]> git.ipfire.org Git - thirdparty/strongswan.git/log
thirdparty/strongswan.git
7 years agoaddrblock: Support an optional non-strict mode accepting certs without addrblock
Martin Willi [Wed, 22 Feb 2017 08:43:31 +0000 (09:43 +0100)] 
addrblock: Support an optional non-strict mode accepting certs without addrblock

This allows a gateway to enforce the addrblock policy on certificates that
actually have the extension only. For (legacy) certificates not having the
extension, traffic selectors are validated/narrowed by other means, most
likely by the configuration.

7 years agochild-cfg: Always apply hosts to traffic selectors if proposing transport mode
Tobias Brunner [Mon, 20 Feb 2017 10:36:30 +0000 (11:36 +0100)] 
child-cfg: Always apply hosts to traffic selectors if proposing transport mode

Usually, %dynamic is used as traffic selector for transport mode SAs,
however, if wildcard traps are used then the remote TS will be a subnet.
With strongSwan at the remote end that usually works fine as the local
%dynamic TS narrows the proposed TS appropriately.  But some
implementations reject non-host TS for transport mode SAs.
Another problem could be if several distinct subnets are configured for a
wildcard trap, as we'd then propose unrelated subnets on that transport
mode SA, which might be problematic even for strongSwan (switch to tunnel
mode and duplicate policies).

Closes strongswan/strongswan#61.

7 years agotraffic-selector: Allow calling set_address() for any traffic selector
Tobias Brunner [Mon, 20 Feb 2017 10:28:17 +0000 (11:28 +0100)] 
traffic-selector: Allow calling set_address() for any traffic selector

Users may check is_host(), is_dynamic() or includes() before calling this
if restrictions are required (most actually already do).

7 years agoMerge branch 'pki-addrblock'
Martin Willi [Mon, 27 Feb 2017 08:37:51 +0000 (09:37 +0100)] 
Merge branch 'pki-addrblock'

Add support to the x509 plugin and pki to generate certificates with the
RFC 3779 addrblock extension.

7 years agopki: Add a note about constructing RFC 3779 compliant certificates to manpage
Martin Willi [Wed, 22 Feb 2017 07:52:00 +0000 (08:52 +0100)] 
pki: Add a note about constructing RFC 3779 compliant certificates to manpage

7 years agopki: Support an --addrblock option for issued certificates
Martin Willi [Tue, 21 Feb 2017 14:07:42 +0000 (15:07 +0100)] 
pki: Support an --addrblock option for issued certificates

7 years agopki: Support an --addrblock option for self-signed certificates
Martin Willi [Tue, 21 Feb 2017 14:07:03 +0000 (15:07 +0100)] 
pki: Support an --addrblock option for self-signed certificates

7 years agopki: Add a helper function parse traffic selectors from CIDR subnets or ranges
Martin Willi [Tue, 21 Feb 2017 14:06:15 +0000 (15:06 +0100)] 
pki: Add a helper function parse traffic selectors from CIDR subnets or ranges

7 years agox509: Do not mark generated addrblock extension as critical
Martin Willi [Tue, 21 Feb 2017 15:54:57 +0000 (16:54 +0100)] 
x509: Do not mark generated addrblock extension as critical

While RFC 3779 says we SHOULD mark it is critical, this has severe side effects
in practice. The addrblock extension is not widely used nor implemented, and
only a few applications can handle this extension. By marking it critical,
none of these applications can make use of such certificates where included
addrblocks do not matter, such as TLS/HTTPS.

If an application wants to make use of addrblocks, that is usually an explicit
decision. Then the very same application obviously can handle addrblocks, and
there is no need for the extension to be critical. In other words, for local
policy checks it is a local matter to handle the extension, hence making it
critical is usually not of much help.

