow setting firewall mark on outbound packets | Tobias Brunner | 2013-10-11 | 1 | -0/+18 | |
| | ||||||
* | sql: Don't use MyISAM engine and set collation/charset for all tables | Tobias Brunner | 2013-10-11 | 1 | -26/+25 | |
| | | | | The MyISAM engine doesn't support transactions. | |||||
* | kernel-libipsec: Support ESPv3 TFC padding | Martin Willi | 2013-10-11 | 1 | -1/+1 | |
| | ||||||
* | kernel-libipsec: Support query_sa() to report usage statistics | Martin Willi | 2013-10-11 | 1 | -1/+2 | |
| | ||||||
* | kernel: Use a time_t to report use time in query_policy() | Martin Willi | 2013-10-11 | 2 | -2/+2 | |
| | ||||||
* | kernel: Use a time_t to report use time in query_sa() | Martin Willi | 2013-10-11 | 2 | -2/+2 | |
| | ||||||
* | updown: Add a PLUTO_PROTO variable set to 'ah' or 'esp' | Martin Willi | 2013-10-11 | 1 | -0/+2 | |
| | ||||||
* | stroke: List proposals in statusall without leading '/' in AH SAs | Martin Willi | 2013-10-11 | 1 | -1/+7 | |
| | ||||||
* | stroke: Configure proposal with AH protocol if 'ah' option set | Martin Willi | 2013-10-11 | 2 | -11/+16 | |
| | ||||||
* | Keep a copy of the tnccs instance for PT-TLS handover | Andreas Steffen | 2013-10-09 | 1 | -2/+16 | |
| | ||||||
* | xauth-pam: Make trimming of email addresses optional5.1.1dr4 | Tobias Brunner | 2013-10-04 | 1 | -4/+9 | |
| | | | | Fixes #430. | |||||
* | eap-radius: Increase buffer for attributes sent in RADIUS accounting messages | Tobias Brunner | 2013-09-27 | 1 | -1/+1 | |
| | | | | 64 bytes might be too short for user names/identities. | |||||
* | load-tester: Fix crash if private key was not loaded successfully | Tobias Brunner | 2013-09-24 | 1 | -1/+1 | |
| | | | | Fixes #417. | |||||
* | Implemented TCG/PB-PDP_Referral message | Andreas Steffen | 2013-09-17 | 1 | -0/+12 | |
| | ||||||
* | stroke: don't remove a matching peer config if used by other child configs | Martin Willi | 2013-09-13 | 1 | -4/+3 | |
| | | | | | When configurations get merged during add, we should not remove peer configs if other connection entries use the same peer config. | |||||
* | sockets: Initialize the whole ancillary data buffer not only the actual struct | Tobias Brunner | 2013-09-10 | 2 | -4/+4 | |
| | | | | | | This avoids uninitialized bytes that Valgrind seems to notice otherwise. Fixes #395. | |||||
* | Fixed double free causing swapped ends to crash5.1.1dr3 | Andreas Steffen | 2013-09-07 | 1 | -1/+0 | |
| | ||||||
* | load-tester: support extended traffic selector syntax, as in leftsubnet | Martin Willi | 2013-09-04 | 1 | -13/+168 | |
| | | | | | In addition the initiator may use %unique as port, using a distinct port for each connection, starting from 1025. | |||||
* | load-tester: add an option to test transport/beet connections | Martin Willi | 2013-09-04 | 1 | -1/+21 | |
| | ||||||
* | ike: support multiple addresses, ranges and subnets in IKE address config | Martin Willi | 2013-09-04 | 9 | -54/+85 | |
| | | | | | | | Replace the allowany semantic by a more powerful subnet and IP range matching. Multiple addresses, DNS names, subnets and ranges can be specified in a comma separated list. Initiators ignore the ranges/subnets, responders match configurations against all addresses, ranges and subnets. | |||||
* | ike-cfg: remove the to be obsoleted allow any parameter in get_my/other_addr | Martin Willi | 2013-09-04 | 3 | -7/+5 | |
| | ||||||
* | stroke: ignore a leftsourceip if a rightsourceip is given as well | Martin Willi | 2013-09-04 | 1 | -1/+7 | |
| | | | | | | As we always negotiate virtual IPs in charon, having both left- and rightsourceip is not allowed. Both in IKEv1 and IKEv2 we support a single configuration payload exchange only. | |||||
* | stroke: re-enable modeconfig keyword | Martin Willi | 2013-09-04 | 1 | -1/+1 | |
| | ||||||
* | peer-cfg: add a pull/push mode option to use with mode config | Martin Willi | 2013-09-04 | 8 | -10/+11 | |
| | ||||||
* | xauth-generic: honor requested XAuth credential types as a client | Martin Willi | 2013-09-03 | 1 | -16/+51 | |
| | | | | Support requesting of XAuth PINs and print XAuth messages. | |||||
* | eap-radius: support XAuth configuration profiles, defining multiple XAuth rounds | Martin Willi | 2013-09-03 | 1 | -22/+157 | |
| | ||||||
* | xauth: add a configuration string option to be passed to XAuth instances | Martin Willi | 2013-09-03 | 11 | -13/+27 | |
| | | | | | | The configuration string is appended to the XAuth backend name, separated by a colon. The configuration string is passed untouched to the backend, where it can change the behavior of the XAuth module. | |||||
* | Selectively enable PT-TLS and/or RADIUS sockets in tnc-pdp plugin | Andreas Steffen | 2013-08-26 | 1 | -76/+95 | |
| | ||||||
* | stroke: stop enumerating IKE_SAs in statusall if output stream gets closed | Martin Willi | 2013-08-23 | 1 | -1/+1 | |
| | | | | | | | If the output stream is not interested in more information, it can close the the stream. Checking for stream errors avoids useless enumeration of IKE_SAs, saving resources. This allows to use "ipsec statusall | head" to monitor the daemon, or stop enumerating IKE_SAs after a specific entry has been found. | |||||
* | Process PB-TNC batches received via PT-TLS asynchronously | Andreas Steffen | 2013-08-19 | 1 | -4/+1 | |
| | ||||||
* | Show host address of peer connecting to PT-TLS socket | Andreas Steffen | 2013-08-15 | 1 | -1/+7 | |
| | ||||||
* | enabled SASL PLAIN authentication | Andreas Steffen | 2013-08-15 | 1 | -2/+2 | |
| | ||||||
* | PT-TLS connection is properly terminated | Andreas Steffen | 2013-08-15 | 1 | -3/+2 | |
| | ||||||
* | moved tnc_imv plugin to libtnccs thanks to recommendation callback function | Andreas Steffen | 2013-08-15 | 12 | -1887/+79 | |
| |