Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Reuse reqid when restarting CHILD_SAs for dpd|closeaction=restart | Tobias Brunner | 2013-07-01 | 1 | -2/+2 | |
| | ||||||
* | Reuse reqid for trap policies installed for dpd|closeaction=hold | Tobias Brunner | 2013-07-01 | 1 | -1/+2 | |
| | ||||||
* | ikev2: keep the CHILD_SA we delete as initiator in the list to destroy | Martin Willi | 2013-06-25 | 1 | -6/+5 | |
| | | | | | If the responder not correctly send the correct protocol or SPI in the delete response, we should remove the CHILD_SA regardless. | |||||
* | ike: Force NAT-T/UDP encapsulation if kernel interface requires it | Tobias Brunner | 2013-06-21 | 1 | -3/+16 | |
| | ||||||
* | ikev2: use protocol of selected proposal to delete a failed CHILD_SA | Martin Willi | 2013-06-20 | 1 | -2/+2 | |
| | | | | Depending on the failure, the protocol might not yet be set on the CHILD_SA. | |||||
* | ikev2: properly fall back to tunnel mode if transport/BEET mode not configured | Martin Willi | 2013-06-19 | 1 | -2/+8 | |
| | ||||||
* | ikev2: support transport mode over NAT | Martin Willi | 2013-06-19 | 1 | -36/+150 | |
| | ||||||
* | kernel-interface: add an exchange initiator parameter to add_sa() | Martin Willi | 2013-06-11 | 1 | -8/+8 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This new flag gives the kernel-interface a hint how it should priorize the use of newly installed SAs during rekeying. Consider the following rekey procedure in IKEv2: Initiator --- Responder I1 -------CREATE-------> R1 I2 <------CREATE-------- -------DELETE-------> R2 I3 <------DELETE-------- SAs are always handled as pairs, the following happens at the SA level: * Initiator starts the exchange at I1 * Responder installs new SA pair at R1 * Initiator installs new SA pair at I2 * Responder removes old SA pair at R2 * Initiator removes old SA pair at I3 This makes sure SAs get installed/removed overlapping during rekeying. However, to avoid any packet loss, it is crucial that the new outbound SA gets activated at the correct position: * as exchange initiator, in I2 * as exchange responder, in R2 This should guarantee that we don't use the new outbound SA before the peer could install its corresponding inbound SA. The new parameter allows the kernel backend to install the new SA with appropriate priorities, i.e. it should: * as exchange inititator, have the new outbound SA installed with higher priority than the old SA * as exchange responder, have the new outbound SA installed with lower priority than the old SA While we could split up the SA installation at the responder, this approach has another advantage: it allows the kernel backend to switch SAs based on other criteria, for example when receiving traffic on the new inbound SA. | |||||
* | ikev2: if installing a CHILD_SA as initiator fails, notify the responder | Martin Willi | 2013-06-11 | 1 | -2/+36 | |
| | ||||||
* | ikev2: raise LOCAL_AUTH_FAILED when receiving INFORMATIONAL with AUTH_FAILED | Martin Willi | 2013-06-11 | 1 | -0/+8 | |
| | ||||||
* | ikev2: if responder authentication fails, send AUTHENTICATION_FAILED | Martin Willi | 2013-06-11 | 1 | -0/+29 | |
| | | | | | | | According to RFC 5996, we MAY send an INFORMATIONAL message having an AUTHENTICATION_FAILED. We don't do any retransmits, though, but just close the IKE_SA after one message has been sent, avoiding the danger that an unauthenticated IKE_SA stays alive. | |||||
* | Allow IPComp on NATed connections, both for IKEv1 and IKEv2 | Martin Willi | 2013-06-11 | 1 | -7/+0 | |
| | | | | | | While this was problematic in earlier releases, it seems that it works just fine the way we handle compression now. So there is no need to disable it over NATed connections or when using forceencaps. | |||||
* | Properly compare CHILD_SAs during rekey collision | Tobias Brunner | 2013-06-11 | 1 | -5/+12 | |
| | | | | | | | The previous code did not properly check for the situation when the DELETE for a redundant CHILD_SA created by a responder during a CHILD_SA rekey collision arrives before the responder's answer to the initiator's winning CREATE_CHILD_SA request. | |||||
* | Raise LOCAL_AUTH_FAILED alert after receiving AUTHENTICATION_FAILURE | Martin Willi | 2013-05-15 | 1 | -0/+1 | |
| | ||||||
* | Raise an ALERT_PROPOSAL_MISMATCH_CHILD also when receiving NO_PROPOSAL_CHOSEN | Martin Willi | 2013-05-06 | 1 | -0/+20 | |
| | ||||||
* | Raise an ALERT_PROPOSAL_MISMATCH_IKE also when receiving NO_PROPOSAL_CHOSEN | Martin Willi | 2013-05-06 | 1 | -0/+20 | |
| | ||||||
* | emit a single assig_vips bus message for all VIPs | Andreas Steffen | 2013-04-06 | 1 | -0/+2 | |
| | ||||||
* | Defer CHILD_SA rekeying if allocating an SPI fails | Martin Willi | 2013-04-03 | 1 | -12/+25 | |
| | ||||||
* | child_sa_t.get_usestats() can additionally return the number of processed ↵ | Martin Willi | 2013-03-14 | 1 | -2/+2 | |
