Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | capabilities: Some plugins don't actually require capabilities at runtime | Tobias Brunner | 2013-07-18 | 1 | -1/+1 | |
| | ||||||
* | automake: replace INCLUDES by AM_CPPFLAGS | Martin Willi | 2013-07-18 | 8 | -32/+44 | |
| | | | | | | INCLUDES are now deprecated and throw warnings when using automake 1.13. We now also differentiate AM_CPPFLAGS and AM_CFLAGS, where includes and defines are passed to AM_CPPFLAGS only. | |||||
* | kernel-pfroute: Ignore IP address changes if address is %any | Tobias Brunner | 2013-07-17 | 1 | -1/+2 | |
| | ||||||
* | kernel-pfroute: Properly enumerate sockaddrs in interface messages | Tobias Brunner | 2013-07-17 | 1 | -9/+26 | |
| | | | | | The ifa_msghdr and rt_msghdr structs are not compatible (at least not on FreeBSD). | |||||
* | kernel-pfroute: Provide name of interfaces on which virtual IPs are installed | Tobias Brunner | 2013-07-17 | 2 | -1/+23 | |
| | ||||||
* | kernel-pfroute: Ignore virtual IPs in address map | Tobias Brunner | 2013-07-17 | 1 | -13/+9 | |
| | | | | | As the virtual flag is set after the address has been added to the map, we make sure we ignore virtual IPs when doing lookups. | |||||
* | kernel-pfroute: Make sure source addresses are not virtual and usable | Tobias Brunner | 2013-07-17 | 1 | -4/+20 | |
| | | | | | | | It seems we sometimes get the virtual IP as source (with rightsubnet=0.0.0.0/0) even if the exclude route is already installed. Might be a timing issue because shortly afterwards the lookup seems to succeed. | |||||
* | kernel-pfroute: Don't report an error when trying to reinstall a route | Tobias Brunner | 2013-07-17 | 1 | -0/+4 | |
| | ||||||
* | kernel-pfkey: Provide interface name when installing exclude route | Tobias Brunner | 2013-07-17 | 1 | -4/+15 | |
| | ||||||
* | kernel-pfroute: Reinstall routes on interface/address changes | Tobias Brunner | 2013-07-17 | 1 | -7/+320 | |
| | ||||||
* | kernel-pfroute: Trigger a roam event if a new interface appears | Tobias Brunner | 2013-07-17 | 1 | -0/+4 | |
| | ||||||
* | kernel-pfroute: Use ref_get() to allocate sequence numbers | Tobias Brunner | 2013-07-17 | 1 | -3/+3 | |
| | ||||||
* | kernel-pfroute: Make time that is waited for VIPs to appear configurable | Tobias Brunner | 2013-07-17 | 1 | -2/+11 | |
| | | | | | One second might be too short for IPs to appear/disappear, especially on virtualized hosts. | |||||
* | kernel-pfroute: Retry route lookup without source address on failure | Tobias Brunner | 2013-07-17 | 1 | -1/+16 | |
| | | | | | The known source address might be gone resulting in an error, making learning a new source address impossible. | |||||
* | kernel-pfkey: Remove latest IPsec SA mapping when deleting a policy | Tobias Brunner | 2013-07-17 | 1 | -5/+12 | |
| | | | | | | | | | | | If IPsec SAs are rekeyed due to an address change (e.g. because update_sa is not supported) the exact same policy with the same reqid will be installed, but with different addresses. After the rekeying the old SA and its policies are removed, using the first matching mapping breaks the mapping between the policies and the new SA (at least on FreeBSD, the Linux kernel might only use the reqid for this). Using the oldest matching SA is still an approximation but it solves the above issue. | |||||
* | kernel-pfkey: Correctly handle IPSEC_PROTO_ANY in an acquire | Tobias Brunner | 2013-07-17 | 1 | -2/+5 | |
| | ||||||
* | linked-list: Remove barely used find_last() method | Tobias Brunner | 2013-07-17 | 2 | -5/+6 | |
| | ||||||
* | Use strpfx() helper where appropriate | Tobias Brunner | 2013-07-08 | 2 | -3/+3 | |
| | ||||||
