aboutsummaryrefslogtreecommitdiffstats
path: root/testing
Commit message (Collapse)AuthorAgeFilesLines
* testing: Update test scenarios for Debian jessieTobias Brunner2016-06-16289-576/+576
| | | | | | | The main difference is that ping now reports icmp_seq instead of icmp_req, so we match for icmp_.eq, which works with both releases. tcpdump now also reports port 4500 as ipsec-nat-t.
* testing: Fix posttest.dat for ikev2/rw-dnssec scenarioTobias Brunner2016-06-161-6/+6
|
* testing: Make sure tcpdump is actually terminated before ↵Tobias Brunner2016-06-161-11/+6
| | | | analyzing/collecting logs
* testing: Correctly dis-/enable services with systemdTobias Brunner2016-06-162-4/+16
|
* testing: Install packages like the FIPS-enabled OpenSSL from a custom apt repoTobias Brunner2016-06-163-14/+28
|
* testing: Update base image to Debian jessieTobias Brunner2016-06-153-10/+30
| | | | | | | | | | | | | Several packages got renamed/updated, libgcrypt was apparently installed by default previously. Since most libraries changed we have to completely rebuild all the tools installed in the root image. We currently don't provide a clean target in the recipes, and even if we did we'd have to track which base image we last built for. It's easier to just use a different build directory for each base image, at the cost of some additional disk space (if not manually cleaned). However, that's also the case when updating kernel or software versions.
* testing: Update 4.x kernel configs to be compatible with Debian 8/systemdTobias Brunner2016-06-156-13/+130
|
* testing: Add root to fstabTobias Brunner2016-06-151-0/+1
| | | | This seems to be required for systemd to remount it.
* testing: Update Apache config for newer Debian releasesTobias Brunner2016-06-159-62/+103
| | | | | | It is still compatible with the current release as the config in sites-available will be ignored, while conf-enabled does not exist and is not included in the main config.
* testing: Explicitly enable RC4 in SSH server configTobias Brunner2016-06-151-0/+1
| | | | | | Newer OpenSSH versions disable this by default because it's unsafe. Since this is not relevant for our use case we enable it due to its speed.
* testing: Add script to chroot into an imageTobias Brunner2016-06-151-0/+67
| | | | | If changes are made to the base or root image the images depending on these have to be rebuilt.
* testing: Add a patch to tnc-fhh that avoids building the tncsim packageTobias Brunner2016-06-152-1/+20
| | | | This sub-package does not build on Debian jessie.
* testing: Don't attempt to stop services when building base imageTobias Brunner2016-06-151-2/+0
| | | | | | Unlike `apt-get install` in a chroot debootstrap does not seem to start the services but stopping them might cause problems if they were running outside the chroot.
* testing: Fix scenarios that check /etc/resolv.confTobias Brunner2016-06-133-6/+6
|
* testing: Changed gcrypt-ikev1 scenarios to swanctlAndreas Steffen2016-05-1520-126/+148
|
* testing: wait until connections are loadedAndreas Steffen2016-05-1598-89/+178
|
* swanctl: Do not display rekey times for shuntsAndreas Steffen2016-05-051-0/+1
|
* testing: Use reauthentication and set CHILD_SA rekey time, bytes and packets ↵Andreas Steffen2016-05-042-0/+8
| | | | limits
* testing: uses xauth_id in swanctl/xauth-rsa scenarioAndreas Steffen2016-05-044-6/+8
|
* testing: Use absolute path of imv_policy_managerAndreas Steffen2016-04-268-8/+9
|
* testing: -D and -u options in sfdisk are not supported any moreAndreas Steffen2016-04-261-1/+1
|
* testing: updated testing.confAndreas Steffen2016-04-244-3/+7000
|
* testing: Added swanctl/rw-multi-ciphers-ikev1 scenarioAndreas Steffen2016-04-1211-0/+238
|
* testing: Added swanctl/manual_prio scenarioAndreas Steffen2016-04-0911-0/+277
|
* testing: Add swanctl/net2net-gw scenarioTobias Brunner2016-04-0911-0/+204
|
* testing: List conntrack table on sun in ikev2/host2host-transport-connmark ↵Tobias Brunner2016-04-061-0/+1
| | | | scenario
* testing: Version bump to 5.4.0Tobias Brunner2016-04-061-1/+1
| | | | References #1382.
