Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | newhope: Properly release allocated arrays if RNG can't be created | Tobias Brunner | 2016-10-14 | 1 | -8/+8 | |
| | ||||||
* | nm: Add D-Bus policy to the distribution | Tobias Brunner | 2016-10-14 | 1 | -0/+2 | |
| | ||||||
* | nm: Version bump to 1.4.1 | Tobias Brunner | 2016-10-14 | 2 | -1/+6 | |
| | ||||||
* | kernel-netlink: Fix get_route() interface determination | Christophe Gouault | 2016-10-12 | 1 | -2/+2 | |
| | | | | | | | | | | | | A wrong variable is used (route instead of best), so much that the returned interface belongs to the last seen route instead of the best choice route. get_route() may therefore return mismatching interface and gateway. Fixes: 66e9165bc686 ("kernel-netlink: Return outbound interface in get_nexthop()") Signed-off-by: Christophe Gouault <christophe.gouault@6wind.com> | |||||
* | Save both base and delta CRLs to disk | Andreas Steffen | 2016-10-11 | 2 | -2/+9 | |
| | ||||||
* | vici: strongswan.conf cache_crls = yes saves fetched CRLs to disk | Andreas Steffen | 2016-10-11 | 6 | -4/+83 | |
| | ||||||
* | mem-cred: Support storing a delta CRL together with its base | Tobias Brunner | 2016-10-11 | 1 | -8/+30 | |
| | | | | | | | | | | | | So far every "newer" CRL (higher serial or by date) replaced an existing "older" CRL. This meant that delta CRLs replaced an existing base CRL and that base CRLs weren't added if a delta CRL was already stored. So the base had to be re-fetched every time after a delta CRL was added. With this change one delta CRL to the latest base may be stored. A newer delta CRL will replace an existing delta CRL (but not its base, older base CRLs are removed, though). And a newer base will replace the existing base and optional delta CRL. | |||||
* | revocation: Cache valid CRL also if certificate is revoked | Tobias Brunner | 2016-10-11 | 1 | -10/+25 | |
| | ||||||
* | pki: Don't remove zero bytes in CRL serials anymore | Tobias Brunner | 2016-10-11 | 1 | -6/+7 | |
| | | | | | | This was added a few years ago because pki --signcrl once encoded serials incorrectly as eight byte blobs. But still ensure we have can handle overflows in case the serial is encoded incorrectly without zero-prefix. | |||||
* | pki: Use serial of base CRL for delta CRLs | Tobias Brunner | 2016-10-11 | 1 | -1/+4 | |
| | | | | | According to RFC 5280 delta CRLs and complete CRLs MUST share one numbering sequence. | |||||
* | openssl: Fix AES-GCM with BoringSSL | Tobias Brunner | 2016-10-11 | 1 | -3/+3 | |
| | | | | | | | | BoringSSL only supports a limited list of (hard-coded) algorithms via EVP_get_cipherbyname(), which does not include AES-GCM. While BoringSSL deprecated these functions they are also supported by OpenSSL (in BoringSSL a completely new interface for AEADs was added, which OpenSSL currently does not support). | |||||
* | android: Identifiers for SHA2-base RSA signature schemes got renamed | Tobias Brunner | 2016-10-11 | 1 | -4/+4 | |
| | | | | Fixes: 40f2589abfc8 ("gmp: Support of SHA-3 RSA signatures") | |||||
* | android: MGF1 implementation was moved to a plugin | Tobias Brunner | 2016-10-11 | 1 | -2/+1 | |
| | | | | Fixes: 188b190a70c9 ("mgf1: Refactored MGF1 as an XOF") | |||||
* | ldap: Fix crash in case of empty LDAP response for CRL fetch | Yannick CANN | 2016-10-06 | 1 | -2/+1 | |
