2 years agoike: Apply retransmission_limit before applying the jitter
Tobias Brunner [Fri, 26 May 2017 16:16:40 +0000 (18:16 +0200)]
ike: Apply retransmission_limit before applying the jitter

2 years agoeap-sim-file: Remove redundant enumerator allocation
Tobias Brunner [Fri, 26 May 2017 14:42:59 +0000 (16:42 +0200)]
eap-sim-file: Remove redundant enumerator allocation

2 years agosql: Remove redundant enumerator allocation
Tobias Brunner [Fri, 26 May 2017 13:10:04 +0000 (15:10 +0200)]
sql: Remove redundant enumerator allocation

Interestingly, this doesn't show up in the regression tests because the
compiler removes the first assignment (and thus the allocation) due to
-O2 that's included in our default CFLAGS.

2 years agotesting: Add wrapper around service command
Tobias Brunner [Fri, 26 May 2017 14:24:35 +0000 (16:24 +0200)]
testing: Add wrapper around service command

When charon is started via service command LEAK_DETECTIVE_LOG is not set
because the command strips the environment.  Since we only want the
variable to be set during the automated test runs we can't just set it
in /etc/default/charon.  Instead, we do so in this wrapper when charon is
started and remove the variable again when it is stopped.

2 years agoFixed some typos, courtesy of codespell
Tobias Brunner [Fri, 26 May 2017 12:44:06 +0000 (14:44 +0200)]
Fixed some typos, courtesy of codespell

2 years agoapidoc: Add legacy README so links get properly resolved
Tobias Brunner [Wed, 24 May 2017 12:49:23 +0000 (14:49 +0200)]
apidoc: Add legacy README so links get properly resolved

Also reorders the input files so the READMEs are listed first in the
navigation menu on the left.

2 years agotesting: Added swanctl/rw-eap-md5-id-rsa scenario
Andreas Steffen [Fri, 19 May 2017 19:15:25 +0000 (21:15 +0200)]
testing: Added swanctl/rw-eap-md5-id-rsa scenario

2 years agoREADME: Converted to swanctl configuration scheme
Andreas Steffen [Thu, 11 May 2017 20:22:23 +0000 (22:22 +0200)]
README: Converted to swanctl configuration scheme

2 years agoMerge branch 'variadic-enumerators'
Tobias Brunner [Fri, 26 May 2017 11:57:57 +0000 (13:57 +0200)]
Merge branch 'variadic-enumerators'

This adds several changes to enumerator_t and linked_list_t to improve
portability.  In particular to Apple's ARM64 iOS platform, whose calling
convention for variadic and regular functions are different.  This means
that assigning a non-variadic function to a variadic function pointer,
as we did with our enumerator_t::enumerate() implementations and several
callbacks, will result in crashes as the called function will access the
arguments differently than the caller provided them.

To avoid this issue the enumerator_t interface is now fully variadic.
A new mandatory method is added, venumerate(), that takes a va_list with
the arguments provided while enumerating.  enumerate() is replaced with
a generic implementation that prepares a va_list and calls the
enumerator's venumerate() implementation.  As this allows passing the
arguments of one enumerator to another it avoids the five pointer hack
used by enumerator_create_nested() and enumerator_create_cleaner().
To simplify the implementation of venumerate() a helper macro is provided
that assigns values from a given va_list to local variables.

The signature of the callback passed to enumerator_create_filter() has
also changed significantly.  It's now required to enumerate over the
original enumerator in the callback as this avoids the previous in/out
pointer hack. The arguments to the outer enumerator are provided in a

Similar changes to avoid such five pointer hacks affect the signatures
of the callbacks for linked_list_t's invoke_function() and find_first()
methods.  For the latter the return type also changed from status_t to
bool, which is important as SUCCESS is defined as 0, so checks for ==
SUCCESS will now fail.

2 years agolinked-list: Change return value of find_first() and signature of its callback
Tobias Brunner [Tue, 16 May 2017 10:11:24 +0000 (12:11 +0200)]
linked-list: Change return value of find_first() and signature of its callback

This avoids the unportable five pointer hack.

2 years agolinked-list: Change interface of callback for invoke_function()
Tobias Brunner [Mon, 15 May 2017 15:51:19 +0000 (17:51 +0200)]
linked-list: Change interface of callback for invoke_function()

This avoids the unportable five pointer hack.

