Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Use ref_get() to make sure IKE_SA unique IDs are unique | Martin Willi | 2013-06-11 | 1 | -2/+2 | |
| | ||||||
* | Use ref_get() to make sure CHILD_SA reqids are unique | Martin Willi | 2013-06-11 | 1 | -2/+9 | |
| | ||||||
* | ikev1: keep vendor ID task alive during full Main/Aggressive Mode | Martin Willi | 2013-06-11 | 1 | -8/+75 | |
| | | | | Fixes DPD with Cisco IOS sending the DPD vendor ID not in the first message. | |||||
* | ikev2: if installing a CHILD_SA as initiator fails, notify the responder | Martin Willi | 2013-06-11 | 1 | -2/+36 | |
| | ||||||
* | ikev2: raise LOCAL_AUTH_FAILED when receiving INFORMATIONAL with AUTH_FAILED | Martin Willi | 2013-06-11 | 1 | -0/+8 | |
| | ||||||
* | ikev2: close an established IKE_SA when receiving AUTHENTICATION_FAILED | Martin Willi | 2013-06-11 | 1 | -0/+6 | |
| | | | | | | RFC 5996 compatible implementations MAY send an INFORMATIONAL message with an AUTHENTICATION_FAILED if the initiator failed to authenticate us. Handle such a message like a DELETE for an IKE_SA. | |||||
* | ikev2: if responder authentication fails, send AUTHENTICATION_FAILED | Martin Willi | 2013-06-11 | 1 | -0/+29 | |
| | | | | | | | According to RFC 5996, we MAY send an INFORMATIONAL message having an AUTHENTICATION_FAILED. We don't do any retransmits, though, but just close the IKE_SA after one message has been sent, avoiding the danger that an unauthenticated IKE_SA stays alive. | |||||
* | Allow IPComp on NATed connections, both for IKEv1 and IKEv2 | Martin Willi | 2013-06-11 | 2 | -33/+10 | |
| | | | | | | While this was problematic in earlier releases, it seems that it works just fine the way we handle compression now. So there is no need to disable it over NATed connections or when using forceencaps. | |||||
* | Properly compare CHILD_SAs during rekey collision | Tobias Brunner | 2013-06-11 | 1 | -5/+12 | |
| | | | | | | | The previous code did not properly check for the situation when the DELETE for a redundant CHILD_SA created by a responder during a CHILD_SA rekey collision arrives before the responder's answer to the initiator's winning CREATE_CHILD_SA request. | |||||
* | Raise LOCAL_AUTH_FAILED alert after receiving AUTHENTICATION_FAILURE | Martin Willi | 2013-05-15 | 1 | -0/+1 | |
| | ||||||
* | kernel-interface: query SAD for last use time if SPD query didn't yield one | Martin Willi | 2013-05-06 | 1 | -5/+19 | |
| | ||||||
* | child-sa: query SAD/SPD just for what we actually need to update statistics | Martin Willi | 2013-05-06 | 1 | -2/+5 | |
| | ||||||
* | child-sa: pass traffic selector to add_sa() regardless of IPsec mode | Martin Willi | 2013-05-06 | 1 | -14/+11 | |
| | | | | | This lets the kernel backend decide what to do with it, and in fact all kernel interfaces already handle this correctly. | |||||
* | Raise an ALERT_PROPOSAL_MISMATCH_CHILD also when receiving NO_PROPOSAL_CHOSEN | Martin Willi | 2013-05-06 | 1 | -0/+20 | |
| | ||||||
* | Raise an ALERT_PROPOSAL_MISMATCH_IKE also when receiving NO_PROPOSAL_CHOSEN | Martin Willi | 2013-05-06 | 1 | -0/+20 | |
| | ||||||
* | Don't unset IKE_SA on bus before we released virtual IPs and attributes | Martin Willi | 2013-05-06 | 1 | -10/+8 | |
| | ||||||
* | emit a single assig_vips bus message for all VIPs | Andreas Steffen | 2013-04-06 | 2 | -6/+10 | |
| | ||||||
* | ifmap plugin subscribes to assing_vip bus signal | Andreas Steffen | 2013-04-06 | 1 | -0/+6 | |
| | ||||||
* | Refactor check_for_rekeyed_child() in quick_mode task | Martin Willi | 2013-04-03 | 1 | -18/+24 | |
| | ||||||
* | Reuse reqid of an existing Quick Mode, even if it has been rekeyed | Martin Willi | 2013-04-03 | 1 | -1/+2 | |
| | | | | | | If two peers rekey Quick Modes at the same time, the original Quick Mode is in REKEYING state and hence the requid is not reused. This is required though, as two identical policies won't work if they have different requids. | |||||
* | Defer CHILD_SA rekeying if allocating an SPI fails | Martin Willi | 2013-04-03 | 2 | -12/+26 | |
| | ||||||
* | Fixed some typos, courtesy of codespell | Tobias Brunner | 2013-03-25 | 1 | -1/+1 | |
| | ||||||
* | Delete IKE_SAs if responder does not initiate XAuth exchange within a ↵ | Tobias Brunner | 2013-03-19 | 2 | -2/+16 | |
| | | | | certain time frame | |||||
* | Make sure that xauth-noauth is not used accidentally | Tobias Brunner | 2013-03-19 | 1 | -2/+5 | |
| | | | | It has to be selected explicitly with rightauth2=xauth-noauth. | |||||
* | Added xauth-noauth plugin | Tobias Brunner | 2013-03-19 | 1 | -29/+37 | |
| | | | | | | | | This XAuth backend does not do any authentication of client credentials but simply sends a successful XAuth status to the client, thereby concluding the XAuth exchange. This can be useful to fallback to basic RSA authentication with clients that can not be configured without XAuth authentication. | |||||