7 years agox509: Support encoding the RFC 3779 addrblock extension
Martin Willi [Tue, 21 Feb 2017 14:05:17 +0000 (15:05 +0100)] 
x509: Support encoding the RFC 3779 addrblock extension

7 years agobuilder: Define a builder part for X.509 RFC 3779 address blocks
Martin Willi [Tue, 21 Feb 2017 14:04:18 +0000 (15:04 +0100)] 
builder: Define a builder part for X.509 RFC 3779 address blocks

7 years agoplugin-loader: Fix hashing of registered plugin features
Tobias Brunner [Fri, 24 Feb 2017 17:22:23 +0000 (18:22 +0100)] 
plugin-loader: Fix hashing of registered plugin features

This strangely never caused any noticeable issues, but was the reason for
build failures in certain test cases (mostly BLISS) due to missing plugin
features when built with specific options on Travis (was not reproducible
locally).

7 years agoVersion bump to 5.5.2dr5 5.5.2dr5
Andreas Steffen [Thu, 23 Feb 2017 16:31:11 +0000 (17:31 +0100)] 
Version bump to 5.5.2dr5

7 years agoUse of TPM 2.0 private keys for signatures via tpm plugin
Andreas Steffen [Thu, 16 Feb 2017 07:39:47 +0000 (08:39 +0100)] 
Use of TPM 2.0 private keys for signatures via tpm plugin

7 years agoImplement signatures with private keys bound to TPM 2.0
Andreas Steffen [Mon, 13 Feb 2017 18:06:18 +0000 (19:06 +0100)] 
Implement signatures with private keys bound to TPM 2.0

7 years agoandroid: New release after fixing potential ANR issue
Tobias Brunner [Mon, 20 Feb 2017 15:34:43 +0000 (16:34 +0100)] 
android: New release after fixing potential ANR issue

7 years agoandroid: Send network change events from a separate thread via JNI
Tobias Brunner [Wed, 15 Feb 2017 15:08:35 +0000 (16:08 +0100)] 
android: Send network change events from a separate thread via JNI

Doing this from the main UI thread (which delivers the broadcast) might
cause an ANR if there is a delay (e.g. while acquiring a mutex in the
native parts). There might also have been a race condition during
termination previously because Unregister() was not synchronized so there
might have been dangling events that got delivered while or after the mutex
in the native parts was destroyed.

7 years agoikev1: Respond to DPDs for rekeyed IKE_SAs
Tobias Brunner [Mon, 13 Feb 2017 10:54:53 +0000 (11:54 +0100)] 
ikev1: Respond to DPDs for rekeyed IKE_SAs

Some devices always use the oldest IKE_SA to send DPDs and will delete
all IKE_SAs when there is no response. If uniqueness is not enforced
rekeyed IKE_SAs might not get deleted until they expire so we should
respond to DPDs.

References #2090.

7 years agoike-sa: Optionally try to migrate to the best path on routing priority changes
Martin Willi [Mon, 10 Oct 2016 13:59:52 +0000 (15:59 +0200)] 
ike-sa: Optionally try to migrate to the best path on routing priority changes

When multihomed, a setup might prefer to dynamically stay on the cheapest
available path by using MOBIKE migrations. If the cheapest path goes away and
comes back, we currently stay on the more expensive path to reduce noise and
prevent potential migration issues. This is usually just fine for links not
generating real cost.

If we have more expensive links in the setup, it can be desirable to always
migrate to the cheapest link available. By setting charon.prefer_best_path,
charon tries to migrate to the path using the highest priority link, allowing
an external application to update routes to indirectly control MOBIKE behavior.
This option has no effect if MOBIKE is unavailable.

7 years agoikev2: Ignore roam events without MOBIKE but static local address
Tobias Brunner [Tue, 15 Nov 2016 14:42:33 +0000 (15:42 +0100)] 
ikev2: Ignore roam events without MOBIKE but static local address

Disabling MOBIKE and statically configuring a local address should be
enough indication that the user doesn't want to roam to a different
address.  There might not be any routes that indicate we can use the
current address but it might still work (e.g. if the address is on an
interface that is not referenced in any routes and the address itself
is neither).  This way we avoid switching to another address for routes
that might be available on the system.

We currently don't make much use of COND_STALE anyway when MOBIKE is not
enabled, e.g. to avoid sending DPDs if the connection is seemingly down.
With MOBIKE enabled we don't exactly check that state but we do don't
send DPDs if there is no route/source address available.