2 years agolinked-list: invoke_offset() doesn't take any additional arguments anymore
Tobias Brunner [Mon, 15 May 2017 15:12:44 +0000 (17:12 +0200)]
linked-list: invoke_offset() doesn't take any additional arguments anymore

2 years agoChange interface for enumerator_create_filter() callback
Tobias Brunner [Fri, 12 May 2017 10:10:27 +0000 (12:10 +0200)]
Change interface for enumerator_create_filter() callback

This avoids the unportable 5 pointer hack, but requires enumerating in
the callback.

2 years agoMigrate all enumerators to venumerate() interface change
Tobias Brunner [Thu, 11 May 2017 07:17:02 +0000 (09:17 +0200)]
Migrate all enumerators to venumerate() interface change

2 years agoenumerator: Add venumerate() method to enumerator_t that takes a va_list
Tobias Brunner [Tue, 9 May 2017 14:59:37 +0000 (16:59 +0200)]
enumerator: Add venumerate() method to enumerator_t that takes a va_list

This will allow us to implement e.g. enumerator_cleaner without having to
use that unportable 5 pointer forwarding or having to define a callback for
each instance.

A generic implementation for enumerate() is provided so only venumerate()
has to be implemented, which may be simplified by using the VA_ARGS_VGET()

2 years agoutils: Add helper macros to read variadic arguments into local variables
Tobias Brunner [Wed, 3 May 2017 11:58:02 +0000 (13:58 +0200)]
utils: Add helper macros to read variadic arguments into local variables

2 years agotesting: Fix ikev2/two-certs scenario
Tobias Brunner [Fri, 26 May 2017 11:49:51 +0000 (13:49 +0200)]
testing: Fix ikev2/two-certs scenario

Since 6a8a44be88b0 the certificate received by the client is verified
first, before checking the cached certificates for any with matching
identities.  So we usually don't have to attempt to verify the signature
with wrong certificates first and can avoid this message.

2 years agoMerge branch 'sha-256-96'
Tobias Brunner [Fri, 26 May 2017 09:23:12 +0000 (11:23 +0200)]
Merge branch 'sha-256-96'

Adds an option to locally configure 96-bit truncation for HMAC-SHA256
when negotiated using the official algorithm identifier.  This is for
compatibility with peers that incorrectly use this shorter truncation
(like Linux does by default).

Fixes #1353.

2 years agovici: Make 96-bit truncation for SHA-256 configurable
Tobias Brunner [Wed, 10 May 2017 17:37:22 +0000 (19:37 +0200)]
vici: Make 96-bit truncation for SHA-256 configurable

2 years agostroke: Make 96-bit truncation for SHA-256 configurable
Tobias Brunner [Wed, 10 May 2017 17:32:53 +0000 (19:32 +0200)]
stroke: Make 96-bit truncation for SHA-256 configurable

2 years agochild-cfg: Optionally use 96-bit truncation for HMAC-SHA-256
Tobias Brunner [Wed, 10 May 2017 17:15:53 +0000 (19:15 +0200)]
child-cfg: Optionally use 96-bit truncation for HMAC-SHA-256

The correct truncation is 128-bit but some implementations insist on
using 96-bit truncation.  With strongSwan this can be negotiated using
an algorithm identifier from a private range.  But this doesn't work
with third-party implementations.  This adds an option to use 96-bit
truncation even if the official identifier is used.

2 years agoandroid-log: Link against liblog
Tobias Brunner [Fri, 26 May 2017 07:39:21 +0000 (09:39 +0200)]
android-log: Link against liblog

2 years agounit-tests: Fix test_chunk_eq() if arguments have side-effects
Tobias Brunner [Wed, 24 May 2017 07:34:17 +0000 (09:34 +0200)]
unit-tests: Fix test_chunk_eq() if arguments have side-effects

2 years agoMerge branch 'avoid-rekey-loss'
Tobias Brunner [Tue, 23 May 2017 16:49:13 +0000 (18:49 +0200)]
Merge branch 'avoid-rekey-loss'

This changes the behavior during IKEv2 CHILD_SA rekeyings to avoid
traffic loss.  When responding to a CREATE_CHILD_SA request to rekey a
CHILD_SA the responder already has everything available to install and
use the new CHILD_SA.  However, this could lead to lost traffic as the
initiator won't be able to process inbound packets until it processed the
CREATE_CHILD_SA response and updated the inbound SA.  To avoid this the
responder now only installs the new inbound SA and delays installing the
outbound SA until it receives the DELETE for the replaced CHILD_SA.  The
messages transporting these DELETEs could reach the peer before packets
sent with the deleted outbound SAs reach the respective peer.  To reduce
the chance of traffic loss due to this the inbound SA of the replaced
CHILD_SA is not removed for a configurable amount of seconds after
the DELETE has been processed.

