Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
| * | | | After merging the used trustchain with config, move used certificate to front | Martin Willi | 2013-01-18 | 1 | -0/+24 | |
| | | | | ||||||
| * | | | Try to build a trustchain for all configured certificates before enforcing one | Martin Willi | 2013-01-18 | 1 | -1/+29 | |
| | | | | | | | | | | | | | | | | | | | | This enables the daemon to select from multiple configured certificates by building trustchains against the received certificate requests. | |||||
| * | | | Load multiple comma seperarated certificates in the leftcert option | Martin Willi | 2013-01-18 | 1 | -15/+32 | |
| | | | | ||||||
| * | | | Make AUTH_RULE_SUBJECT cert multi-valued | Martin Willi | 2013-01-18 | 1 | -11/+24 | |
| | | | | | | | | | | | | | | | | | | | | Constraints having multiple subject certs defined are fulfilled if authentication used one of the listed certificates. | |||||
* | | | | Merge branch 'systime' | Martin Willi | 2013-03-01 | 8 | -10/+521 | |
|\ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | Add a systime-fix plugin allowing an embedded system to validate certificates if the system time has not been synchronized after boot. Certificates of established tunnels can be re-validated after the system time gets valid. | |||||
| * | | | | systime-fix disables certificate lifetime validation if system time not synced | Martin Willi | 2013-02-19 | 4 | -0/+326 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The system time can be periodically checked. If it gets valid, certificates get rechecked with the current lifetime. If certificates are invalid, associated IKE_SAs can be closed or reauthenticated. | |||||
| * | | | | Add a stub for systime-fix, a plugin handling certificate lifetimes gracefully | Martin Willi | 2013-02-19 | 4 | -0/+126 | |
| | | | | | ||||||
| * | | | | Add a cert_validator hook allowing plugins to provide custom lifetime checking | Martin Willi | 2013-02-19 | 2 | -10/+64 | |
| | | | | | ||||||
| * | | | | Make cert_validator_t.validate optional to implement | Martin Willi | 2013-02-19 | 2 | -0/+5 | |
| | |_|/ | |/| | | ||||||
* | | | | Merge branch 'ikev1-rekeying' | Martin Willi | 2013-03-01 | 2 | -0/+25 | |
|\ \ \ \ | | | | | | | | | | | | | | | | | | | | | Migrates Quick Modes to the new Main Mode if an IKEv1 reauthentication replaces the old Main Mode having a uniqueids=replace policy. | |||||
| * | | | | After IKEv1 reauthentication, reinstall VIP routes after migrating CHILD_SAs | Martin Willi | 2013-02-20 | 1 | -0/+4 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | During IKEv1 reauthentication, the virtual IP gets removed, then reinstalled. The CHILD_SAs get migrated, but any associated route gets removed from the kernel. Reinstall routes after adding the virtual IP again. | |||||
| * | | | | When detecting a duplicate IKEv1 SA, adopt children, as it might be a rekeying | Martin Willi | 2013-02-20 | 1 | -0/+21 | |
| | | | | | ||||||
* | | | | | Merge branch 'vip-shunts' | Martin Willi | 2013-03-01 | 2 | -15/+19 | |
|\ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Installs bypass policies for the physical address if a virtual address is assigned, and installs a proper source route to actually use the physical address for bypassed destinations. Conflicts: src/libcharon/plugins/unity/unity_handler.c | |||||
| * | | | | | Install a route for shunt policies | Martin Willi | 2013-02-20 | 1 | -5/+13 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If we install a virtual IP, its source route would render the shunt policy useless, as locally generated traffic wouldn't match. Having a route for each shunt policy with higher priority chooses the correct source address for bypassed destinations. | |||||
