Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | treat IF-M and IF-TNCCS remediation instructions/parameters in an equal way | Andreas Steffen | 2013-02-19 | 3 | -97/+198 |
| | |||||
* | Streamlined log messages in ipseckey plugin | Andreas Steffen | 2013-02-19 | 2 | -58/+30 |
| | |||||
* | ipseckey: Report IPSECKEYs with invalid DNSSEC security state | Reto Guadagnini | 2013-02-19 | 1 | -2/+12 |
| | |||||
* | ipseckey: Added "enable" option for the IPSECKEY plugin to strongswan.conf | Reto Guadagnini | 2013-02-19 | 1 | -3/+16 |
| | |||||
* | Added ipseckey plugin, which provides support for public keys in IPSECKEY RRs | Reto Guadagnini | 2013-02-19 | 8 | -0/+859 |
| | |||||
* | added missing return statement | Andreas Steffen | 2013-02-19 | 1 | -0/+1 |
| | |||||
* | reject PB-Experimental messages with NOSKIP flag set | Andreas Steffen | 2013-02-19 | 1 | -0/+7 |
| | |||||
* | Add a timeout to clean up PDP RADIUS connections | Martin Willi | 2013-02-14 | 1 | -0/+51 |
| | |||||
* | Keep the PDP connections lock while accessing its objects | Martin Willi | 2013-02-14 | 3 | -7/+34 |
| | | | | | | When we introduce connection timeouts, the state may disappear at any time. This change prevents that, but is not very clear. We probably have to refactor connection handling. | ||||
* | Add locking to TNC-PDP connections | Martin Willi | 2013-02-14 | 1 | -7/+23 |
| | |||||
* | Add a global return_success() method implementation | Martin Willi | 2013-02-14 | 1 | -8/+2 |
| | |||||
* | Merge branch 'ike-dscp' | Martin Willi | 2013-02-14 | 13 | -59/+163 |
|\ | |||||
| * | Add a ikedscp ipsec.conf option to set DSCP value on outgoing IKE packets | Martin Willi | 2013-02-06 | 1 | -1/+1 |
| | | |||||
| * | Set configured DSCP value while generating IKE packets | Martin Willi | 2013-02-06 | 1 | -1/+26 |
| | | |||||
| * | Add a DSCP configuration value to IKE configs | Martin Willi | 2013-02-06 | 11 | -21/+38 |
| | | |||||
| * | Set DSCP values when sending IP packets in socket-default | Martin Willi | 2013-02-06 | 1 | -1/+65 |
| | | |||||
| * | Don't send a packet in default socket if family is not IPv4 nor IPv6 | Martin Willi | 2013-02-06 | 1 | -12/+18 |
| | | |||||
| * | Avoid extensive casting of sockaddr types in socket-default by using a union | Martin Willi | 2013-02-06 | 1 | -24/+16 |
| | | | | | | | | Additionally fixes a strict-aliasing rule compiler warning with older gcc. | ||||
* | | Check if recommendations is set before applying language preference | Martin Willi | 2013-02-14 | 1 | -3/+6 |
| | | |||||
* | | Merge branch 'pt-tls' | Martin Willi | 2013-02-14 | 3 | -9/+0 |
|\ \ | |||||
| * | | TNCCS plugins don't depend on EAP-TNC, but can be used by other transports, too | Martin Willi | 2013-01-15 | 3 | -9/+0 |
| | | | |||||
* | | | Fix 'stroke loglevel any' | Tobias Brunner | 2013-02-13 | 1 | -4/+11 |
| | | | | | | | | | | | | | | | | | | | | | Before b46a5cd4 this worked if debug_t was unsigned. In that case -1, as returned by enum_from_name(), would result in a large positive number. So any unknown debug group (including 'any') had the same effect that was only intended for 'any'. | ||||
* | | | treat EAP identities as user IDs | Andreas Steffen | 2013-02-12 | 1 | -3/+3 |
| | | | |||||
* | | | make TNC client authentication type available to IMVs | Andreas Steffen | 2013-02-12 | 9 | -27/+204 |
| | | | |||||
* | | | determine underlying IF-T transport protocol | Andreas Steffen | 2013-02-12 | 10 | -62/+184 |
| | | | |||||
* | | | make AR identities available to IMVs via IF-IMV 1.4 draft | Andreas Steffen | 2013-02-11 | 5 | -0/+146 |
| | | | |||||
* | | | Make IKE/EAP IDs available to TNC server/client | Andreas Steffen | 2013-02-11 | 8 | -24/+81 |
| | | | |||||
* | | | Allow more than one CERTREQ payload for IKEv2 | Tobias Brunner | 2013-02-08 | 1 | -2/+2 |