Fixes #1291.

2 years agounit-tests: Check installed IPsec SAs in child-rekey tests
Tobias Brunner [Wed, 8 Mar 2017 14:47:58 +0000 (15:47 +0100)]
unit-tests: Check installed IPsec SAs in child-rekey tests

2 years agounit-tests: Add assert to check for installed IPsec SAs
Tobias Brunner [Wed, 8 Mar 2017 14:46:39 +0000 (15:46 +0100)]
unit-tests: Add assert to check for installed IPsec SAs

2 years agounit-tests: Migrate cached IPsec SAs to new IKE_SAs during rekeying
Tobias Brunner [Thu, 9 Mar 2017 09:59:31 +0000 (10:59 +0100)]
unit-tests: Migrate cached IPsec SAs to new IKE_SAs during rekeying

2 years agounit-tests: Keep track of installed IPsec SAs in mock kernel_ipsec_t implementation
Tobias Brunner [Wed, 8 Mar 2017 14:45:41 +0000 (15:45 +0100)]
unit-tests: Keep track of installed IPsec SAs in mock kernel_ipsec_t implementation

2 years agochild-delete: Delay the removal of the inbound SA of rekeyed CHILD_SAs
Tobias Brunner [Tue, 21 Mar 2017 15:03:54 +0000 (16:03 +0100)]
child-delete: Delay the removal of the inbound SA of rekeyed CHILD_SAs

After deleting a rekeyed CHILD_SA we uninstall the outbound SA but don't
destroy the CHILD_SA (and the inbound SA) immediately.  We delay it
a few seconds or until the SA expires to allow delayed packets to get
processed. The CHILD_SA remains in state CHILD_DELETING until it finally
gets destroyed.

2 years agodelete-child-sa-job: Add new constructor that takes the unique ID of a CHILD_SA
Tobias Brunner [Tue, 21 Mar 2017 14:56:02 +0000 (15:56 +0100)]
delete-child-sa-job: Add new constructor that takes the unique ID of a CHILD_SA

This makes sure we delete the right SA in case the addresses got updated
in the mean time.

2 years agochild-sa: Remove state to track installation of half the SA again
Tobias Brunner [Tue, 21 Mar 2017 14:39:10 +0000 (15:39 +0100)]
child-sa: Remove state to track installation of half the SA again

2 years agounit-tests: Overload helper macro to check for outbound SA state
Tobias Brunner [Tue, 21 Mar 2017 14:35:30 +0000 (15:35 +0100)]
unit-tests: Overload helper macro to check for outbound SA state

2 years agochild-sa: Expose state of the outbound SA
Tobias Brunner [Tue, 21 Mar 2017 14:08:14 +0000 (15:08 +0100)]
child-sa: Expose state of the outbound SA

2 years agochild-sa: Add method to remove the outbound SA and policies
Tobias Brunner [Mon, 20 Mar 2017 12:35:56 +0000 (13:35 +0100)]
child-sa: Add method to remove the outbound SA and policies

2 years agochild-sa: Keep track whether the outbound SA has been installed or not
Tobias Brunner [Wed, 8 Mar 2017 08:40:40 +0000 (09:40 +0100)]
child-sa: Keep track whether the outbound SA has been installed or not

2 years agochild-delete: Track flags per individual CHILD_SA
Tobias Brunner [Tue, 21 Mar 2017 11:18:12 +0000 (12:18 +0100)]
child-delete: Track flags per individual CHILD_SA

2 years agoikev2: Delay installation of outbound SAs during rekeying on the responder
Tobias Brunner [Wed, 1 Mar 2017 17:02:38 +0000 (18:02 +0100)]
ikev2: Delay installation of outbound SAs during rekeying on the responder

The responder has all the information needed to install both SAs before
the initiator does.  So if the responder immediately installs the outbound
SA it might send packets using the new SA which the initiator is not yet
able to process.  This can be avoided by delaying the installation of the
outbound SA until the replaced SA is deleted.