| | | | | | | | | | In case of an empty LDAP result during a CRL fetch (for example, due to a wrong filter attribute in the LDAP URI, or invalid LDAP configuration), the call to ldap_result2error() with NULL value for "entry" lead to a crash. Closes strongswan/strongswan#52. | |||||
* | libimcv: Add Debian 8.6 to database | Tobias Brunner | 2016-10-05 | 1 | -0/+18 | |
| | ||||||
* | task-manager: Only trigger retransmit cleared alert if there was at least ↵ | Tobias Brunner | 2016-10-05 | 2 | -2/+2 | |
| | | | | | | | | one retransmit The counter is already increased when sending the original message. Fixes: bd71ba0ffb03 ("task-manager: Add retransmit cleared alert") | |||||
* | unit-tests: Enable optional logging in libcharon unit tests | Tobias Brunner | 2016-10-05 | 1 | -0/+17 | |
| | ||||||
* | unit-tests: Add more tests for proposal creation | Tobias Brunner | 2016-10-05 | 1 | -8/+62 | |
| | ||||||
* | proposal: Correctly add AES-GMAC for AH proposals | Tobias Brunner | 2016-10-05 | 1 | -0/+41 | |
| | | | | | | We parse aes*gmac as encryption algorithm, which we have to map to an integrity algorithm. We also make sure we remove all other encryption algorithms and ensure there is an integrity algorithm. | |||||
* | proposal: Enforce separate proposals for AEAD and classic encryption algorithms | Tobias Brunner | 2016-10-05 | 1 | -16/+22 | |
| | ||||||
* | proposal: Make sure there is a PRF defined in IKE proposals | Tobias Brunner | 2016-10-05 | 1 | -14/+34 | |
| | | | | But filter PRFs from ESP proposals. | |||||
* | proposal: Make DH groups mandatory in IKE proposals parsed from strings | Tobias Brunner | 2016-10-05 | 2 | -21/+40 | |
| | | | | References #2051. | |||||
* | ikev2: Respond with NO_PROPOSAL_CHOSEN if proposal without DH group was selected | Tobias Brunner | 2016-10-05 | 1 | -0/+1 | |
| | | | | Fixes #2051. | |||||
* | kernel-netlink: Consider RTA_SRC when looking for a source address | Tobias Brunner | 2016-10-05 | 1 | -52/+134 | |
| | ||||||
* | swanctl: Add 'private' directory/section to load any type of private key | Tobias Brunner | 2016-10-05 | 4 | -5/+26 | |
| | ||||||
* | pki: Add generic 'priv' key type that loads any type of private key | Tobias Brunner | 2016-10-05 | 12 | -28/+59 | |
| | ||||||
* | openssl: Add a generic private key loader | Tobias Brunner | 2016-10-05 | 7 | -18/+129 | |
| | ||||||
* | pkcs1: Support building of KEY_ANY private keys | Tobias Brunner | 2016-10-05 | 2 | -5/+73 | |
| | | | | | We try to detect the type of key by parsing the basic structure of the passed ASN.1 blob. | |||||
* | pki: Drop -priv suffix to specify private key types | Tobias Brunner | 2016-10-05 | 4 | -16/+23 | |
| | ||||||
* | ikev2: Only add NAT-D notifies to DPDs as initiator | Tobias Brunner | 2016-10-04 | 1 | -8/+15 | |
| | | | | | | | | | | If a responder is natted it will usually be a static NAT (unless it's a mediated connection) in which case adding these notifies makes not much sense (if the initiator's NAT mapping had changed the responder wouldn't be able to reach it anyway). It's also problematic as some clients refuse to respond to DPDs if they contain such notifies. Fixes #2126. | |||||
* | pkcs11: Look for the CKA_ID of the cert if it doesn't match the subjectKeyId | Raphael Geissert | 2016-10-04 | 1 | -4/+152 | |