7 years agoike-cfg: Add helper function to determine if a given IP address was configured
Tobias Brunner [Wed, 1 Feb 2017 17:00:57 +0000 (18:00 +0100)] 
ike-cfg: Add helper function to determine if a given IP address was configured

7 years agoMerge branch 'vici-updates'
Tobias Brunner [Thu, 16 Feb 2017 18:24:17 +0000 (19:24 +0100)] 
Merge branch 'vici-updates'

Adds several new features for the VICI interface and swanctl.

7 years agoNEWS: VICI updates
Tobias Brunner [Wed, 15 Feb 2017 16:49:06 +0000 (17:49 +0100)] 
NEWS: VICI updates

7 years agovici: Only log messages if there actually is a listener
Tobias Brunner [Mon, 13 Feb 2017 16:38:49 +0000 (17:38 +0100)] 
vici: Only log messages if there actually is a listener

7 years agovici: Let has_event_listeners() actually check if clients are registered
Tobias Brunner [Wed, 8 Feb 2017 14:20:58 +0000 (15:20 +0100)] 
vici: Let has_event_listeners() actually check if clients are registered

Fixes: 8d96f90a7983 ("vici: Add function to test if an event should be
generated")

7 years agovici: Add support for mediation extension
Tobias Brunner [Tue, 7 Feb 2017 11:04:30 +0000 (12:04 +0100)] 
vici: Add support for mediation extension

7 years agopeer-cfg: Store mediated_by as name and not peer-cfg reference
Tobias Brunner [Tue, 7 Feb 2017 10:30:49 +0000 (11:30 +0100)] 
peer-cfg: Store mediated_by as name and not peer-cfg reference

This way updates to the mediation config are respected and the order in
which configs are configured/loaded does not matter.

The SQL plugin currently maintains the strong relationship between
mediated and mediation connection (we could theoretically change that to a
string too).

7 years agovici: Include uniqueness policy in list-conns
Tobias Brunner [Wed, 1 Feb 2017 10:02:22 +0000 (11:02 +0100)] 
vici: Include uniqueness policy in list-conns

7 years agoswanctl: Add --rekey command
Tobias Brunner [Tue, 24 Jan 2017 15:34:32 +0000 (16:34 +0100)] 
swanctl: Add --rekey command

7 years agovici: Add command to initiate SA rekeying
Tobias Brunner [Tue, 24 Jan 2017 15:26:48 +0000 (16:26 +0100)] 
vici: Add command to initiate SA rekeying

7 years agovici: Use unique names for CHILD_SAs in the list-sas command
Tobias Brunner [Fri, 9 Dec 2016 13:45:41 +0000 (14:45 +0100)] 
vici: Use unique names for CHILD_SAs in the list-sas command

The original name is returned in the new "name" attribute.

This fixes an issue with bindings that map VICI messages to
dictionaries.  For instance, in roadwarrior scenarios where every
CHILD_SA has the same name only the information of the last CHILD_SA
would end up in the dictionary for that name.

7 years agoswanctl: Allow specifying pubkeys directly via 0x/0s prefix
Tobias Brunner [Wed, 18 Jan 2017 16:46:27 +0000 (17:46 +0100)] 
swanctl: Allow specifying pubkeys directly via 0x/0s prefix

7 years agovici: Add support to load CA certificates from tokens and paths in authority sections
Tobias Brunner [Wed, 30 Nov 2016 14:41:18 +0000 (15:41 +0100)] 
vici: Add support to load CA certificates from tokens and paths in authority sections

7 years agovici: Add support to load certificates from file paths
Tobias Brunner [Wed, 30 Nov 2016 14:09:04 +0000 (15:09 +0100)] 
vici: Add support to load certificates from file paths

Probably not that useful via swanctl.conf but could be when used via VICI.

7 years agovici: Add support to load certificates from tokens
Tobias Brunner [Wed, 30 Nov 2016 11:44:51 +0000 (12:44 +0100)] 
vici: Add support to load certificates from tokens

7 years agoswanctl: Add `token` secrets for keys on tokens/smartcards
Tobias Brunner [Fri, 18 Nov 2016 15:40:34 +0000 (16:40 +0100)] 
swanctl: Add `token` secrets for keys on tokens/smartcards

7 years agovici: Add command to load a private key from a token
Tobias Brunner [Fri, 18 Nov 2016 14:01:18 +0000 (15:01 +0100)] 
vici: Add command to load a private key from a token

PINs are stored in a "hidden" credential set, so that its shared
secrets are not exposed via VICI.  Since they are not explicitly loaded as
shared secrets via VICI a client might consider them as removed secrets and
remove them.