2 years agochild-sa: Add log message for CHILD_SA state changes
Tobias Brunner [Wed, 1 Mar 2017 15:07:57 +0000 (16:07 +0100)]
child-sa: Add log message for CHILD_SA state changes

2 years agochild-sa: Add method to associate rekeyed CHILD_SAs with their replacement
Tobias Brunner [Tue, 28 Feb 2017 14:03:45 +0000 (15:03 +0100)]
child-sa: Add method to associate rekeyed CHILD_SAs with their replacement

2 years agochild-sa: Add methods that allow partial installation of CHILD_SA
Tobias Brunner [Tue, 28 Feb 2017 14:03:12 +0000 (15:03 +0100)]
child-sa: Add methods that allow partial installation of CHILD_SA

Using install() for the inbound SA and register_outbound() for the
outbound SA followed by install_policies(), will delay the installation of
the outbound SA as well as the installation of the outbound policies
in the kernel until install_outbound() is called later.

2 years agochild-sa: Add new state to track installation of only the inbound SA
Tobias Brunner [Tue, 28 Feb 2017 13:57:51 +0000 (14:57 +0100)]
child-sa: Add new state to track installation of only the inbound SA

2 years agochild-sa: Change API used to set/install policies
Tobias Brunner [Wed, 1 Mar 2017 13:40:15 +0000 (14:40 +0100)]
child-sa: Change API used to set/install policies

This way we only have to pass the traffic selectors once.

2 years agochild-sa: Split in- and outbound policy de-/installation
Tobias Brunner [Tue, 28 Feb 2017 13:44:38 +0000 (14:44 +0100)]
child-sa: Split in- and outbound policy de-/installation

Only install outbound fallback policies.

2 years agochild-create: Trigger NARROW_RESPONDER_POST hook before installing SAs
Tobias Brunner [Wed, 1 Mar 2017 11:34:22 +0000 (12:34 +0100)]
child-create: Trigger NARROW_RESPONDER_POST hook before installing SAs

This makes sure we use the same set of traffic selectors when installing
the SAs and installing the policies.

2 years agoMerge branch 'fuzzing'
Tobias Brunner [Tue, 23 May 2017 16:33:00 +0000 (18:33 +0200)]
Merge branch 'fuzzing'

Adds support for fuzzing the certificate parser provided by the default
plugins (x509, pem, gmp etc.) on Google's OSS-Fuzz infrastructure (or
generally with libFuzzer). Fixes several issues that were found while
fuzzing these plugins.

When building the libraries monolithically and statically the
plugin constructors are now hard-coded in each library so the plugin
code is not removed by the linker because it thinks none of their symbols
are ever referenced.

2 years agotnc-ifmap: Null-terminate buffer to make sscanf()-calls safe
Tobias Brunner [Tue, 23 May 2017 10:37:05 +0000 (12:37 +0200)]
tnc-ifmap: Null-terminate buffer to make sscanf()-calls safe

2 years agolibimcv: Make sure the first argument to sscanf() is null-terminated
Tobias Brunner [Tue, 23 May 2017 10:24:01 +0000 (12:24 +0200)]
libimcv: Make sure the first argument to sscanf() is null-terminated

2 years agoasn1: Make sure the first argument to sscanf() is null-terminated
Tobias Brunner [Tue, 23 May 2017 10:19:48 +0000 (12:19 +0200)]
asn1: Make sure the first argument to sscanf() is null-terminated

2 years agox509: Fix leak when parsing CDPs if an invalid one follows valid ones
Tobias Brunner [Sat, 20 May 2017 11:04:56 +0000 (13:04 +0200)]
x509: Fix leak when parsing CDPs if an invalid one follows valid ones

2 years agopem: Ensure a value before checking Proc-Type in PEM header
Tobias Brunner [Fri, 5 May 2017 07:01:51 +0000 (09:01 +0200)]
pem: Ensure a value before checking Proc-Type in PEM header

2 years agochunk: Correctly parse Base64 text where four = follow in a row
Tobias Brunner [Thu, 4 May 2017 14:16:33 +0000 (16:16 +0200)]
chunk: Correctly parse Base64 text where four = follow in a row

That's not correct Base64 but invalid data could trigger this. Since
outlen would get reduced four times, but is only ever increased three
times per iteration, this could result in an integer underflow and then
a potential buffer overflow.