| | | | | | | | | | | | | | | charon-nm fails to find the private key when its CKA_ID doesn't match the subjectKeyIdentifier of the X.509 certificate. In such cases, the private key builder now falls back to enumerating all the certificates, looking for one that matches the supplied subjectKeyIdentifier. It then uses the CKA_ID of that certificate to find the corresponding private key. It effectively means that PKCS#11 tokens where the only identifier to relate the certificate, the public key, and the private key is the CKA_ID are now supported by charon-nm. Fixes #490. | |||||
* | nm: Make global CA directory configurable | Tobias Brunner | 2016-10-04 | 1 | -1/+2 | |
| | ||||||
* | ikev1: Activate task to delete the IKE_SA in state IKE_REKEYING | Tobias Brunner | 2016-10-04 | 1 | -0/+8 | |
| | | | | It does not have any CHILD_SAs attached at that point. | |||||
* | ikev1: Delete Quick Mode SAs before the ISAKMP SA | Tobias Brunner | 2016-10-04 | 1 | -2/+2 | |
| | | | | | After the ISAKMP_DELETE task has been executed the IKE_SA is destroyed so we wouldn't be able to send deletes for the Quick Mode SAs. | |||||
* | ikev1: Send DELETE for rekeyed IKE_SAs | Tobias Brunner | 2016-10-04 | 1 | -9/+5 | |
| | | | | | | If we silently delete the IKE_SA the other peer might still use it even if only to send DPDs. If we don't answer to DPDs that might result in the deletion of the new IKE_SA too. | |||||
* | starter: Install an empty ipsec.secrets file | Tobias Brunner | 2016-10-04 | 2 | -1/+3 | |
| | ||||||
* | starter: Don't generate a key/certificate if ipsec.secrets does not exist | Tobias Brunner | 2016-10-04 | 2 | -70/+0 | |
| | ||||||
* | watcher: Avoid allocations due to enumerators | Tobias Brunner | 2016-10-04 | 1 | -37/+83 | |
| | | | | | Since the FD set could get rebuilt quite often this change avoids having to allocate memory just to enumerate the registered FDs. | |||||
* | vici: Enable IKE fragmentation by default | Tobias Brunner | 2016-10-04 | 2 | -4/+4 | |
| | ||||||
* | starter: Enable IKE fragmentation by default | Tobias Brunner | 2016-10-04 | 1 | -0/+1 | |
| | ||||||
* | ike: Set default IKE fragment size to 1280 | Tobias Brunner | 2016-10-04 | 1 | -1/+1 | |
| | | | | | | This is the minimum size an IPv6 implementation must support. This makes it the default for IPv4 too, which presumably is also generally routable (otherwise, setting this to 0 falls back to the minimum of 576 for IPv4). | |||||
* | ikev2: Send derived CHILD_SA keys to the bus | Tobias Brunner | 2016-10-04 | 1 | -26/+43 | |
| | ||||||
* | ikev2: Send derived IKE_SA keys to bus | Tobias Brunner | 2016-10-04 | 1 | -26/+30 | |
| | ||||||
* | ikev1: Send derived CHILD_SA keys to the bus | Tobias Brunner | 2016-10-04 | 1 | -14/+26 | |
| | ||||||
* | ikev1: Send derived IKE_SA keys to bus | Tobias Brunner | 2016-10-04 | 1 | -14/+11 | |
| | ||||||
* | bus: Add new hooks for derived IKE_SA and CHILD_SA keys | Tobias Brunner | 2016-10-04 | 3 | -11/+131 | |
| | ||||||
* | nm: Remove dummy TUN device | Tobias Brunner | 2016-10-04 | 1 | -36/+0 | |
| | | | | | Recent NM releases don't insist on getting a device back from VPN plugins. | |||||
* | nm: Fix comment in service file in /etc/NetworkManager/VPN | Tobias Brunner | 2016-10-04 | 1 | -1/+1 | |
| | ||||||
* | nm: Remove generated service file in `make clean` | Tobias Brunner | 2016-10-04 | 1 | -1/+1 | |
| | ||||||
* | nm: Don't add generated AppStream metadata to tarball | Tobias Brunner | 2016-10-04 | 1 | -1/+0 | |
| |