Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | | moved ar_id from imv_agent to imv_state | Andreas Steffen | 2013-03-11 | 8 | -31/+112 | |
| | | ||||||
* | | esc() is only used if dladdr(3) is available5.0.3dr3 | Tobias Brunner | 2013-03-08 | 1 | -12/+13 | |
| | | ||||||
* | | Fix maximum size of a mem_pool_t | Tobias Brunner | 2013-03-07 | 1 | -2/+2 | |
| | | ||||||
* | | New Android release after adding translations and Cert/EAP authentication | Tobias Brunner | 2013-03-07 | 1 | -3/+3 | |
| | | | | | | | | | | Also fixed a race condition during reauthentication and a freeze that might happen while disconnecting. | |||||
* | | android: Add support for combined certificate and EAP authentication | Tobias Brunner | 2013-03-07 | 7 | -34/+63 | |
| | | | | | | | | | | | | This uses RFC 4739 multiple authentication rounds to first authenticate the client with a certificate followed by an EAP authentication round with username and password. | |||||
* | | Merge branch 'pt-tls' | Martin Willi | 2013-03-07 | 21 | -69/+1077 | |
|\ \ | ||||||
| * | | If TLS peer authentication not required, the client does nonetheless, allow ↵ | Martin Willi | 2013-03-06 | 1 | -4/+19 | |
| | | | | | | | | | | | | it to fail | |||||
| * | | Support different authentication schemes for PT-TLS | Martin Willi | 2013-02-28 | 5 | -6/+71 | |
| | | | ||||||
| * | | Request a TLS client certificate even if no peer identity is given | Martin Willi | 2013-02-28 | 1 | -5/+1 | |
| | | | | | | | | | | | | | | | This allows a peer to perform client authentication if it wants, but skip it if not. | |||||
| * | | Wrap tls_t.get_{server,peer}_id methods in tls_socket_t | Martin Willi | 2013-02-28 | 2 | -0/+28 | |
| | | | ||||||
| * | | Delegate tls_t.get_{peer,server}_id to handshake layer | Martin Willi | 2013-02-28 | 7 | -29/+78 | |
| | | | | | | | | | | | | | | | This allows to get updated peer identities if the peer can't authenticate, or does when it is optional. | |||||
| * | | Implement a SASL PLAIN mechanism using shared secrets | Martin Willi | 2013-02-28 | 4 | -0/+224 | |
| | | | ||||||
| * | | Implement SASL authentication in PT-TLS client | Martin Willi | 2013-02-28 | 1 | -11/+191 | |
| | | | ||||||
| * | | Implement SASL authentication in PT-TLS server | Martin Willi | 2013-02-28 | 1 | -5/+236 | |
| | | | ||||||
| * | | Define PT-TLS SASL result codes | Martin Willi | 2013-02-28 | 1 | -0/+11 | |
| | | | ||||||
| * | | Define an interface for SASL mechanisms and provide a static factory | Martin Willi | 2013-02-28 | 3 | -1/+193 | |
| | | | ||||||
| * | | Pass a client identity to pt_tls_client, usable for TLS or SASL authentication | Martin Willi | 2013-02-28 | 2 | -7/+21 | |
| | | | ||||||
| * | | Don't close underlying file descriptor before destroying a tls_socket | Martin Willi | 2013-02-28 | 1 | -1/+4 | |
| | | | | | | | | | | | | | | | tls_socket cleanup usually sends a TLS close notify, for which it uses a valid socket. | |||||
* | | | As Quick Mode initiator, select a subset of the proposed and the returned TS | Martin Willi | 2013-03-07 | 1 | -4/+11 | |
| | | | | | | | | | | | | | | | | | | | | | | | | Cisco 5505 firewalls don't return the port if we send a specific one, letting the is_contained_in() checks fail. Using get_subset() selection builds the Quick Mode correctly with the common subset of selectors. Based on an initial patch from Paul Stewart. | |||||
* | | | added some otherNames OIDs | Andreas Steffen | 2013-03-06 | 1 | -0/+6 | |
| | | | ||||||
* | | | Fix some apidoc in mem_pool.h | Martin Willi | 2013-03-06 | 1 | -3/+3 | |
| | | | ||||||
* | | | instead of cloning use extract_buf() method | Andreas Steffen | 2013-03-04 | 34 | -35/+35 | |
| | | | ||||||
* | | | Don't invoke addr2line if dladdr() did not yield a filename | Martin Willi | 2013-03-04 | 1 | -1/+1 | |
| | | | ||||||
* | | | When receiving critical signals, additionally log backtraces to syslog/files | Martin Willi | 2013-03-04 | 1 | -0/+1 | |
| | | | ||||||
* | | | backtrace_t.log() takes a NULL file pointer to log to registered dbg() hook | Martin Willi | 2013-03-04 | 2 | -33/+71 | |
| | | | ||||||
* | | | Don't use color escapes when printing backtraces to a non-TTY file | Martin Willi | 2013-03-04 | 1 | -11/+20 | |
| | | | ||||||
* | | | Add a utility function to resolve TTY color escape codes dynamically | Martin Willi | 2013-03-04 | 2 | -0/+103 | |
| | | | ||||||
