Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | smp: Correctly return IKE SPIs stored in network order | Tobias Brunner | 2016-03-04 | 1 | -4/+4 | |
| | ||||||
* | vici: Correctly return IKE SPIs stored in network order | Tobias Brunner | 2016-03-04 | 1 | -2/+4 | |
| | ||||||
* | stroke: Correctly print IKE SPIs stored in network order | Tobias Brunner | 2016-03-04 | 1 | -2/+4 | |
| | ||||||
* | byteorder: Simplify htoun64/untoh64 functions | Tobias Brunner | 2016-03-04 | 1 | -27/+0 | |
| | ||||||
* | byteorder: Always define be64toh/htobe64 macros | Tobias Brunner | 2016-03-04 | 1 | -20/+30 | |
| | ||||||
* | swanctl: Document signature scheme constraints | Tobias Brunner | 2016-03-04 | 1 | -1/+30 | |
| | ||||||
* | vici: Add support for pubkey constraints with EAP-TLS | Tobias Brunner | 2016-03-04 | 1 | -0/+8 | |
| | | | | This is a feature currently supported by stroke. | |||||
* | auth-cfg: Make IKE signature schemes configurable | Tobias Brunner | 2016-03-04 | 7 | -42/+194 | |
| | | | | | | This also restores the charon.signature_authentication_constraints functionality, that is, if no explicit IKE signature schemes are configured we apply all regular signature constraints as IKE constraints. | |||||
* | ikev2: Always store signature scheme in auth-cfg | Tobias Brunner | 2016-03-04 | 1 | -12/+1 | |
| | | | | As we use a different rule we can always store the scheme. | |||||
* | ikev2: Diversify signature scheme rule | Thomas Egerer | 2016-03-04 | 4 | -33/+72 | |
| | | | | | | | This allows for different signature schemes for IKE authentication and trustchain verification. Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com> | |||||
* | ike-init: Verify REDIRECT notify before processing IKE_SA_INIT message | Tobias Brunner | 2016-03-04 | 1 | -7/+51 | |
| | | | | | | An attacker could blindly send a message with invalid nonce data (or none at all) to DoS an initiator if we just destroy the SA. To prevent this we ignore the message and wait for the one by the correct responder. | |||||
* | ikev2: Allow tasks to verify request messages before processing them | Tobias Brunner | 2016-03-04 | 1 | -4/+47 | |
| | ||||||
* | ikev2: Allow tasks to verify response messages before processing them | Tobias Brunner | 2016-03-04 | 1 | -1/+27 | |
| | ||||||
* | task: Add optional pre_process() method | Tobias Brunner | 2016-03-04 | 1 | -1/+13 | |
| | | | | | This will eventually allow tasks to pre-process and verify received messages. | |||||
* | ike-init: Ignore notifies related to redirects during rekeying | Tobias Brunner | 2016-03-04 | 1 | -3/+13 | |
| | | | | Also don't query redirect providers in this case. | |||||
* | ike-sa: Add limit for the number of redirects within a defined time period | Tobias Brunner | 2016-03-04 | 2 | -0/+54 | |
| | ||||||
* | ike-sa: Reauthenticate to the same addresses we currently use | Tobias Brunner | 2016-03-04 | 1 | -2/+5 | |
| | | | | | | If the SA got redirected this would otherwise cause a reauthentication with the original gateway. Reestablishing the SA to the original gateway, if e.g. the new gateway is not reachable makes sense though. | |||||
* | vici: Don't redirect all SAs if no selectors are given | Tobias Brunner | 2016-03-04 | 1 | -1/+1 | |
| | | | | | This avoid confusion and redirecting all SAs can now easily be done explicitly (e.g. peer_ip=0.0.0.0/0). | |||||
* | vici: Match subnets and ranges against peer IP in redirect command | Tobias Brunner | 2016-03-04 | 3 | -13/+43 | |
| | ||||||
* | vici: Match identity with wildcards against remote ID in redirect command | Tobias Brunner | 2016-03-04 | 3 | -6/+10 | |
| | ||||||
* | swanctl: Add --redirect command | Tobias Brunner | 2016-03-04 | 4 | -1/+138 | |
| | ||||||
* | vici: Add redirect command | Tobias Brunner | 2016-03-04 | 5 | -0/+150 | |
| | | | | | This allows redirecting IKE_SAs by multiple different selectors, if none are given all SAs are redirected. | |||||
* | redirect-job: Add job to redirect an active IKE_SA | Tobias Brunner | 2016-03-04 | 4 | -0/+159 | |