7 years agovici: List namespace/peer-cfg name with policies and allow filtering
Tobias Brunner [Mon, 13 Feb 2017 17:18:58 +0000 (18:18 +0100)] 
vici: List namespace/peer-cfg name with policies and allow filtering

The two names are also transmitted in separate keys.

7 years agoswanctl: Pass optional connection name to --initiate/install/uninstall
Tobias Brunner [Tue, 11 Oct 2016 16:27:29 +0000 (18:27 +0200)] 
swanctl: Pass optional connection name to --initiate/install/uninstall

7 years agovici: Explicitly use peer name when uninstalling trap and shunt policies
Tobias Brunner [Wed, 16 Nov 2016 17:13:59 +0000 (18:13 +0100)] 
vici: Explicitly use peer name when uninstalling trap and shunt policies

Also adds an `ike` parameter to the `uninstall` command.

7 years agostroke: Use peer name as namespace for shunt policies
Tobias Brunner [Wed, 8 Feb 2017 15:13:32 +0000 (16:13 +0100)] 
stroke: Use peer name as namespace for shunt policies

The same goes for the start-action-job.  When unrouting, we search for
the first policy with a matching child-cfg.

7 years agoshunt-manager: Add an optional namespace for each shunt
Tobias Brunner [Wed, 16 Nov 2016 16:59:22 +0000 (17:59 +0100)] 
shunt-manager: Add an optional namespace for each shunt

This will allow us to reuse the names of child configs e.g. when they
are defined in different connections.

7 years agovici: Add support for NT Hash secrets
Tobias Brunner [Wed, 16 Nov 2016 16:12:33 +0000 (17:12 +0100)] 
vici: Add support for NT Hash secrets

Fixes #1002.

7 years agovici: Add support for IPv6 Transport Proxy Mode
Tobias Brunner [Wed, 16 Nov 2016 14:58:34 +0000 (15:58 +0100)] 
vici: Add support for IPv6 Transport Proxy Mode

7 years agovici: Add support for certificate policies
Tobias Brunner [Wed, 16 Nov 2016 14:37:23 +0000 (15:37 +0100)] 
vici: Add support for certificate policies

7 years agovici: Add missing dscp setting for IKE_SAs
Tobias Brunner [Fri, 11 Nov 2016 09:40:53 +0000 (10:40 +0100)] 
vici: Add missing dscp setting for IKE_SAs

Fixes #2170.

7 years agoswanctl: Automatically unload removed shared keys
Tobias Brunner [Wed, 9 Nov 2016 15:49:35 +0000 (16:49 +0100)] 
swanctl: Automatically unload removed shared keys

7 years agovici: Add possibility to remove shared keys by a unique identifier
Tobias Brunner [Wed, 9 Nov 2016 15:27:01 +0000 (16:27 +0100)] 
vici: Add possibility to remove shared keys by a unique identifier

This identifier can be set when adding/replacing a secret.  The unique
identifiers of all secrets may be enumerated.

7 years agomem-cred: Add methods to add/remove shared keys with unique identifiers
Tobias Brunner [Wed, 9 Nov 2016 15:20:03 +0000 (16:20 +0100)] 
mem-cred: Add methods to add/remove shared keys with unique identifiers

Also added is a method to enumerate the unique identifiers.

7 years agoswanctl: Automatically unload removed private keys
Tobias Brunner [Wed, 9 Nov 2016 11:25:00 +0000 (12:25 +0100)] 
swanctl: Automatically unload removed private keys

7 years agovici: Add commands to enumerate and remove private keys
Tobias Brunner [Wed, 9 Nov 2016 10:49:32 +0000 (11:49 +0100)] 
vici: Add commands to enumerate and remove private keys

They are identified by their SHA-1 key identifier.