* | | | make TNC Access Requestor ID available to IMVs | Andreas Steffen | 2013-03-03 | 9 | -42/+130 | |
| | | | ||||||
* | | | added getpwuid_r and initgroups to whitelist | Andreas Steffen | 2013-03-03 | 1 | -0/+2 | |
| | | | ||||||
* | | | third parameter was not copied | Andreas Steffen | 2013-03-02 | 1 | -1/+1 | |
| | | | ||||||
* | | | Fixed Doxygen comments after scanning complete src directory | Tobias Brunner | 2013-03-02 | 96 | -183/+221 | |
| | | | ||||||
* | | | Removed backend for old Android frontend patch | Tobias Brunner | 2013-03-02 | 12 | -923/+82 | |
| | | | | | | | | | | | | Moved the remaining DNS handler to a new plugin. | |||||
* | | | added ERX_SUPPORTED IKEv2 Notify | Andreas Steffen | 2013-03-02 | 2 | -7/+11 | |
| | | | ||||||
* | | | added some new TCG IF-M message subtypes and attributes | Andreas Steffen | 2013-03-02 | 4 | -4/+36 | |
| | | | ||||||
* | | | android: Mitigate race condition on reauthentication | Tobias Brunner | 2013-03-01 | 1 | -0/+4 | |
| | | | | | | | | | | | | | | | | | | | | | | | | If the TUN device gets recreated while another thread in handle_plain() has not yet called select(2) but already stored the file descriptor of the old TUN device in its FD set, select() will fail with EBADF. Fixes #301. | |||||
* | | | openssl: The EVP GCM interface requires at least OpenSSL 1.0.1 | Tobias Brunner | 2013-03-01 | 2 | -0/+8 | |
| | | | ||||||
* | | | Merge branch 'multi-eap' | Martin Willi | 2013-03-01 | 2 | -28/+50 | |
|\ \ \ | | | | | | | | | | | | | | | | | | | | | Fixes the use of EAP methods in the non-first authentication round if the initiator demands mutual EAP. Also mutual EAP can now be enforced when the initiator sets rightauth=eap, not only with rightauth=any. | |||||
| * | | | Apply a mutual EAP auth_cfg not before the EAP method completes | Martin Willi | 2013-02-26 | 2 | -1/+18 | |
| | | | | ||||||
| * | | | Be a little more verbose why a peer_cfg is inacceptable | Martin Willi | 2013-02-26 | 1 | -8/+16 | |
| | | | | ||||||
| * | | | Refactor auth_cfg applying to a common function | Martin Willi | 2013-02-26 | 1 | -20/+17 | |
| |/ / | ||||||
* | | | Merge branch 'multi-cert' | Martin Willi | 2013-03-01 | 3 | -27/+109 | |
|\ \ \ | | | | | | | | | | | | | | | | | Allows the configuration of multiple certificates in leftcert, and select the correct certificate to use based on the received certificate requests. | |||||
| * | | | After merging the used trustchain with config, move used certificate to front | Martin Willi | 2013-01-18 | 1 | -0/+24 | |
| | | | | ||||||
| * | | | Try to build a trustchain for all configured certificates before enforcing one | Martin Willi | 2013-01-18 | 1 | -1/+29 | |
| | | | | | | | | | | | | | | | | | | | | This enables the daemon to select from multiple configured certificates by building trustchains against the received certificate requests. | |||||
| * | | | Load multiple comma seperarated certificates in the leftcert option | Martin Willi | 2013-01-18 | 1 | -15/+32 | |
| | | | | ||||||
| * | | | Make AUTH_RULE_SUBJECT cert multi-valued | Martin Willi | 2013-01-18 | 1 | -11/+24 | |
| | | | | | | | | | | | | | | | | | | | | Constraints having multiple subject certs defined are fulfilled if authentication used one of the listed certificates. | |||||
* | | | | Merge branch 'systime' | Martin Willi | 2013-03-01 | 8 | -10/+521 | |
|\ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | Add a systime-fix plugin allowing an embedded system to validate certificates if the system time has not been synchronized after boot. Certificates of established tunnels can be re-validated after the system time gets valid. | |||||
| * | | | | systime-fix disables certificate lifetime validation if system time not synced | Martin Willi | 2013-02-19 | 4 | -0/+326 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The system time can be periodically checked. If it gets valid, certificates get rechecked with the current lifetime. If certificates are invalid, associated IKE_SAs can be closed or reauthenticated. | |||||
| * | | | | Add a stub for systime-fix, a plugin handling certificate lifetimes gracefully | Martin Willi | 2013-02-19 | 4 | -0/+126 | |
| | | | | | ||||||
| * | | | | Add a cert_validator hook allowing plugins to provide custom lifetime checking | Martin Willi | 2013-02-19 | 2 | -10/+64 | |
| | | | | | ||||||
| * | | | | Make cert_validator_t.validate optional to implement | Martin Willi | 2013-02-19 | 2 | -0/+5 | |
| | |_|/ | |/| | |