2 years agoconfigure: Don't modify CFLAGs if fuzzing is enabled
Tobias Brunner [Thu, 4 May 2017 14:10:00 +0000 (16:10 +0200)]
configure: Don't modify CFLAGs if fuzzing is enabled

Just rely on the flags passed by the build process.

2 years agoplugin-loader: Disable some logging output when building fuzz targets
Tobias Brunner [Wed, 3 May 2017 15:55:34 +0000 (17:55 +0200)]
plugin-loader: Disable some logging output when building fuzz targets

This avoids evaluating %N. An alternative would be to define a printf-hook
for plugin features.

2 years agox509: Manually print CRL/OCSP URIs when fuzzing
Tobias Brunner [Wed, 3 May 2017 16:10:17 +0000 (18:10 +0200)]
x509: Manually print CRL/OCSP URIs when fuzzing

This avoids a warning about the custom %Y printf specifier.

2 years agoprocessor: Move priority threads assignment to set_threads()
Tobias Brunner [Wed, 3 May 2017 15:35:45 +0000 (17:35 +0200)]
processor: Move priority threads assignment to set_threads()

This avoids the evaluation of %N even if the thread pool is never used.
We need to avoid as many custom printf specifiers as possible when
fuzzing our code to avoid excessive log messages.

2 years agofuzz: Change how fuzz_certs is built
Tobias Brunner [Mon, 1 May 2017 14:23:55 +0000 (16:23 +0200)]
fuzz: Change how fuzz_certs is built

We mainly do this because we have to create a self-contained executable
and it isn't so easy to actually get libtool to link e.g. libgmp

2 years agoAdd plugin constructor registration for all libraries that provide plugins
Tobias Brunner [Fri, 28 Apr 2017 15:49:50 +0000 (17:49 +0200)]
Add plugin constructor registration for all libraries that provide plugins

Unfortunately, we can't just add the generated C file to the sources in as the linker would remove that object file when it notices
that no symbol in it is ever referenced.  So we include it in the file
that contains the library initialization, which will definitely be
referenced by the executable.

This allows building an almost stand-alone static version of e.g. charon
when building with `--enable-monolithic --enable-static --disable-shared`
(without `--disable-shared` libtool will only build a version that links
the libraries dynamically).  External libraries (e.g. gmp or openssl) are
not linked statically this way, though.

2 years agoplugin-constructors: Add script to generate constructor registration
Tobias Brunner [Fri, 28 Apr 2017 15:46:57 +0000 (17:46 +0200)]
plugin-constructors: Add script to generate constructor registration

Using a Python script so this works in cross-compilation situations.

2 years agoplugin-loader: Add facility to register plugin constructors
Tobias Brunner [Fri, 28 Apr 2017 15:41:57 +0000 (17:41 +0200)]
plugin-loader: Add facility to register plugin constructors

Enabled when building monolithically and statically.

This should allow us to work around the -whole-archive issue with
libtool.  If the libraries register the plugin constructors they provide
they reference the constructors and will therefore prevent the linker from
removing these seemingly unused symbols from the final executable.

For use cases where dlsym() can be used, e.g. because the static libraries
are manually linked with -whole-archive (Linux) or -force-load (Apple),
this can be disabled by passing ss_cv_static_plugin_constructors=no to
the configure script.

2 years agoconfigure: Don't build static libraries by default
Tobias Brunner [Fri, 28 Apr 2017 13:39:01 +0000 (15:39 +0200)]
configure: Don't build static libraries by default

This way we can actually detect if someone wants to build strongSwan
statically because --enable-static has to be passed explicitly.

2 years agolibrary: Add compile option to disable memwipe() check
Tobias Brunner [Wed, 19 Apr 2017 08:40:40 +0000 (10:40 +0200)]
library: Add compile option to disable memwipe() check

2 years agofuzz: Make path to libFuzzer.a configurable
Tobias Brunner [Wed, 29 Mar 2017 09:32:25 +0000 (11:32 +0200)]
fuzz: Make path to libFuzzer.a configurable

2 years agopem: Don't read beyond line ends
Tobias Brunner [Wed, 29 Mar 2017 09:19:30 +0000 (11:19 +0200)]
pem: Don't read beyond line ends