| | ||||||
* | ike-sa: Add redirect() method to actively redirect an IKE_SA | Tobias Brunner | 2016-03-04 | 2 | -0/+50 | |
| | ||||||
* | ike-redirect: Add task to redirect active IKE_SAs | Tobias Brunner | 2016-03-04 | 7 | -0/+220 | |
| | ||||||
* | ike-auth: Handle REDIRECT notifies during IKE_AUTH | Tobias Brunner | 2016-03-04 | 1 | -22/+44 | |
| | ||||||
* | ike-sa: Handle redirect requests for established SAs as reestablishment | Tobias Brunner | 2016-03-04 | 1 | -82/+174 | |
| | | | | | | | We handle this similar to how we do reestablishing IKE_SAs with all CHILD_SAs, which also includes the one actively queued during IKE_AUTH. To delete the old SA we use the recently added ike_reauth_complete task. | |||||
* | ike-auth: Send REDIRECT notify during IKE_AUTH if requested by providers | Tobias Brunner | 2016-03-04 | 1 | -27/+51 | |
| | | | | | | To prevent the creation of the CHILD_SA we set a condition on the IKE_SA. We also schedule a delete job in case the client does not terminate the IKE_SA (which is a SHOULD in RFC 5685). | |||||
* | ike-config: Do not assign attributes for redirected IKE_SAs | Tobias Brunner | 2016-03-04 | 1 | -0/+5 | |
| | ||||||
* | child-create: Don't create CHILD_SA if the IKE_SA got redirected in IKE_AUTH | Tobias Brunner | 2016-03-04 | 1 | -0/+4 | |
| | ||||||
* | ike-sa: Add a condition to mark redirected IKE_SAs | Tobias Brunner | 2016-03-04 | 1 | -0/+5 | |
| | ||||||
* | ike-init: Handle REDIRECTED_FROM similar to REDIRECT_SUPPORTED as server | Tobias Brunner | 2016-03-04 | 1 | -0/+17 | |
| | ||||||
* | ike-init: Send REDIRECTED_FROM instead of REDIRECT_SUPPORTED if appropriate | Tobias Brunner | 2016-03-04 | 1 | -1/+19 | |
| | ||||||
* | ike-sa: Keep track of the address of the gateway that redirected us | Tobias Brunner | 2016-03-04 | 2 | -1/+27 | |
| | ||||||
* | ikev2: Add option to disable following redirects as client | Tobias Brunner | 2016-03-04 | 2 | -1/+20 | |
| | ||||||
* | ikev2: Handle REDIRECT notifies during IKE_SA_INIT | Tobias Brunner | 2016-03-04 | 3 | -0/+64 | |
| | ||||||
* | ike-init: Send REDIRECT notify during IKE_SA_INIT if requested by providers | Tobias Brunner | 2016-03-04 | 1 | -0/+17 | |
| | ||||||
* | redirect-manager: Add helper function to create and parse REDIRECT notify data | Tobias Brunner | 2016-03-04 | 2 | -11/+162 | |
| | | | | The same encoding is also used for the REDIRECT_FROM notifies. | |||||
* | redirect-manager: Verify type of returned gateway ID | Tobias Brunner | 2016-03-04 | 1 | -1/+12 | |
| | ||||||
* | ike-init: Send REDIRECT_SUPPORTED as initiator | Tobias Brunner | 2016-03-04 | 1 | -0/+5 | |
| | ||||||
* | ike-init: Enable redirection extension if client sends REDIRECT_SUPPORTED notify | Tobias Brunner | 2016-03-04 | 1 | -0/+4 | |
| | ||||||
* | ike-sa: Add new extension for IKEv2 redirection (RFC 5685) | Tobias Brunner | 2016-03-04 | 1 | -1/+6 | |
| | ||||||
* | daemon: Create global redirect manager instance | Tobias Brunner | 2016-03-04 | 2 | -0/+8 | |
| | ||||||
* | redirect-manager: Add manager for redirect providers | Tobias Brunner | 2016-03-04 | 4 | -2/+223 | |
| | ||||||
* | redirect-provider: Add interface to redirect clients during initial messages | Tobias Brunner | 2016-03-04 | 3 | -0/+61 | |
| | | | | | This will allow e.g. plugins to decide whether a connecting client is redirected to a different gateway using RFC 5685. | |||||
* | Set PLUTO port variables to 0 in the case of no port restrictions | Andreas Steffen | 2016-03-04 | 1 | -1/+1 | |
| | ||||||
* | Port range support in updown script | Andreas Steffen | 2016-03-04 | 1 | -13/+37 | |
| | ||||||
* | Implemented port ranges in kernel_netlink interface | Andreas Steffen | 2016-03-04 | 1 | -7/+19 | |
| | ||||||
* | thread: Allow thread ID to be value returned by gettid() | Thomas Egerer | 2016-03-04 | 3 | -14/+32 | |
| | | | | Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com> | |||||
* | Request missing SWID tags in a directed PA-TNC message | Andreas Steffen | 2016-03-04 | 3 | -20/+47 | |
| |