* | attr-sql: Add unity_split_exclude as alias for unity_local_lan | Tobias Brunner | 2013-07-08 | 1 | -0/+1 | |
| | ||||||
* | attr-sql: Fix double free when adding subnets for unknown attribute types | Tobias Brunner | 2013-07-08 | 1 | -0/+1 | |
| | ||||||
* | plugin-loader: Removed unused path argument of load() method | Tobias Brunner | 2013-06-28 | 1 | -1/+1 | |
| | | | | | Multiple additional search paths can be added with the add_path() method. | |||||
* | kernel-netlink: Make CAP_NET_ADMIN capability optional | Tobias Brunner | 2013-06-25 | 1 | -3/+4 | |
| | | | | It is not required to use the kernel-net part of the plugin. | |||||
* | capabilities: Only plugins that require CAP_NET_ADMIN demand it | Tobias Brunner | 2013-06-25 | 2 | -0/+13 | |
| | | | | The daemon as such does not require this capability. | |||||
* | capabilities: Move global capabilities_t instance to libstrongswan | Tobias Brunner | 2013-06-25 | 1 | -1/+0 | |
| | ||||||
* | kernel-pfroute: Simplify route lookup after fixing sockaddr parsing | Tobias Brunner | 2013-06-21 | 1 | -90/+19 | |
| | ||||||
* | kernel-pfroute: Alignment of sockaddrs is not always the same | Tobias Brunner | 2013-06-21 | 1 | -1/+8 | |
| | ||||||
* | kernel-pfroute: struct sockaddr arguments are 4 byte aligned | Tobias Brunner | 2013-06-21 | 1 | -4/+8 | |
| | | | | | | | | | This was noticed on Mac OS X where, if the default route is returned, RTA_NETMASK has sa_len set to 0, but skipping zero bytes to read the next address makes no sense, of course. Using 0 for sa_len seems a bit strange, in particular, because struct sockaddr has by definition a minimum length of 16 bytes. But it seems FreeBSD actually does the same. | |||||
* | kernel-pfroute: Improve route lookup depending on information we get back | Tobias Brunner | 2013-06-21 | 1 | -12/+96 | |
| | | | | Kernels don't provide the same information for all routes. | |||||
* | kernel-pfroute: Try to ensure we get a source address or interface name | Tobias Brunner | 2013-06-21 | 1 | -0/+6 | |
| | ||||||
* | kernel-libipsec: Add a feature to request UDP encapsulation of ESP packets | Tobias Brunner | 2013-06-21 | 1 | -0/+2 | |
| | ||||||
* | kernel-pfroute: Use DST as nexthop for host routes | Tobias Brunner | 2013-06-21 | 1 | -0/+6 | |
| | | | | These are created as cache/clone on Mac OS X. | |||||
* | kernel-pfroute: Implement get_source_addr() | Tobias Brunner | 2013-06-21 | 1 | -12/+27 | |
| | ||||||
* | kernel-pfroute: Properly install routes with interface and gateway | Tobias Brunner | 2013-06-21 | 1 | -5/+6 | |
| | ||||||
* | kernel-pfroute: Activate TUN device before setting address | Tobias Brunner | 2013-06-21 | 1 | -1/+1 | |
| | | | | | On FreeBSD, for some reason, we don't learn the interface is up otherwise. Even though ifconfig lists it as up at the same time. | |||||
* | kernel-pfroute: Raise tun event when creating/destroying TUN devices for ↵ | Tobias Brunner | 2013-06-21 | 1 | -1/+6 | |
| | | | | virtual IPs | |||||
* | kernel: Add an event kernel interfaces can raise if they create/destroy a ↵ | Tobias Brunner | 2013-06-21 | 3 | -5/+43 | |
| | | | | TUN device | |||||
* | kernel-netlink: Routes don't require a gateway/nexthop | Tobias Brunner | 2013-06-21 | 1 | -5/+9 | |
| | ||||||
* | kernel-netlink: install selectors on SA for transport/BEET mode without ↵ | Martin Willi | 2013-06-19 | 1 | -0/+6 | |
| | | | | | | | | proto/port If a transport/BEET SA has different selectors for different proto/ports, installing just the proto/port of the first SA would break any additional selector. | |||||
* | kernel-netlink: reject policy refcount if the reqid differs | Martin Willi | 2013-06-19 | 1 | -4/+17 | |