* testing: Disable leak detective when generating CRLsTobias Brunner2016-04-061-0/+4
| | | | | | | | | GnuTLS, which can get loaded by the curl plugin, does not properly cleanup some allocated memory when deinitializing. This causes invalid frees if leak detective is active. Other invalid frees are related to time conversions (tzset). References #1382.
* testing: Updated updown scripts in libipsec scenarios to latest versionTobias Brunner2016-03-2311-0/+341
|
* Updated swanctl/rw-psk-ikev1 scenarioAndreas Steffen2016-03-105-28/+36
|
* testing: Add ikev2/reauth-mbb-revoked scenarioTobias Brunner2016-03-109-0/+105
|
* testing: Generate a CRL that has moon's actual certificate revokedTobias Brunner2016-03-101-0/+3
|
* testing: Added swanctl/mult-auth-rsa-eap-sim-id scenarioAndreas Steffen2016-03-0620-0/+335
|
* testing: Added swanctl/xauth-rsa scenarioAndreas Steffen2016-03-0611-0/+211
|
* testing: attr-sql is a charon plugin5.4.0dr8Andreas Steffen2016-03-0511-42/+10
|
* testing: Added swanctl/rw-psk-ikev1 scenarioAndreas Steffen2016-03-0511-0/+271
|
* testing: Include IKE port information in evaltestsAndreas Steffen2016-03-0568-238/+221
|
* testing: Add ikev2/redirect-active scenarioTobias Brunner2016-03-0420-0/+322
|
* testing: Added swanctl/protoport-range scenarioAndreas Steffen2016-03-049-0/+159
|
* libhydra: Remove empty unused libraryTobias Brunner2016-03-0311-11/+11
|
* testing: Added swanctl/shunt-policies-nat-rwAndreas Steffen2016-02-2812-0/+231
|
* testing: Some minor fixes in test scenariosAndreas Steffen2016-02-282-0/+3
|
* testing: Added swanctl/protoport-dual scenarioAndreas Steffen2016-02-289-0/+142
|
* testing: converted af-alg scenarios to swanctlAndreas Steffen2016-02-2625-149/+198
|
* testing: Use absolute path to the _updown script in SQL scenariosTobias Brunner2016-02-1747-55/+55
| | | | | | /usr/local/sbin is not included in PATH set by the charon init script and since the ipsec script is obsolete when using swanctl it makes sense to change this anyway.
* testing: Increased ping interval in ikev2/trap-any scenarioAndreas Steffen2016-02-161-5/+5
|
* Corrected the description of the swanctl/dhcp-dynamic scenarioAndreas Steffen2016-02-161-1/+1
|
* Fix of the mutual TNC measurement use caseAndreas Steffen2016-02-1615-8/+214
| | | | | | | | | | | | | | | | | If the IKEv2 initiator acting as a TNC server receives invalid TNC measurements from the IKEv2 responder acting as a TNC clienti, the exchange of PB-TNC batches is continued until the IKEv2 responder acting as a TNC server has also finished its TNC measurements. In the past if these measurements in the other direction were correct the IKEv2 responder acting as EAP server declared the IKEv2 EAP authentication successful and the IPsec connection was established even though the TNC measurement verification on the EAP peer side failed. The fix adds an "allow" group membership on each endpoint if the corresponding TNC measurements of the peer are successful. By requiring a "allow" group membership in the IKEv2 connection definition the IPsec connection succeeds only if the TNC measurements on both sides are valid.
* testing: Added swanctl/dhcp-dynamic scenarioAndreas Steffen2016-02-0315-0/+279
|
* ikev1: Log successful authentication with signature schemeThomas Egerer2016-02-013-6/+6
| | | | | | Output is now identical to that of the IKEv2 pubkey authenticator. Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com>