Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | ikev1: Mark rekeyed CHILD_SAs as INSTALLED | Tobias Brunner | 2015-03-19 | 1 | -0/+2 | |
| | | | | | Since we keep them around until they finally expire they otherwise would block IKE_SA rekeying/reauthentication. | |||||
* | mem-pool: Remove entries without online or offline leases | Tobias Brunner | 2015-03-19 | 1 | -6/+22 | |
| | | | | | | This avoids filling up the hash table with unused/old identities. References #841. | |||||
* | kernel-handler: Log new endpoint if NAT mapping changed | Tobias Brunner | 2015-03-19 | 1 | -2/+3 | |
| | ||||||
* | child-sa: Remove policies before states to avoid acquire events for ↵ | Tobias Brunner | 2015-03-19 | 1 | -16/+16 | |
| | | | | untrapped policies | |||||
* | vici: Add support for python 3 | Björn Schuberg | 2015-03-18 | 5 | -8/+29 | |
| | ||||||
* | vici: Execute python tests during "check" if py.test is available | Martin Willi | 2015-03-18 | 1 | -0/+4 | |
| | ||||||
* | vici: Add test of Packet layer in python library | Björn Schuberg | 2015-03-18 | 1 | -1/+47 | |
| | ||||||
* | vici: Add test of Message (de)serialization in python library | Björn Schuberg | 2015-03-18 | 3 | -0/+100 | |
| | ||||||
* | vici: Evaluate Python streamed command results, and raise CommandException | Martin Willi | 2015-03-18 | 1 | -1/+10 | |
| | ||||||
* | vici: Catch Python GeneratorExit to properly cancel streamed event iteration | Martin Willi | 2015-03-18 | 2 | -1/+12 | |
| | ||||||
* | vici: Fall back to heap buffer when vararg printing on stack fails | Martin Willi | 2015-03-18 | 1 | -21/+44 | |
| | | | | This avoids failures when building log event messages including larger hexdumps. | |||||
* | vici: Return a Python generator instead of a list for streamed responses | Martin Willi | 2015-03-18 | 2 | -47/+25 | |
| | | | | | | | In addition that it may reduce memory usage and improve performance for large responses, it returns immediate results. This is important for longer lasting commands, such as initiate/terminate, where immediate log feedback is preferable when interactively calling such commands. | |||||
* | vici: Raise a Python CommandException instead of returning a CommandResult | Martin Willi | 2015-03-18 | 2 | -82/+42 | |
| | ||||||
* | vici: Add initial Python egg documentation to README | Martin Willi | 2015-03-18 | 1 | -0/+65 | |
| | ||||||
* | vici: Use OrderedDict to handle vici responses in Python library | Martin Willi | 2015-03-18 | 1 | -2/+3 | |
| | | | | | The default Python dictionaries are unordered, but order is important for some vici trees (for example the order of authentication rounds). | |||||
* | vici: Return authentication rounds with unique names | Martin Willi | 2015-03-18 | 1 | -1/+4 | |
| | | | | | | To simplify handling of authentication rounds in dictionaries/hashtables on the client side, we assign unique names to each authentication round when listing connection. | |||||
* | vici: Rebuild ruby gem on source file changes | Martin Willi | 2015-03-18 | 1 | -1/+1 | |
| | ||||||
* | vici: Use default Unix vici socket if none passed to ruby constructor | Martin Willi | 2015-03-18 | 2 | -4/+7 | |
| | | | | | While we currently have a static path instead of one generated with Autotools, this at least is congruent to what we have in the Python library. | |||||
* | vici: Support non-Unix sockets for vici connections using Python | Martin Willi | 2015-03-18 | 2 | -7/+9 | |
| | ||||||
* | vici: Add python egg setuptools building and installation using easy_install | Martin Willi | 2015-03-18 | 1 | -0/+15 | |
| | | | | | | An uninstall target is currently not supported, as there is no trivial way with either plain setuptools or with easy_install. pip would probably be the best choice, but we currently don't depend on it. | |||||
* | vici: Generate a version specific setup.py for setuptools installation | Martin Willi | 2015-03-18 | 3 | -0/+41 | |
| | ||||||
* | vici: Include python package in distribution | Martin Willi | 2015-03-18 | 2 | -0/+9 | |
| | ||||||
* | vici: Add python package MIT license | Björn Schuberg | 2015-03-18 | 2 | -0/+20 | |
| | ||||||
* | vici: Expose Session as a top-level symbol in python package | Björn Schuberg | 2015-03-18 | 1 | -0/+1 | |
| | ||||||
* | vici: Introduce main API Session class in python package | Björn Schuberg | 2015-03-18 | 1 | -1/+244 | |
| | ||||||
* | vici: Add a python vici command execution handler | Björn Schuberg | 2015-03-18 | 2 | -1/+134 | |
| | ||||||
* | vici: Add vici python protocol handler | Björn Schuberg | 2015-03-18 | 4 | -0/+199 | |
| | ||||||
* | encoding: Verify the length of KE payload data for known groups | Martin Willi | 2015-03-18 | 1 | -0/+67 | |
| | | | | | | | IKE is very strict in the length of KE payloads, and it should be safe to strictly verify their length. Not doing so is no direct threat, but allows DDoS amplification by sending short KE payloads for large groups using the target as the source address. | |||||
* | ikev2: Migrate MOBIKE additional peer addresses to new SA after IKE_SA rekeying | Martin Willi | 2015-03-18 | 1 | -0/+6 | |
| | ||||||
* | ikev2: Immediately initiate queued tasks after establishing rekeyed IKE_SA | Martin Willi | 2015-03-18 | 5 | -0/+176 | |
| | | | | | | If additional tasks get queued before/while rekeying an IKE_SA, these get migrated to the new IKE_SA. We previously did not trigger initiation of these tasks, though, leaving the task unexecuted until a new task gets queued. | |||||