| * | | | | | Include local address for Unity Split-Exclude shunt policies | Martin Willi | 2013-02-20 | 1 | -10/+5 | |
| |/ / / / | | | | | | | | | | | | | | | | | | | | | If we use a virtual IP, having a shunt policy for just that wouldn't work, as we want a shunt bypass using the local address. | |||||
* | | | | | Merge branch 'opaque-ports' | Martin Willi | 2013-03-01 | 18 | -118/+191 | |
|\ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | Adds a %opaque port option and support for port ranges in left/rightprotoport. Currently not supported by any of our kernel backends. | |||||
| * | | | | | Don't reject OPAQUE ports while verifying traffic selector substructure | Martin Willi | 2013-02-21 | 1 | -1/+5 | |
| | | | | | | ||||||
| * | | | | | Optionally support port ranges in leftprotoport | Martin Willi | 2013-02-21 | 1 | -4/+20 | |
| | | | | | | ||||||
| * | | | | | Support %opaque keyword in leftprotoport for "opaque" ports | Martin Willi | 2013-02-21 | 1 | -0/+5 | |
| | | | | | | ||||||
| * | | | | | Pass complete port range over stroke interface for more flexibility | Martin Willi | 2013-02-21 | 7 | -24/+21 | |
| | | | | | | ||||||
| * | | | | | Use a complete port range in traffic_selector_create_from_{subnet,cidr} | Martin Willi | 2013-02-21 | 11 | -36/+46 | |
| | | | | | | ||||||
| * | | | | | Print OPAQUE traffic selectors as what they are, not as port range | Martin Willi | 2013-02-21 | 1 | -0/+4 | |
| | | | | | | ||||||
| * | | | | | Support "opaque" ports in traffic selector subset calculation | Martin Willi | 2013-02-21 | 1 | -6/+32 | |
| | | | | | | ||||||
| * | | | | | Slightly refactor traffic_selector_t.get_subset() | Martin Willi | 2013-02-21 | 1 | -61/+68 | |
| | | | | | | ||||||
| * | | | | | Migrate remaining traffic selector methods to METHOD macro | Martin Willi | 2013-02-21 | 1 | -19/+18 | |
| | |/ / / | |/| | | | ||||||
* | | | | | When running with an unprivileged user, initialize supplementary groups | Martin Willi | 2013-03-01 | 1 | -1/+37 | |
| | | | | | ||||||
* | | | | | Without MOBIKE, update remote host only if it is behind NAT | Martin Willi | 2013-03-01 | 1 | -2/+3 | |
| | | | | | ||||||
* | | | | | Merge branch 'ikev1-mm-retransmits' | Martin Willi | 2013-03-01 | 4 | -45/+55 | |
|\ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes retransmit of the last Main Mode or IKE_AUTH message, and correctly queues Main Mode messages when processing of the last message is still in progress. | |||||
| * | | | | | For IKEv1 Main Mode, use message hash to detect early retransmissions | Martin Willi | 2013-02-25 | 1 | -10/+23 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | As the message ID is zero in all Main Mode messages, it can't be used to detect if we are already processing a given message. | |||||
| * | | | | | Move initial message dropping to task manager | Martin Willi | 2013-02-25 | 3 | -19/+27 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When the last request message of the initial tunnel setup is retransmitted, we must retransmit the response instead of ignoring the request. Fixes #295. | |||||
| * | | | | | Use INIT macro to initialize IKE_SA manager entries | Martin Willi | 2013-02-25 | 1 | -17/+6 | |
| | | | | | | ||||||
* | | | | | | Merge branch 'tfc-notify' | Martin Willi | 2013-03-01 | 6 | -2/+68 | |
|\ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Introduces kernel backend features, sends ESP_TFC_PADDING_NOT_SUPPORTED if kernel does not support it. | |||||