* | Make check whether to use IKEv1 fragmentation more readable | Martin Willi | 2013-03-14 | 1 | -5/+14 | |
| | ||||||
* | Raise an alert if an IKE_SA could not have been reauthenticated and expires | Martin Willi | 2013-03-14 | 1 | -0/+4 | |
| | ||||||
* | child_sa_t.get_usestats() can additionally return the number of processed ↵ | Martin Willi | 2013-03-14 | 5 | -7/+13 | |
| | | | | packets | |||||
* | kernel_ipsec_t.query_sa() additionally returns the number of processed packets | Martin Willi | 2013-03-14 | 1 | -3/+15 | |
| | ||||||
* | Add missing XAuthRespPSK switch case to IKEv1 key derivation | Martin Willi | 2013-03-12 | 1 | -0/+1 | |
| | ||||||
* | Clean up IKE_SA state if IKE_SA_INIT request does not have message ID 0 | Martin Willi | 2013-03-11 | 1 | -0/+4 | |
| | ||||||
* | Ignore fourth Qick Mode message sent by Windows servers. | Martin Willi | 2013-03-11 | 1 | -0/+9 | |
| | | | | Initial patch by Paul Stewart, fixes #289. | |||||
* | As Quick Mode initiator, select a subset of the proposed and the returned TS | Martin Willi | 2013-03-07 | 1 | -4/+11 | |
| | | | | | | | | Cisco 5505 firewalls don't return the port if we send a specific one, letting the is_contained_in() checks fail. Using get_subset() selection builds the Quick Mode correctly with the common subset of selectors. Based on an initial patch from Paul Stewart. | |||||
* | Merge branch 'multi-eap' | Martin Willi | 2013-03-01 | 2 | -28/+50 | |
|\ | | | | | | | | | | | Fixes the use of EAP methods in the non-first authentication round if the initiator demands mutual EAP. Also mutual EAP can now be enforced when the initiator sets rightauth=eap, not only with rightauth=any. | |||||
| * | Apply a mutual EAP auth_cfg not before the EAP method completes | Martin Willi | 2013-02-26 | 2 | -1/+18 | |
| | | ||||||
| * | Be a little more verbose why a peer_cfg is inacceptable | Martin Willi | 2013-02-26 | 1 | -8/+16 | |
| | | ||||||
| * | Refactor auth_cfg applying to a common function | Martin Willi | 2013-02-26 | 1 | -20/+17 | |
| | | ||||||
* | | Merge branch 'ikev1-rekeying' | Martin Willi | 2013-03-01 | 1 | -0/+21 | |
|\ \ | | | | | | | | | | | | | Migrates Quick Modes to the new Main Mode if an IKEv1 reauthentication replaces the old Main Mode having a uniqueids=replace policy. | |||||
| * | | When detecting a duplicate IKEv1 SA, adopt children, as it might be a rekeying | Martin Willi | 2013-02-20 | 1 | -0/+21 | |
| |/ | ||||||
* | | Merge branch 'opaque-ports' | Martin Willi | 2013-03-01 | 1 | -2/+2 | |
|\ \ | | | | | | | | | | | | | Adds a %opaque port option and support for port ranges in left/rightprotoport. Currently not supported by any of our kernel backends. | |||||
| * | | Use a complete port range in traffic_selector_create_from_{subnet,cidr} | Martin Willi | 2013-02-21 | 1 | -2/+2 | |
| | | | ||||||
* | | | Without MOBIKE, update remote host only if it is behind NAT | Martin Willi | 2013-03-01 | 1 | -2/+3 | |
| | | | ||||||
* | | | Merge branch 'ikev1-mm-retransmits' | Martin Willi | 2013-03-01 | 4 | -45/+55 | |
|\ \ \ | | | | | | | | | | | | | | | | | | | | | Fixes retransmit of the last Main Mode or IKE_AUTH message, and correctly queues Main Mode messages when processing of the last message is still in progress. | |||||
| * | | | For IKEv1 Main Mode, use message hash to detect early retransmissions | Martin Willi | 2013-02-25 | 1 | -10/+23 | |
| | | | | | | | | | | | | | | | | | | | | As the message ID is zero in all Main Mode messages, it can't be used to detect if we are already processing a given message. | |||||
| * | | | Move initial message dropping to task manager | Martin Willi | 2013-02-25 | 3 | -19/+27 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | When the last request message of the initial tunnel setup is retransmitted, we must retransmit the response instead of ignoring the request. Fixes #295. | |||||
| * | | | Use INIT macro to initialize IKE_SA manager entries | Martin Willi | 2013-02-25 | 1 | -17/+6 | |
| | |/ | |/| | ||||||
* | | | Merge branch 'tfc-notify' | Martin Willi | 2013-03-01 | 1 | -0/+9 | |
|\ \ \ | | | | | | | | | | | | | | | | | Introduces kernel backend features, sends ESP_TFC_PADDING_NOT_SUPPORTED if kernel does not support it. | |||||
| * | | | Send ESP_TFC_PADDING_NOT_SUPPORTED if the used kernel doesn't support it | Martin Willi | 2013-03-01 | 1 | -0/+9 | |
| | |/ | |/| | ||||||
* | | | Trigger an updown event when destroying an IKE_SA based on INITIAL_CONTACT | Tobias Brunner | 2013-02-28 | 1 | -0/+1 | |
| |/ |/| | | | | | | | In other cases (i.e. when functions return DESTROY_ME) the event should already be triggered, but not in this forced situation. | |||||
* | | Add a global return_success() method implementation | Martin Willi | 2013-02-14 | 1 | -8/+2 | |
| | |