| |/ |/| | | | | | | | | | There is no reason not to do so (RFC 5996 explicitly mentions multiple CERTREQ payloads) and some implementations seem to use the same behavior as had to be used with IKEv1 (i.e. each CA in its own CERTREQ payload). | ||||
* | | Use proper buffer sizes for parse_smartcard() | Tobias Brunner | 2013-01-24 | 1 | -7/+10 |
| | | |||||
* | | Removed unused command name when printing usage info for lookip | Tobias Brunner | 2013-01-24 | 1 | -1/+1 |
| | | |||||
* | | Fix check-in of IKE_SA when IKE_SA_INIT fails and hash table is enabled | Tobias Brunner | 2013-01-24 | 1 | -2/+13 |
| | | | | | | | | | | | | | | Setting the responder SPI to 0 can only be done while generating the response, otherwise we'd fail to check in the IKE_SA again in case the hash table is enabled. That's because we use the responder SPI as hash value since 5.0.0. | ||||
* | | Avoid a deadlock when installing a trap policy failed | Tobias Brunner | 2013-01-23 | 1 | -1/+5 |
| | | |||||
* | | Fix IKE SA inherit API doc | Adrian-Ken Rueegsegger | 2013-01-22 | 1 | -2/+1 |
| | | |||||
* | | Filter TS list for Split-Includes before printing them to debug log | Martin Willi | 2013-01-21 | 1 | -10/+34 |
|/ | |||||
* | Properly send IKEv1 packets if no ike_cfg is known yet | Tobias Brunner | 2013-01-14 | 1 | -2/+5 |
| | | | | This applies for error notifies. | ||||
* | Don't handle right=%any6 as "loose" identity, but as %any | Martin Willi | 2013-01-14 | 1 | -2/+1 |
| | |||||
* | Merge branch 'ikev1-fragmentation' | Tobias Brunner | 2013-01-12 | 25 | -55/+832 |
|\ | | | | | | | | | | | | | This adds support for the proprietary IKEv1 fragmentation extension. Conflicts: NEWS | ||||
| * | Added an option to configure the maximum size of a fragment | Tobias Brunner | 2013-01-12 | 1 | -3/+10 |
| | | |||||
| * | Properly detect fragmentation capabilities | Tobias Brunner | 2013-01-12 | 1 | -3/+27 |
| | | | | | | | | Cisco sends 0xc0000000 so we check that part of the VID separately. | ||||
| * | Added an option that allows to force IKEv1 fragmentation | Tobias Brunner | 2013-01-12 | 12 | -19/+43 |
| | | |||||
| * | Use a connection specific option to en-/disable IKEv1 fragmentation | Tobias Brunner | 2012-12-24 | 13 | -25/+47 |
| | | |||||
| * | Include source port in init hash for fragmented messages | Tobias Brunner | 2012-12-24 | 1 | -1/+8 |
| | | |||||
| * | Add an option to en-/disable IKE fragmentation | Tobias Brunner | 2012-12-24 | 2 | -5/+20 |
| | | | | | | | | | | Fragments are always accepted but will not be sent if disabled. The vendor ID is only sent if the option is enabled. | ||||
| * | Split larger messages into fragments if IKE fragmentation is supported by peer | Tobias Brunner | 2012-12-24 | 1 | -14/+114 |
| | | |||||
| * | Log message size for in- and outbound IKE messages | Tobias Brunner | 2012-12-24 | 2 | -4/+7 |
| | | |||||
| * | Add support to create IKE fragments | Tobias Brunner | 2012-12-24 | 2 | -0/+30 |
| | | | | | | | | | | All fragments currently use the same fragment ID (1) as that's what other implementations are doing. | ||||
| * | Log added NAT-T vendor IDs | Tobias Brunner | 2012-12-24 | 1 | -0/+1 |
| | | |||||
| * | Detect a peer's support for IKE fragmentation | Tobias Brunner | 2012-12-24 | 2 | -0/+9 |
| | | | | | | | | Fragments are accepted even if this vendor ID is not seen. | ||||
| * | Map fragmented initial initial Main or Aggressive Mode messages to the same ↵ | Tobias Brunner | 2012-12-24 | 1 | -1/+17 |
| | | | | | | | | IKE_SA | ||||
| * | Allow ID_PROT/AGGRESSIVE messages for established IKE_SAs if they contain ↵ | Tobias Brunner | 2012-12-24 | 1 | -1/+2 |
| | | | | | | | | | | | | | | fragments Other implementations send fragments always in an initial message type even for transaction or quick mode exchanges. |