2 years agox509: Fix leak if there is an empty CDP
Tobias Brunner [Wed, 29 Mar 2017 09:16:34 +0000 (11:16 +0200)]
x509: Fix leak if there is an empty CDP

2 years agox509: Fix leak if a certificate contains multiple authorityKeyIdentifiers
Tobias Brunner [Wed, 15 Mar 2017 10:16:35 +0000 (11:16 +0100)]
x509: Fix leak if a certificate contains multiple authorityKeyIdentifiers

2 years agofuzz: Add fuzzing boilerplate
Tobias Brunner [Wed, 8 Mar 2017 10:00:22 +0000 (11:00 +0100)]
fuzz: Add fuzzing boilerplate

2 years agotesting: Avoid expiration of allocated SPIs due to low retransmission settings
Tobias Brunner [Tue, 14 Mar 2017 16:02:26 +0000 (17:02 +0100)]
testing: Avoid expiration of allocated SPIs due to low retransmission settings

2 years agokernel-netlink: Use total retransmit timeout as acquire timeout
Tobias Brunner [Mon, 13 Mar 2017 11:15:25 +0000 (12:15 +0100)]
kernel-netlink: Use total retransmit timeout as acquire timeout

By using the total retransmit timeout, modifications of timeout settings
automatically reflect on the value of xfrm_acq_expires.  If set, the
value of xfrm_acq_expires configured by the user takes precedence over
the calculated value.

2 years agotask-manager: Add helper function to calculate the total retransmit timeout
Tobias Brunner [Mon, 13 Mar 2017 11:00:40 +0000 (12:00 +0100)]
task-manager: Add helper function to calculate the total retransmit timeout

2 years agoike: Use optional jitter to calculate retransmission timeouts
Tobias Brunner [Fri, 19 May 2017 14:14:40 +0000 (16:14 +0200)]
ike: Use optional jitter to calculate retransmission timeouts

Also adds an optional limit to avoid very high retransmission timeouts
with high numbers of retries.

2 years agokernel-netlink: Try to add new inbound SA if update fails
Thomas Egerer [Thu, 9 Mar 2017 17:26:35 +0000 (18:26 +0100)]
kernel-netlink: Try to add new inbound SA if update fails

When establishing a traffic-triggered CHILD_SA involves the setup of an
IKE_SA more than one exchange is required. As a result the temporary
acquire state may have expired -- even if the acquire expiration
(xfrm_acq_expires) time is set properly (165 by default).  The expire
message sent by the kernel is not processed in charon since no trap can
be found by the trap manager.
A possible solution could be to track allocated SPIs.  But since this is
a corner case and the tracking introduces quite a bit of overhead, it
seems much more sensible to add a new state if the update of a state
fails with NOT_FOUND.

Signed-off-by: Thomas Egerer <>
2 years agokernel-pfkey: Update SA addresses if supported by the kernel
Tobias Brunner [Tue, 7 Feb 2017 08:57:09 +0000 (09:57 +0100)]
kernel-pfkey: Update SA addresses if supported by the kernel

Upcoming FreeBSD kernels will support updating the addresses of existing
SAs with new SADB_X_EXT_NEW_ADDRESS_SRC|DST extensions for the SADB_UPDATE

2 years agokernel-pfkey: Use new encap flag on Mac OS X when updating SAs
Tobias Brunner [Tue, 7 Feb 2017 08:55:50 +0000 (09:55 +0100)]
kernel-pfkey: Use new encap flag on Mac OS X when updating SAs

2 years agoreceiver: Restrict init limit to half-open SAs as responder
Thomas Egerer [Fri, 10 Mar 2017 09:45:48 +0000 (10:45 +0100)]
receiver: Restrict init limit to half-open SAs as responder

Signed-off-by: Thomas Egerer <>
2 years agoMerge branch 'hw-offload'
Tobias Brunner [Tue, 23 May 2017 15:00:04 +0000 (17:00 +0200)]
Merge branch 'hw-offload'

Allows enabling hardware offload for IPsec SAs as introduced by Linux 4.11
for specific hardware.