| * | | | | | | Send ESP_TFC_PADDING_NOT_SUPPORTED if the used kernel doesn't support it | Martin Willi | 2013-03-01 | 1 | -0/+9 | |
| | | | | | | | ||||||
| * | | | | | | Indicate support for processing ESPv3 TFC padding in Netlink IPsec backend | Martin Willi | 2013-03-01 | 1 | -1/+7 | |
| | | | | | | | ||||||
| * | | | | | | Introduce "features" for the kernel backends returning kernel capabilities | Martin Willi | 2013-03-01 | 4 | -1/+52 | |
| | |/ / / / | |/| | | | | ||||||
* | | | | | | openssl: Provide AES-GCM implementation | Tobias Brunner | 2013-02-28 | 4 | -1/+312 | |
| | | | | | | ||||||
* | | | | | | Fix cleanup in crypto_tester if AEAD implementation fails | Tobias Brunner | 2013-02-28 | 1 | -1/+4 | |
| | | | | | | ||||||
* | | | | | | Order of arguments in Doxygen comment fixed | Tobias Brunner | 2013-02-28 | 2 | -2/+2 | |
| | | | | | | ||||||
* | | | | | | Fix auth_cfg_t.clone() for single-valued auth rules | Tobias Brunner | 2013-02-28 | 1 | -10/+11 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | By using the default list enumerator and adding the rules with the public add() method, clones of auth_cfg_t objects would return the values for single-valued auth rules in the wrong order (i.e. the oldest instead of the newest value was returned). Using the internal enumerator (which the comment already suggested) fixes this, but the clone will not be a full clone as it does not contain any old values for single-valued auth rules. Since these will never be used anyway, this should be fine. | |||||
* | | | | | | Trigger an updown event when destroying an IKE_SA based on INITIAL_CONTACT | Tobias Brunner | 2013-02-28 | 1 | -0/+1 | |
| |_|_|_|/ |/| | | | | | | | | | | | | | | | | | | | In other cases (i.e. when functions return DESTROY_ME) the event should already be triggered, but not in this forced situation. | |||||
* | | | | | Use SIGUSR2 for SIG_CANCEL on Android | Tobias Brunner | 2013-02-26 | 1 | -0/+4 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | SIGRTMIN is defined as 32 while sigset_t is defined as unsigned long (i.e. holds 32 signals). Hence, the signal could never be blocked. Sending the signal still canceled threads, but sometimes in situations where they shouldn't have been canceled (e.g. while holding a lock). Fixes #298. | |||||
* | | | | | Android.mk updated to latest Makefiles | Tobias Brunner | 2013-02-26 | 3 | -1/+3 | |
| |/ / / |/| | | | | | | | | | | | Fixes #300. | |||||
* | | | | openssl: Disable PKCS#7/CMS when building against OpenSSL < 0.9.8g | Tobias Brunner | 2013-02-20 | 2 | -1/+5 | |
| |/ / |/| | | | | | | | | Fixes #292. | |||||
* | | | treat IF-M and IF-TNCCS remediation instructions/parameters in an equal way | Andreas Steffen | 2013-02-19 | 4 | -107/+204 | |
| | | | ||||||
* | | | Streamlined log messages in ipseckey plugin | Andreas Steffen | 2013-02-19 | 2 | -58/+30 | |
| | | | ||||||
* | | | Encode RSA public keys in RFC 3110 DNSKEY format | Andreas Steffen | 2013-02-19 | 8 | -3/+155 | |
| | | | ||||||
* | | | Moved configuration from resolver manager to unbound plugin | Andreas Steffen | 2013-02-19 | 6 | -52/+41 | |
| | | | | | | | | | | | | Also streamlined log messages in unbound plugin. | |||||
* | | | ipseckey: Report IPSECKEYs with invalid DNSSEC security state | Reto Guadagnini | 2013-02-19 | 1 | -2/+12 | |
| | | | ||||||
* | | | ipseckey: Added "enable" option for the IPSECKEY plugin to strongswan.conf | Reto Guadagnini | 2013-02-19 | 1 | -3/+16 | |
| | | | ||||||
* | | | Added ipseckey plugin, which provides support for public keys in IPSECKEY RRs | Reto Guadagnini | 2013-02-19 | 8 | -0/+859 | |
| | | |