Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | IMCs and IMVs might depend on X.509 certificates or trusted public keys | Andreas Steffen | 2012-06-28 | 2 | -0/+4 | |
| | ||||||
* | Show some uname() info in "ipsec statusall" | Martin Willi | 2012-06-28 | 1 | -3/+10 | |
| | ||||||
* | libcharon also requires kernel interfaces and a socket implementation | Tobias Brunner | 2012-06-27 | 1 | -0/+3 | |
| | ||||||
* | Defer quick mode initiation if we expect a mode config request | Martin Willi | 2012-06-27 | 1 | -1/+20 | |
| | ||||||
* | Queue a mode config task as responder if we need a virtual IP | Martin Willi | 2012-06-27 | 2 | -4/+16 | |
| | ||||||
* | Add basic support for XAuth responder authentication | Martin Willi | 2012-06-27 | 2 | -8/+10 | |
| | ||||||
* | Map XAuth responder authentication methods between IKEv1 and IKEv2 | Martin Willi | 2012-06-27 | 1 | -1/+13 | |
| | ||||||
* | Show remote EAP/XAuth identity in "statusall" on a separate line | Martin Willi | 2012-06-27 | 1 | -1/+12 | |
| | ||||||
* | Use static plugin features in libcharon to define essential dependencies | Tobias Brunner | 2012-06-27 | 1 | -1/+10 | |
| | ||||||
* | Ignore a received %any virtual IP for installation | Martin Willi | 2012-06-26 | 1 | -1/+2 | |
| | ||||||
* | Also build charon's IKEv1 implementation on Android | Tobias Brunner | 2012-06-26 | 1 | -0/+23 | |
| | ||||||
* | Missing source file added to libcharon's Android.mk | Tobias Brunner | 2012-06-26 | 1 | -0/+1 | |
| | ||||||
* | Make rescheduling a job more predictable | Tobias Brunner | 2012-06-25 | 2 | -12/+5 | |
| | | | | | | | | | | | | | This avoids race conditions between calls to cancel() and jobs that like to be rescheduled. If jobs were able to reschedule themselves it would theoretically be possible that two worker threads have the same job assigned (the one currently executing the job and the one executing the same but rescheduled job if it already is time to execute it), this means that cancel() could be called twice for that job. Creating a new job based on the current one and reschedule that is also OK, but rescheduling itself is more efficient for jobs that need to be executed often. | |||||
* | Centralized thread cancellation in processor_t | Tobias Brunner | 2012-06-25 | 18 | -182/+97 | |
| | | | | | | | | | | This ensures that no threads are active when plugins and the rest of the daemon are unloaded. callback_job_t was simplified a lot in the process as its main functionality is now contained in processor_t. The parent-child relationships were abandoned as these were only needed to simplify job cancellation. | |||||
* | Give processor_t more control over the lifecycle of a job | Tobias Brunner | 2012-06-25 | 20 | -64/+60 | |
| | | | | | | | | | | | Jobs are now destroyed by the processor, but they are allowed to reschedule themselves. That is, parts of the reschedule functionality already provided by callback_job_t is moved to the processor. Not yet fully supported is JOB_REQUEUE_DIRECT and canceling jobs. Note: job_t.destroy() is now called not only for queued jobs but also after execution or cancellation of jobs. job_t.status can be used to decide what to do in said method. | |||||
* | support Cisco Unity VID | Andreas Steffen | 2012-06-25 | 2 | -3/+11 | |
| | ||||||
* | Enforce uniqueids=keep based on XAuth identity | Martin Willi | 2012-06-25 | 1 | -0/+6 | |
| | ||||||
* | Don't send XAUTH_OK if a hook prevents SA to establish | Martin Willi | 2012-06-25 | 1 | -4/+14 | |
| | ||||||
* | Enforce uniqueids=keep only for non-XAuth Main/Agressive Modes | Martin Willi | 2012-06-25 | 2 | -28/+28 | |
| | ||||||
* | Show EAP/XAuth identity in "ipsec status", if available | Martin Willi | 2012-06-25 | 1 | -1/+1 | |
| | ||||||
* | Use XAuth/EAP remote identity for uniqueness check | Martin Willi | 2012-06-25 | 3 | -4/+6 | |
| | ||||||
* | Add missing XAuth name variable when complaining about missing XAuth backend | Martin Willi | 2012-06-25 | 1 | -1/+1 | |
| | ||||||
* | Fix SIGSEGV if kernel install fails during Quick Mode as responder. | Tobias Brunner | 2012-06-22 | 1 | -4/+8 | |
| | ||||||
* | Fixed compile error because of charon->name in certexpire plugin. | Tobias Brunner | 2012-06-21 | 1 | -0/+1 | |
| | ||||||
* | Select requested virtual IP family based on remote TS, if no local TS available | Martin Willi | 2012-06-20 | 1 | -1/+12 | |
| | ||||||
* | Adopt children as XAuth initiator (which is IKE responder) | Martin Willi | 2012-06-14 | 1 | -2/+2 | |
| | ||||||