7 years agomem-cred: Add method to remove a private key with a specific fingerprint
Tobias Brunner [Wed, 9 Nov 2016 10:22:11 +0000 (11:22 +0100)] 
mem-cred: Add method to remove a private key with a specific fingerprint

7 years agoswanctl: Add possibility to query a specific pool by name
Tobias Brunner [Wed, 9 Nov 2016 09:37:56 +0000 (10:37 +0100)] 
swanctl: Add possibility to query a specific pool by name

7 years agovici: Update get_pools() in Python and Ruby bindings
Tobias Brunner [Thu, 8 Dec 2016 17:14:40 +0000 (18:14 +0100)] 
vici: Update get_pools() in Python and Ruby bindings

7 years agovici: Add option to query a specific pool
Tobias Brunner [Wed, 9 Nov 2016 09:18:01 +0000 (10:18 +0100)] 
vici: Add option to query a specific pool

7 years agobypass-lan: Don't use interfaces in policies
Tobias Brunner [Mon, 13 Feb 2017 18:06:24 +0000 (19:06 +0100)] 
bypass-lan: Don't use interfaces in policies

After an interface disappeared we can't remove the policies correctly as
the name doesn't resolve to the previous index anymore.
And making the policies so specific might not provide that much benefit.

To handle the interfaces on the policies correctly would require some
changes to the child-cfg, kernel-interface etc. so they'd take interface
indices directly so we could target the policies correctly even if an
interface disappeared (or reappeared and got a new index).

7 years agotesting: Fix ALLOWED_HOSTS in strongTNC settings.ini
Tobias Brunner [Thu, 16 Feb 2017 17:24:25 +0000 (18:24 +0100)] 
testing: Fix ALLOWED_HOSTS in strongTNC settings.ini

7 years agotesting: Fix swanctl/ocsp-disabled scenario after changing the log messages
Tobias Brunner [Thu, 16 Feb 2017 16:51:16 +0000 (17:51 +0100)] 
testing: Fix swanctl/ocsp-disabled scenario after changing the log messages

7 years agorevocation: More accurately describe the flags to disable OCSP/CRL validation
Tobias Brunner [Wed, 25 Jan 2017 15:17:38 +0000 (16:17 +0100)] 
revocation: More accurately describe the flags to disable OCSP/CRL validation

These options disable validation as such, e.g. even from cached CRLs, not
only the fetching.  Also made the plugin's validate() implementation a
no-op if both options are disabled.

7 years agochild-sa: Do not install mark on inbound kernel SA
Eyal Birger [Wed, 25 Jan 2017 10:26:42 +0000 (12:26 +0200)] 
child-sa: Do not install mark on inbound kernel SA

The SA ID (src, dst, proto, spi) is unique on ingress.

As such, explicit inbound marking is not needed to match an SA.

On the other hand, requiring inbound SAs to use marks forces the
installation of a mechanism for marking traffic (e.g. iptables) based
on some criteria.

Defining the criteria becomes complicated, for example when required to
support multiple SAs from the same src, especially when traffic is UDP
encapsulated.

This commit removes the assignment of the child_sa mark_in to the inbound SA.

Policies can be arbitrated by existing means - e.g, via netfilter policy
matching or using VTI interfaces - without the need to classify the flows prior
to state matching.

Since the reqid allocator regards the mark value, there is no risk of matching
the wrong policy.

And as explicit marking was required for route-based VPN to work before this
change, it should not cause regressions in existing setups.

Closes strongswan/strongswan#59.

7 years agounit-tests: Allow default test timeout to be configured via compile option
Thomas Egerer [Fri, 10 Feb 2017 14:27:11 +0000 (15:27 +0100)] 
unit-tests: Allow default test timeout to be configured via compile option

Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com>
7 years agotkm: Fix get_auth_octets() signature
Tobias Brunner [Mon, 13 Feb 2017 17:36:01 +0000 (18:36 +0100)] 
tkm: Fix get_auth_octets() signature

Fixes: 267c1f7083d4 ("keymat: Allow keymat to modify signature scheme(s)")
7 years agokernel-netlink: Use RTA_SRC to specify route source in kernel-based lookups
Martin Willi [Thu, 19 Jan 2017 10:23:45 +0000 (11:23 +0100)] 
kernel-netlink: Use RTA_SRC to specify route source in kernel-based lookups

For table dumps the kernel accepts RTA_PREFSRC to filter the routes, which is
what we do when doing userspace route calculations. For kernel-based route
lookups, however, the RTA_PREFSRC attribute is ignored and we must specify
RTA_SRC for policy based route lookups.