2 years agokernel-netlink: Update hardware offload attribute when SAs are updated
Tobias Brunner [Wed, 30 Nov 2016 09:46:21 +0000 (10:46 +0100)]
kernel-netlink: Update hardware offload attribute when SAs are updated

2 years agokernel-netlink: Base SA update on correct message in multi-message response
Tobias Brunner [Wed, 30 Nov 2016 09:27:10 +0000 (10:27 +0100)]
kernel-netlink: Base SA update on correct message in multi-message response

2 years agovici: Make hardware offload configurable
Tobias Brunner [Mon, 20 Jun 2016 13:29:47 +0000 (15:29 +0200)]
vici: Make hardware offload configurable

2 years agochild-sa: Optionally enable hardware offload for CHILD_SAs
Tobias Brunner [Mon, 20 Jun 2016 13:27:22 +0000 (15:27 +0200)]
child-sa: Optionally enable hardware offload for CHILD_SAs

2 years agochild-cfg: Add flag to enable hardware offload
Tobias Brunner [Mon, 20 Jun 2016 13:24:49 +0000 (15:24 +0200)]
child-cfg: Add flag to enable hardware offload

2 years agochild-cfg: Use flags for boolean options
Tobias Brunner [Wed, 10 May 2017 17:04:25 +0000 (19:04 +0200)]
child-cfg: Use flags for boolean options

Makes it potentially easier to add new flags.

2 years agokernel-netlink: Enable hardware offloading if configured for an SA
Tobias Brunner [Mon, 20 Jun 2016 13:14:40 +0000 (15:14 +0200)]
kernel-netlink: Enable hardware offloading if configured for an SA

2 years agokernel-ipsec: Add flag to enable hardware offloading for an IPsec SA
Tobias Brunner [Mon, 20 Jun 2016 12:59:38 +0000 (14:59 +0200)]
kernel-ipsec: Add flag to enable hardware offloading for an IPsec SA

2 years agoinclude: Update xfrm.h to include hardware offloading extensions
Tobias Brunner [Mon, 20 Jun 2016 12:55:53 +0000 (14:55 +0200)]
include: Update xfrm.h to include hardware offloading extensions

2 years agokernel-netlink: Directly handle Netlink messages if thread pool is empty
Tobias Brunner [Wed, 12 Apr 2017 13:18:45 +0000 (15:18 +0200)]
kernel-netlink: Directly handle Netlink messages if thread pool is empty

During initialization of the plugins the thread pool is not yet
initialized so there is no watcher thread that could handle the queued
Netlink message and the main thread will wait indefinitely for a

Fixes #2199.

2 years agosocket-default: Add an option to force the sending interface via IP_PKTINFO
Martin Willi [Fri, 16 Sep 2016 12:50:07 +0000 (14:50 +0200)]
socket-default: Add an option to force the sending interface via IP_PKTINFO

On Linux, setting the source address is insufficient to force a packet to be
sent over a certain path. The kernel uses the best route to select the outgoing
interface, even if we set a source address of a lower priority interface. This
is not only true for interfaces attaching to the same subnet, but also for
unrelated interfaces; the kernel (at least on 4.7) sends out the packet on
whatever interface it sees fit, even if that network does not expect packets
from the source address we force to.

When a better interface becomes available, strongSwan sends its MOBIKE address
list update using the old source address. But the kernel sends that packet over
the new best interface. If that network drops packets having the unexpected
source address from the old path, the MOBIKE update fails and the SA finally
times out.

To enforce a specific interface for our packet, we explicitly set the interface
index from the interface where the source address is installed. According to
ip(7), this overrules the specified source address to the primary interface
address. As this could have side effects to installations using multiple
addresses on a single interface, we disable the option by default for now.

This also allows using IPv6 link-local addresses, which won't work if
the outbound interface is not set explicitly.

2 years agoAdd an option to announce support for IKE fragmentation but not sending fragments
Tobias Brunner [Fri, 5 May 2017 13:48:14 +0000 (15:48 +0200)]
Add an option to announce support for IKE fragmentation but not sending fragments

2 years agoswanctl: Use returned key ID to track loaded private keys
Tobias Brunner [Fri, 12 May 2017 07:15:24 +0000 (09:15 +0200)]
swanctl: Use returned key ID to track loaded private keys

There was a direct call to load_key() for unencrypted keys that didn't
remove the key ID from the hashtable, which caused keys to get unloaded
when --load-creds was called multiple times.