| | | | | packets | |||||
* | Merge branch 'multi-eap' | Martin Willi | 2013-03-01 | 1 | -28/+40 | |
|\ | | | | | | | | | | | Fixes the use of EAP methods in the non-first authentication round if the initiator demands mutual EAP. Also mutual EAP can now be enforced when the initiator sets rightauth=eap, not only with rightauth=any. | |||||
| * | Apply a mutual EAP auth_cfg not before the EAP method completes | Martin Willi | 2013-02-26 | 1 | -1/+8 | |
| | | ||||||
| * | Be a little more verbose why a peer_cfg is inacceptable | Martin Willi | 2013-02-26 | 1 | -8/+16 | |
| | | ||||||
| * | Refactor auth_cfg applying to a common function | Martin Willi | 2013-02-26 | 1 | -20/+17 | |
| | | ||||||
* | | Merge branch 'tfc-notify' | Martin Willi | 2013-03-01 | 1 | -0/+9 | |
|\ \ | |/ |/| | | | | | Introduces kernel backend features, sends ESP_TFC_PADDING_NOT_SUPPORTED if kernel does not support it. | |||||
| * | Send ESP_TFC_PADDING_NOT_SUPPORTED if the used kernel doesn't support it | Martin Willi | 2013-03-01 | 1 | -0/+9 | |
| | | ||||||
* | | Add a global return_success() method implementation | Martin Willi | 2013-02-14 | 1 | -8/+2 | |
|/ | ||||||
* | Refactored IKEv2 cert/certreq payload processing to multiple functions | Martin Willi | 2013-01-11 | 1 | -112/+141 | |
| | ||||||
* | Fixed some typos, courtesy of codespell | Tobias Brunner | 2012-12-20 | 2 | -2/+2 | |
| | ||||||
* | Raise an alert if IKE SA is kept | Adrian-Ken Rueegsegger | 2012-12-20 | 1 | -0/+1 | |
| | | | | | This alert is raised when the establishment of a child SA fails but the IKE SA is kept. | |||||
* | Raise an alert if allocating virtual IPs fails | Martin Willi | 2012-12-19 | 1 | -0/+2 | |
| | ||||||
* | Raise an alert if kernel policy installation fails | Martin Willi | 2012-12-19 | 1 | -0/+2 | |
| | ||||||
* | Raise an alert if kernel SA installation fails | Martin Willi | 2012-12-19 | 1 | -0/+2 | |
| | ||||||
* | Raise an alert on traffic selector mismatch | Martin Willi | 2012-12-19 | 1 | -0/+2 | |
| | ||||||
* | Raise alerts when enforcing IKE_SA unique policy | Martin Willi | 2012-12-19 | 1 | -0/+1 | |
| | ||||||
* | Raise an alert if CHILD_SA proposals mismatch | Martin Willi | 2012-12-19 | 1 | -0/+2 | |
| | ||||||
* | Raise an alert if IKE proposals mismatch | Martin Willi | 2012-12-19 | 1 | -0/+5 | |
| | ||||||
* | Raise an alert of generating local authentication data fails | Martin Willi | 2012-12-19 | 1 | -6/+10 | |
| | ||||||
* | Fix GPL license header to properly "sed" it | Martin Willi | 2012-11-30 | 1 | -1/+1 | |
| | ||||||
* | Moved packet_t and tun_device_t to networking folder | Tobias Brunner | 2012-10-24 | 1 | -1/+1 | |
| | ||||||
* | Made IP address enumeration more flexible | Tobias Brunner | 2012-09-21 | 3 | -3/+3 | |
| | | | | Also added an option to enumerate addresses on ignored interfaces. | |||||
* | Don't ignore loopback devices and allow addresses on them being enumerated | Tobias Brunner | 2012-09-21 | 3 | -3/+3 | |
| | ||||||
* | Derive a dynamic TS to multiple virtual IPs | Martin Willi | 2012-09-18 | 1 | -39/+61 | |
| | ||||||
* | Add AUTH_RULE_IDENTITY_LOOSE which allows to use IDr loosely as initiator | Tobias Brunner | 2012-09-18 | 1 | -1/+2 | |
| | | | | | | If it is set on an auth config IDr will not be sent, and later the configured identity will not only be checked against the returned IDr, but also against other identities contained in the responder's certificate. | |||||
* | Don't use host address for dynamic TS in IKEv2 if a virtual IP was expected | Martin Willi | 2012-09-11 | 1 | -1/+33 | |
| | ||||||
* | Send FAILED_CP_REQUIRED if a configuration payload was expected, but not ↵ | Martin Willi | 2012-09-11 | 1 | -0/+9 | |
| | | | | received | |||||
* | Pass the full list of pools to acquire_address, enumerate in providers | Martin Willi | 2012-09-11 | 1 | -20/+6 | |
| | | | | | | | | If the provider has access to the full pool list, it can enumerate them twice, for example to search for existing leases first, and only search for new leases in a second step. Fixes lease enumeration in attr-sql using multiple pools. | |||||
* | Add a responder narrow() hook to change TS in the kernel, but not on the wire | Martin Willi | 2012-09-11 | 1 | -1/+26 | |
| | ||||||
* | Add uniqueids=never to ignore INITIAL_CONTACT notifies | Tobias Brunner | 2012-09-10 | 1 | -1/+2 | |
| | | | | | | With uniqueids=no the daemon still deletes any existing IKE_SA with the same peer if an INITIAL_CONTACT notify is received. With this new option it also ignores these notifies. | |||||
* | Clear virtual IPs before storing assigned ones on the IKE_SA | Tobias Brunner | 2012-09-05 | 1 | -0/+4 | |
| | | | | | Otherwise we'll end up with duplicate or invalid VIPs stored on the IKE_SA. | |||||
* | Request and acquire multiple virtual IPs in IKEv2 configuration payload | Martin Willi | 2012-08-30 | 1 | -49/+67 | |
| |