7 years agokernel-netlink: Use kernel-based route lookup if we do not install routes
Martin Willi [Thu, 19 Jan 2017 10:03:55 +0000 (11:03 +0100)] 
kernel-netlink: Use kernel-based route lookup if we do not install routes

For gateways with many connections, installing routes is often disabled,
as we can use a static route configuration to achieve proper routing with
a single rule. If this is the case, there is no need to dump all routes and
do userspace route lookups, as there is no need to exclude routes we installed
ourself.

Doing kernel-based route lookups is not only faster with may routes, but also
can use the full power of Linux policy based routing; something we can hardly
rebuild in userspace when calculating routes.

7 years agoswanctl: List CHILD_SA marks, if set
Martin Willi [Fri, 6 Jan 2017 12:01:34 +0000 (13:01 +0100)] 
swanctl: List CHILD_SA marks, if set

7 years agovici: Include the Netfilter marks in listed CHILD_SAs
Martin Willi [Fri, 6 Jan 2017 11:42:04 +0000 (12:42 +0100)] 
vici: Include the Netfilter marks in listed CHILD_SAs

7 years agovici: Explicitly set the Python encoding type
Martin Willi [Tue, 8 Dec 2015 16:13:59 +0000 (17:13 +0100)] 
vici: Explicitly set the Python encoding type

When using vici over RPyC and its (awesome) splitbrain, encoding and decoding
strings fails in vici, most likely because of the Monkey-Patch magic splitbrain
uses.

When specifying the implicit UTF-8 as encoding scheme explicitly, Python uses
the correct method to encode/decode the string, making vici useable in
splitbrain contexts.

7 years agoMerge branch 'mid-sync'
Tobias Brunner [Wed, 8 Feb 2017 14:11:20 +0000 (15:11 +0100)] 
Merge branch 'mid-sync'

Adds support for handling IKEV2_MESSAGE_ID_SYNC notifies as responder
(usually the original initiator) as defined in RFC 6311.  Some HA solutions
use these notifies to set the new IKEv2 message IDs after a failover event.

7 years agounit-tests: Add test cases for MID sync exchanges
Tobias Brunner [Tue, 4 Oct 2016 17:35:51 +0000 (19:35 +0200)] 
unit-tests: Add test cases for MID sync exchanges

7 years agoikev2: Ignore IKEV2_MESSAGE_ID_SYNC notifies if extension is disabled
Tobias Brunner [Tue, 4 Oct 2016 15:07:30 +0000 (17:07 +0200)] 
ikev2: Ignore IKEV2_MESSAGE_ID_SYNC notifies if extension is disabled

If this is the first message by the peer, i.e. we expect MID 0, the
message is not pre-processed in the task manager so we ignore it in the
task.

We also make sure to ignore such messages if the extension is disabled
and the peer already sent us one INFORMATIONAL, e.g. a DPD (we'd otherwise
consider the message with MID 0 as a retransmit).

7 years agoikev2: Don't increase expected MID after handling MID sync message
Tobias Brunner [Tue, 4 Oct 2016 13:15:36 +0000 (15:15 +0200)] 
ikev2: Don't increase expected MID after handling MID sync message

If the responder never sent a message the expected MID is 0.  While
the sent MID (M1) SHOULD be increased beyond the known value, it's
not necessarily the case.
Since M2 - 1 would then equal UINT_MAX setting that MID would get ignored
and while we'd return 0 in the notify we'd actually expect 1 afterwards.

7 years agoikev2: Don't cache response to MID sync request
Tobias Brunner [Mon, 19 Sep 2016 09:16:06 +0000 (11:16 +0200)] 
ikev2: Don't cache response to MID sync request

7 years agoikev2: Accept INFORMATIONAL messages with MID 0 if used to sync MIDs
Tobias Brunner [Fri, 16 Sep 2016 15:44:39 +0000 (17:44 +0200)] 
ikev2: Accept INFORMATIONAL messages with MID 0 if used to sync MIDs

We are very picky to only allow MID 0 for these messages (while we
currently don't support IPSEC_REPLAY_COUNTER_SYNC notifies we accept
them).