2 years agovici: Return key ID from load-key command
Tobias Brunner [Fri, 12 May 2017 07:10:15 +0000 (09:10 +0200)]
vici: Return key ID from load-key command

We already do this for load-token and this should simplify client

2 years agocredential-manager: Prefer local over global sets
Adrian-Ken Rueegsegger [Wed, 26 Apr 2017 11:46:26 +0000 (13:46 +0200)]
credential-manager: Prefer local over global sets

Invert set enumeration order to first enumerate local and then global
credential sets.

2 years agoikev1: Send NAT-D payloads after HASH payloads in Aggressive Mode requests
Tobias Brunner [Thu, 4 May 2017 09:29:50 +0000 (11:29 +0200)]
ikev1: Send NAT-D payloads after HASH payloads in Aggressive Mode requests

Some implementations seem to have problems if the third AM message
contains NAT-D payloads before the HASH payload.

Fixes #2314.

2 years agoike-sa-manager: Improve scalability of IKE_SA count checking
Thomas Egerer [Thu, 23 Mar 2017 08:43:06 +0000 (09:43 +0100)]
ike-sa-manager: Improve scalability of IKE_SA count checking

Much like in commit a68454b, we now use a global atomic counter to keep
track of the number of IKE_SAs currently registered. This should improve
scalability for a large number of segments even more.

Signed-off-by: Thomas Egerer <>
2 years agotun-device: Use next free TUN device on FreeBSD
Tobias Brunner [Wed, 3 May 2017 08:01:12 +0000 (10:01 +0200)]
tun-device: Use next free TUN device on FreeBSD

While this API is documented as legacy (and there is a sysctl option to
disable it) the documentation also mentions that it will probably stay
enabled by default due to compatibility issues with existing applications.

With the previous approach only 255 devices could be opened then the
daemon had to be restarted.

Fixes #2313.

2 years agotun-device: TUN devices are not supported on iOS
Tobias Brunner [Tue, 18 Apr 2017 09:06:13 +0000 (11:06 +0200)]
tun-device: TUN devices are not supported on iOS

2 years agoattr-sql: Make release of online leases during startup optional
Tobias Brunner [Tue, 21 Mar 2017 07:53:02 +0000 (08:53 +0100)]
attr-sql: Make release of online leases during startup optional

This cleanup prevents sharing the same DB between multiple VPN gateways.

2 years agocharon-nm: Fix typo to actually use random NAT-T port
Tobias Brunner [Wed, 3 May 2017 07:54:52 +0000 (09:54 +0200)]
charon-nm: Fix typo to actually use random NAT-T port

Fixes: af16b5afb0ee ("Use random ports in NetworkManager backend")

2 years agoaf-alg: Fix crypt() definition conflict
Baruch Siach [Thu, 11 May 2017 11:04:47 +0000 (14:04 +0300)]
af-alg: Fix crypt() definition conflict

Rename the crypt() method to avoid conflict with POSIX crypt(). Fixes the
following build failure with musl libc:

In file included from ../../../../src/libstrongswan/utils/utils.h:53:0,
                 from ../../../../src/libstrongswan/library.h:101,
                 from af_alg_ops.h:24,
                 from af_alg_ops.c:16:
af_alg_ops.c:110:22: error: conflicting types for 'crypt'
 METHOD(af_alg_ops_t, crypt, bool,
../../../../src/libstrongswan/utils/utils/object.h:99:13: note: in definition of macro 'METHOD'
  static ret name(union {iface *_public; this;} \
In file included from af_alg_ops.c:18:0:
.../host/usr/x86_64-buildroot-linux-musl/sysroot/usr/include/unistd.h:144:7: note: previous declaration of 'crypt' was here
 char *crypt(const char *, const char *);

Closes strongswan/strongswan#72.

2 years agoVersion bump to 5.3.3dr2 5.5.3dr2
Andreas Steffen [Mon, 8 May 2017 20:38:12 +0000 (22:38 +0200)]
Version bump to 5.3.3dr2

2 years agox509: Evaluate return codes of parsing functions
Andreas Steffen [Fri, 5 May 2017 07:04:19 +0000 (09:04 +0200)]
x509: Evaluate return codes of parsing functions

2 years agonm: Explicitly prevent the smartcard PIN from being stored
Raphael Geissert [Thu, 3 Nov 2016 16:00:21 +0000 (17:00 +0100)]
nm: Explicitly prevent the smartcard PIN from being stored

The secret storage flag wasn't being saved when using smartcard
authentication, resulting in the PIN being stored.

Fixes #2166.