* | vici: Use %u to print stats returned by mallinfo(3) | Tobias Brunner | 2015-03-13 | 1 | -4/+4 | |
| | | | | Fixes #886. | |||||
* | stroke: Use %u to print stats returned by mallinfo(3) | Tobias Brunner | 2015-03-13 | 1 | -1/+1 | |
| | | | | References #886. | |||||
* | eap-radius: Increase Acct-Session-ID string buffer | Martin Willi | 2015-03-13 | 1 | -1/+1 | |
| | | | | | | | | As the startup timestamp needs 10 characters, we only have left 4 characters for the IKE_SA unique identifier. This is insufficient when having 10000 IKE_SAs or more established, resulting in non-unique session identifiers. Fixes #889. | |||||
* | ikev2: Don't set old IKE_SA to REKEYING state during make-before-break reauth | Martin Willi | 2015-03-11 | 1 | -1/+0 | |
| | | | | | | | | | We are actually not in rekeying state, but just trigger a separate, new IKE_SA as a replacement for the current IKE_SA. Switching to the REKEYING state disables the invocation of both IKE and CHILD_SA updown hooks as initiator, preventing the removal of any firewall rules. Fixes #885. | |||||
* | ha: Destroy synced IKE_SA if no configuration is found during update | Martin Willi | 2015-03-10 | 1 | -0/+3 | |
| | ||||||
* | ikev1: Don't handle DPD timeout job if IKE_SA got passive | Martin Willi | 2015-03-10 | 1 | -0/+6 | |
| | | | | | | While a passively installed IKE_SA does not queue a DPD timeout job, one that switches from active to passive might execute it. Ignore such a queued job if the IKE_SA is in passive state. | |||||
* | libipsec: Pass separate inbound/update flags to the IPsec SA manager | Martin Willi | 2015-03-09 | 1 | -1/+2 | |
| | | | | | Similar to other kernel interfaces, the libipsec backends uses the flag for different purposes, and therefore should get separate flags. | |||||
* | kernel-interface: Add a separate "update" flag to add_sa() | Martin Willi | 2015-03-09 | 4 | -4/+4 | |
| | | | | | | | | | | | The current "inbound" flag is used for two purposes: To define the actual direction of the SA, but also to determine the operation used for SA installation. If an SPI has been allocated, an update operation is required instead of an add. While the inbound flag normally defines the kind of operation required, this is not necessarily true in all cases. On the HA passive node, we install inbound SAs without prior SPI allocation. | |||||
* | Revert "child-sa: Remove the obsolete update logic" | Martin Willi | 2015-03-09 | 1 | -1/+6 | |
| | | | | | | | | | While the the meaning of the "inbound" flag on the kernel_interface->add_sa() call is not very clear, we still need that update logic to allow installation of inbound SAs without SPI allocation. This is used in the HA plugin as a passive node. This reverts commit 698ed656. | |||||
* | Revert "ha: Always install the CHILD_SAs with the inbound flag set to FALSE" | Martin Willi | 2015-03-09 | 1 | -2/+2 | |
| | | | | | | | | While this change results in the correct add/update flag during installation, it exchanges all other values in the child_sa->install() call. We should pass the correct flag, but determine the add/update flag by other means. This reverts commit e722ee5d. | |||||
* | ikev2: Move code in pubkey authenticator's build() method into separate ↵ | Tobias Brunner | 2015-03-09 | 1 | -85/+123 | |
| | | | | functions | |||||
* | ikev2: Try all eligible signature schemes | Tobias Brunner | 2015-03-09 | 1 | -34/+71 | |
| | | | | | | Previously, we failed without recovery if a private key did not support a selected signature scheme (based on key strength and the other peer's supported hash algorithms). | |||||
* | daemon: Remove scheduled jobs before unloading plugins | Tobias Brunner | 2015-03-09 | 1 | -1/+2 | |
| | | | | | | | Especially callback jobs might refer to memory that gets invalid after the plugins got unlaoded, so make sure we destroy these jobs before. References #840. | |||||
* | Make access requestor IP address available to TNC server | Andreas Steffen | 2015-03-08 | 2 | -12/+39 | |
| | ||||||
* | ikev1: Set protocol ID and SPIs in INITIAL-CONTACT notification payloads | Tobias Brunner | 2015-03-06 | 1 | -2/+13 | |
| | | | | | | | The payload we sent before is not compliant with RFC 2407 and thus some peers might abort negotiation (e.g. with an INVALID-PROTOCOL-ID error). Fixes #819. | |||||
* | ikev2: Try all RSA signature schemes if none is configured | Tobias Brunner | 2015-03-04 | 1 | -4/+19 | |
| | ||||||
* | ikev2: Consider signature schemes in rightauth when sending hash algorithms | Tobias Brunner | 2015-03-04 | 1 | -14/+54 | |
| | ||||||
* | keymat: Use hash algorithm set | Tobias Brunner | 2015-03-04 | 1 | -29/+7 | |
| | ||||||
* | ikev2: Add an option to disable constraints against signature schemes | Tobias Brunner | 2015-03-04 | 1 | -1/+11 | |
| | | | | | | | | | | If this is disabled the schemes configured in `rightauth` are only checked against signature schemes used in the certificate chain and signature schemes used during IKEv2 are ignored. Disabling this could be helpful if existing connections with peers that don't support RFC 7427 use signature schemes in `rightauth` to verify certificate chains. | |||||
* | stroke: Enable BLISS-based public key constraints | Tobias Brunner | 2015-03-04 | 1 | -4/+19 | |
| |