7 years agoikev2: Negotiate support for IKE message ID synchronisation during IKE_AUTH
Tobias Brunner [Fri, 16 Sep 2016 15:37:59 +0000 (17:37 +0200)] 
ikev2: Negotiate support for IKE message ID synchronisation during IKE_AUTH

7 years agoikev2: Add task to handle IKEV2_MESSAGE_ID_SYNC notifies as responder
Tobias Brunner [Fri, 16 Sep 2016 15:26:41 +0000 (17:26 +0200)] 
ikev2: Add task to handle IKEV2_MESSAGE_ID_SYNC notifies as responder

7 years agoike: Publish getter for the current message ID on IKE_SA
Tobias Brunner [Fri, 16 Sep 2016 14:19:25 +0000 (16:19 +0200)] 
ike: Publish getter for the current message ID on IKE_SA

7 years agoike: Add getter for the current message ID to task manager
Tobias Brunner [Fri, 16 Sep 2016 14:18:32 +0000 (16:18 +0200)] 
ike: Add getter for the current message ID to task manager

7 years agoMerge branch 'bypass-lan'
Tobias Brunner [Wed, 8 Feb 2017 09:47:33 +0000 (10:47 +0100)] 
Merge branch 'bypass-lan'

Adds a new plugin that automatically installs and updates bypass policies
for locally attached subnets.  This is useful for laptops etc. that are
used in different networks and prefer maintaining access to local hosts
(e.g. network printers or NAS) while connected to a VPN.

7 years agokernel-pfroute: Implement enumeration of local subnets
Tobias Brunner [Wed, 12 Oct 2016 16:32:14 +0000 (18:32 +0200)] 
kernel-pfroute: Implement enumeration of local subnets

7 years agobypass-lan: Allow ignoring or only considering subnets of specific interfaces
Tobias Brunner [Wed, 12 Oct 2016 13:56:12 +0000 (15:56 +0200)] 
bypass-lan: Allow ignoring or only considering subnets of specific interfaces

The config can also be reloaded by sending a SIGHUP to charon.

7 years agobypass-lan: Configure interface on bypass policy
Tobias Brunner [Wed, 12 Oct 2016 10:28:18 +0000 (12:28 +0200)] 
bypass-lan: Configure interface on bypass policy

Currently, only the kernel-netlink plugin supports this, the others will
just ignore it.

7 years agokernel-netlink: Return interface name in local subnet enumerator
Tobias Brunner [Wed, 12 Oct 2016 10:22:42 +0000 (12:22 +0200)] 
kernel-netlink: Return interface name in local subnet enumerator

7 years agokernel-interface: Add interface name to local subnet enumerator
Tobias Brunner [Wed, 12 Oct 2016 10:11:24 +0000 (12:11 +0200)] 
kernel-interface: Add interface name to local subnet enumerator

7 years agobypass-lan: Add plugin that installs bypass policies for locally attached subnets
Tobias Brunner [Wed, 12 Oct 2016 08:05:10 +0000 (10:05 +0200)] 
bypass-lan: Add plugin that installs bypass policies for locally attached subnets

7 years agokernel-netlink: Implement enumerator for local subnets
Tobias Brunner [Wed, 12 Oct 2016 07:52:45 +0000 (09:52 +0200)] 
kernel-netlink: Implement enumerator for local subnets

7 years agokernel-interface: Add method to enumerate locally attached subnets
Tobias Brunner [Wed, 12 Oct 2016 07:24:49 +0000 (09:24 +0200)] 
kernel-interface: Add method to enumerate locally attached subnets

7 years agokernel-pfkey: Use the same priority range for trap and regular policies
Tobias Brunner [Tue, 11 Oct 2016 13:14:27 +0000 (15:14 +0200)] 
kernel-pfkey: Use the same priority range for trap and regular policies

Same as the change in the kernel-netlink plugin.