* | Show what kind of *Swan we run in "ipsec status" | Martin Willi | 2012-06-14 | 1 | -3/+16 | |
| | ||||||
* | Require a scary option to respond to Aggressive Mode PSK requests | Martin Willi | 2012-06-14 | 1 | -0/+17 | |
| | | | | | | | | While Aggressive Mode PSK is widely used, it is known to be subject to dictionary attacks by passive attackers. We don't complain as initiator to be compatible with existing (insecure) setups, but require a scary strongswan.conf option if someone wants to use it as responder. | |||||
* | Use proper defines for IPV6_PKTINFO on Mac OS X Lion and newer. | Tobias Brunner | 2012-06-13 | 1 | -0/+2 | |
| | ||||||
* | Added signature scheme options left/rightauth | Martin Willi | 2012-06-12 | 1 | -11/+99 | |
| | ||||||
* | certificate_t->issued_by takes an argument to receive signature scheme | Martin Willi | 2012-06-12 | 2 | -3/+3 | |
| | ||||||
* | added missing parameter in get_my_addr() and get_other_addr() calls | Andreas Steffen | 2012-06-09 | 1 | -2/+4 | |
| | ||||||
* | implemented the right|leftallowany feature | Andreas Steffen | 2012-06-08 | 15 | -73/+131 | |
| | ||||||
* | Enforce uniqueness policy in IKEv1 main and aggressive modes | Martin Willi | 2012-06-08 | 2 | -0/+29 | |
| | ||||||
* | Try to rekey without KE exchange if peer returns INVALID_KE_PAYLOAD(NONE) | Martin Willi | 2012-06-08 | 1 | -1/+8 | |
| | | | | | | According to RFC5996, implementations should just ignore the KE payload if they select a non-PFS proposals. Some implementations don't, but return MODP_NONE in INVALID_KE_PAYLOAD, hence we accept that, too. | |||||
* | While checking for redundant quick modes, compare traffic selectors | Martin Willi | 2012-06-08 | 1 | -0/+22 | |
| | | | | | If a configuration is instanced more than once using narrowing, we should keep all unique quick modes up during rekeying. | |||||
* | Store shorter soft lifetime of in- and outbound SAs only | Martin Willi | 2012-06-08 | 1 | -1/+8 | |
| | ||||||
* | Initiate quick mode rekeying with narrowed traffic selectors | Martin Willi | 2012-06-08 | 1 | -1/+18 | |
| | ||||||
* | Use traffic selectors passed to quick mode constructor as initiator | Martin Willi | 2012-06-08 | 1 | -2/+10 | |
| | ||||||
* | Instead of rekeying, delete a quick mode if we have a fresher instance | Martin Willi | 2012-06-08 | 1 | -6/+42 | |
| | | | | | | | | If both peers initiate quick mode rekeying simultaneously, we end up with duplicate SAs for a configuration. This can't be avoided, nor do the standards provide an appropriate solution. Instead of closing one SA immediately, we keep both. But once rekeying triggers, we don't refresh the SA with the shorter soft lifetime, but delete it. | |||||
* | As responder, enforce the same configuration while rekeying CHILD_SAs | Martin Willi | 2012-06-06 | 3 | -1/+19 | |
| | ||||||
* | Show expiration time of rekeyed CHILD_SAs in statusall | Martin Willi | 2012-06-05 | 1 | -1/+6 | |
| | ||||||
* | Mark CHILD_SAs used for trap policies to uninstall them properly. | Tobias Brunner | 2012-06-04 | 1 | -6/+13 | |
| | | | | | | | If the installation failed the state is not CHILD_ROUTED which means the wrong priority is used to uninstall the policies. This is a problem for kernel interfaces that keep track of installed policies as now the proper policy is not found (if the priority is considered). | |||||
* | Avoid queueing more than one retry initiate job. | Tobias Brunner | 2012-05-30 | 3 | -4/+35 | |
| | ||||||
* | Retry IKE_SA initiation if DNS resolution failed. | Tobias Brunner | 2012-05-30 | 1 | -4/+39 | |
| | | | | | This is disabled by default and can be enabled with the charon.retry_initiate_interval option in strongswan.conf. | |||||
* | Job added to re-initiate an IKE_SA. | Tobias Brunner | 2012-05-30 | 3 | -0/+144 | |
| | ||||||
* | Fix MOBIKE address update if responder address changed. | Tobias Brunner | 2012-05-25 | 1 | -2/+2 | |
| | | | | | Use the source address of the current MOBIKE message as peer address instead of assuming the address cached on the IKE_SA is still valid. | |||||
* | Resolve hosts before reauthenticating due to address change. | Tobias Brunner | 2012-05-25 | 1 | -0/+2 | |
| | ||||||
* | Don't queue delete_ike_sa job when setting IKE_DELETING. | Tobias Brunner | 2012-05-25 | 2 | -9/+1 | |
| | | | | | This avoids deleting IKE_SAs during reauthentication (without trying to reestablish them). | |||||
* | During reauthentication reestablish IKE_SA even if deleting the old one fails. | Tobias Brunner | 2012-05-25 | 1 | -0/+6 | |
| |