| | | | | | | | | | | | | | Previously we silently replaced an existing policy with a new one if the reqid changed for the same selectors. This will break an old policy in the favour of the new one (for example if two clients behind the same NAT use transport mode). With this change any new policy gets rejected if the reqid differs. This will make sure we break no existing policy. For rekeying and acquires we still can have overlapping policies (as we use the same reqid), but for unrelated connections this is not true anymore (it wasn't actually before, we just silently broke the existing policy). | |||||
* | kernel-interface: add an exchange initiator parameter to add_sa() | Martin Willi | 2013-06-11 | 6 | -10/+13 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This new flag gives the kernel-interface a hint how it should priorize the use of newly installed SAs during rekeying. Consider the following rekey procedure in IKEv2: Initiator --- Responder I1 -------CREATE-------> R1 I2 <------CREATE-------- -------DELETE-------> R2 I3 <------DELETE-------- SAs are always handled as pairs, the following happens at the SA level: * Initiator starts the exchange at I1 * Responder installs new SA pair at R1 * Initiator installs new SA pair at I2 * Responder removes old SA pair at R2 * Initiator removes old SA pair at I3 This makes sure SAs get installed/removed overlapping during rekeying. However, to avoid any packet loss, it is crucial that the new outbound SA gets activated at the correct position: * as exchange initiator, in I2 * as exchange responder, in R2 This should guarantee that we don't use the new outbound SA before the peer could install its corresponding inbound SA. The new parameter allows the kernel backend to install the new SA with appropriate priorities, i.e. it should: * as exchange inititator, have the new outbound SA installed with higher priority than the old SA * as exchange responder, have the new outbound SA installed with lower priority than the old SA While we could split up the SA installation at the responder, this approach has another advantage: it allows the kernel backend to switch SAs based on other criteria, for example when receiving traffic on the new inbound SA. | |||||
* | resolve: Use plugin features to register attribute handler | Tobias Brunner | 2013-06-11 | 2 | -4/+31 | |
| | ||||||
* | attr: Use plugin features to register attribute provider | Tobias Brunner | 2013-06-11 | 1 | -2/+31 | |
| | ||||||
* | attr-sql: Use plugin features with dependency to database backend | Tobias Brunner | 2013-06-11 | 1 | -24/+53 | |
| | ||||||
* | attr: Fix handling of invalid IPs listed after valid ones | Tobias Brunner | 2013-06-05 | 1 | -1/+1 | |
| | | | | | Invalid IPs listed after a valid one resulted in an attribute of the same type but with invalid data. | |||||
* | attr: fix a compiler warning that family is used uninitialized (seen with -Os) | Martin Willi | 2013-06-05 | 1 | -2/+13 | |
| | ||||||
* | kernel-netlink: add outer addresses to policy when using BEET mode | Michael Rossberg | 2013-05-24 | 1 | -1/+1 | |
| | ||||||
* | kernel-pfroute: allow only one thread to do a route look up simultaneously | Martin Willi | 2013-05-06 | 1 | -1/+8 | |
| | | | | Otherwise we mess up the sequence number another thread is waiting for. | |||||
* | kernel-interface: query SAD for last use time if SPD query didn't yield one | Martin Willi | 2013-05-06 | 6 | -8/+28 | |
| | ||||||
* | kernel-pfkey: be less verbose about unexpected sequence numbers | Martin Willi | 2013-05-06 | 1 | -1/+1 | |
| | ||||||
* | kernel-pfkey: install exclude routes if kernel-net requires them | Martin Willi | 2013-05-06 | 1 | -0/+152 | |
| |