7 years agokernel-netlink: Use the same priority range for trap and regular policies
Tobias Brunner [Tue, 11 Oct 2016 12:30:21 +0000 (14:30 +0200)] 
kernel-netlink: Use the same priority range for trap and regular policies

While trap and regular policies now often look the same (mainly because
reqids are kept constant) trap policies still need to have a lower priority
than regular policies to handle unroute/route correctly if e.g. IPComp
is used or the mode changes.  But if we use a completely different
priority range that's lower than that of regular policies it is not possible
to install overlapping trap policies.  By differentiating trap from
regular policies via the priority's LSB this issue is avoided while
still maintaining the proper ordering of trap and regular policies.

Fixes #1243.

7 years agokernel-netlink: Fix spacing in log message when policy is unchanged
Tobias Brunner [Tue, 11 Oct 2016 13:10:16 +0000 (15:10 +0200)] 
kernel-netlink: Fix spacing in log message when policy is unchanged

7 years agoikev1: Factor out IV and QM management
Tobias Brunner [Wed, 14 Dec 2016 14:54:39 +0000 (15:54 +0100)] 
ikev1: Factor out IV and QM management

This simplifies implementing a custom keymat_v1_t.

7 years agokeymat: Allow keymat to modify signature scheme(s)
Thomas Egerer [Thu, 1 Dec 2016 13:40:25 +0000 (14:40 +0100)] 
keymat: Allow keymat to modify signature scheme(s)

Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com>
7 years agoforecast: Mark correct port in UDP NAT-T rule
James Laird-Wah [Wed, 8 Feb 2017 08:20:52 +0000 (19:20 +1100)] 
forecast: Mark correct port in UDP NAT-T rule

Closes strongswan/strongswan#62.

7 years agoandroid: New release after adding translation for Simplified Chinese
Tobias Brunner [Tue, 7 Feb 2017 15:01:25 +0000 (16:01 +0100)] 
android: New release after adding translation for Simplified Chinese

7 years agoandroid: Add translation for Simplified Chinese
Tobias Brunner [Mon, 23 Jan 2017 17:39:47 +0000 (18:39 +0100)] 
android: Add translation for Simplified Chinese

Courtesy of Yick Xie.

7 years agosettings: Fix purge if order differs from alphabetical order
Tobias Brunner [Tue, 25 Oct 2016 08:46:36 +0000 (10:46 +0200)] 
settings: Fix purge if order differs from alphabetical order

7 years agoeap-dynamic: Publish the get_auth() method of the wrapped EAP method
Tobias Brunner [Wed, 1 Feb 2017 10:16:42 +0000 (11:16 +0100)] 
eap-dynamic: Publish the get_auth() method of the wrapped EAP method

Fixes #2238.

7 years agopkcs11: Fix documentation of load_certs option
Tobias Brunner [Mon, 5 Dec 2016 14:34:48 +0000 (15:34 +0100)] 
pkcs11: Fix documentation of load_certs option

This option is actually module-specific.

7 years agoike-auth: Don't send INITIAL_CONTACT if remote ID contains wildcards
Tobias Brunner [Mon, 14 Nov 2016 14:39:17 +0000 (15:39 +0100)] 
ike-auth: Don't send INITIAL_CONTACT if remote ID contains wildcards

Such an identity won't equal an actual peer's identity resulting in
sending an INITIAL_CONTACT notify even if there might be an existing
IKE_SA.

7 years agoproposal: Copy SPI and proposal number from correct proposal in select()
Tobias Brunner [Thu, 15 Dec 2016 17:22:11 +0000 (18:22 +0100)] 
proposal: Copy SPI and proposal number from correct proposal in select()

If charon.prefer_configured_proposals is disabled select() is called on
the received proposal. This incorrectly set the SPI to 0 as the
configured proposal has no SPI set.

Fixes #2190.

7 years agokernel-netlink: Set NODAD flag for virtual IPv6 addresses
Tobias Brunner [Tue, 13 Dec 2016 16:27:26 +0000 (17:27 +0100)] 
kernel-netlink: Set NODAD flag for virtual IPv6 addresses

The Optimistic Duplicate Address Detection (DAD) seems to fail in some
cases (`dadfailed` in `ip addr`) rendering the virtual IP address unusable.

Fixes #2183.