4 years agotesting: Fix ikev2/two-certs scenario
Tobias Brunner [Fri, 26 May 2017 11:49:51 +0000 (13:49 +0200)]
testing: Fix ikev2/two-certs scenario

Since 6a8a44be88b0 the certificate received by the client is verified
first, before checking the cached certificates for any with matching
identities.  So we usually don't have to attempt to verify the signature
with wrong certificates first and can avoid this message.

4 years agoMerge branch 'sha-256-96'
Tobias Brunner [Fri, 26 May 2017 09:23:12 +0000 (11:23 +0200)]
Merge branch 'sha-256-96'

Adds an option to locally configure 96-bit truncation for HMAC-SHA256
when negotiated using the official algorithm identifier.  This is for
compatibility with peers that incorrectly use this shorter truncation
(like Linux does by default).

Fixes #1353.

4 years agovici: Make 96-bit truncation for SHA-256 configurable
Tobias Brunner [Wed, 10 May 2017 17:37:22 +0000 (19:37 +0200)]
vici: Make 96-bit truncation for SHA-256 configurable

4 years agostroke: Make 96-bit truncation for SHA-256 configurable
Tobias Brunner [Wed, 10 May 2017 17:32:53 +0000 (19:32 +0200)]
stroke: Make 96-bit truncation for SHA-256 configurable

4 years agochild-cfg: Optionally use 96-bit truncation for HMAC-SHA-256
Tobias Brunner [Wed, 10 May 2017 17:15:53 +0000 (19:15 +0200)]
child-cfg: Optionally use 96-bit truncation for HMAC-SHA-256

The correct truncation is 128-bit but some implementations insist on
using 96-bit truncation.  With strongSwan this can be negotiated using
an algorithm identifier from a private range.  But this doesn't work
with third-party implementations.  This adds an option to use 96-bit
truncation even if the official identifier is used.

4 years agoandroid-log: Link against liblog
Tobias Brunner [Fri, 26 May 2017 07:39:21 +0000 (09:39 +0200)]
android-log: Link against liblog

4 years agounit-tests: Fix test_chunk_eq() if arguments have side-effects
Tobias Brunner [Wed, 24 May 2017 07:34:17 +0000 (09:34 +0200)]
unit-tests: Fix test_chunk_eq() if arguments have side-effects

4 years agoMerge branch 'avoid-rekey-loss'
Tobias Brunner [Tue, 23 May 2017 16:49:13 +0000 (18:49 +0200)]
Merge branch 'avoid-rekey-loss'

This changes the behavior during IKEv2 CHILD_SA rekeyings to avoid
traffic loss.  When responding to a CREATE_CHILD_SA request to rekey a
CHILD_SA the responder already has everything available to install and
use the new CHILD_SA.  However, this could lead to lost traffic as the
initiator won't be able to process inbound packets until it processed the
CREATE_CHILD_SA response and updated the inbound SA.  To avoid this the
responder now only installs the new inbound SA and delays installing the
outbound SA until it receives the DELETE for the replaced CHILD_SA.  The
messages transporting these DELETEs could reach the peer before packets
sent with the deleted outbound SAs reach the respective peer.  To reduce
the chance of traffic loss due to this the inbound SA of the replaced
CHILD_SA is not removed for a configurable amount of seconds after
the DELETE has been processed.

Fixes #1291.

4 years agounit-tests: Check installed IPsec SAs in child-rekey tests
Tobias Brunner [Wed, 8 Mar 2017 14:47:58 +0000 (15:47 +0100)]
unit-tests: Check installed IPsec SAs in child-rekey tests

4 years agounit-tests: Add assert to check for installed IPsec SAs
Tobias Brunner [Wed, 8 Mar 2017 14:46:39 +0000 (15:46 +0100)]
unit-tests: Add assert to check for installed IPsec SAs

4 years agounit-tests: Migrate cached IPsec SAs to new IKE_SAs during rekeying
Tobias Brunner [Thu, 9 Mar 2017 09:59:31 +0000 (10:59 +0100)]
unit-tests: Migrate cached IPsec SAs to new IKE_SAs during rekeying

4 years agounit-tests: Keep track of installed IPsec SAs in mock kernel_ipsec_t implementation
Tobias Brunner [Wed, 8 Mar 2017 14:45:41 +0000 (15:45 +0100)]
unit-tests: Keep track of installed IPsec SAs in mock kernel_ipsec_t implementation

4 years agochild-delete: Delay the removal of the inbound SA of rekeyed CHILD_SAs
Tobias Brunner [Tue, 21 Mar 2017 15:03:54 +0000 (16:03 +0100)]
child-delete: Delay the removal of the inbound SA of rekeyed CHILD_SAs

After deleting a rekeyed CHILD_SA we uninstall the outbound SA but don't
destroy the CHILD_SA (and the inbound SA) immediately.  We delay it
a few seconds or until the SA expires to allow delayed packets to get
processed. The CHILD_SA remains in state CHILD_DELETING until it finally
gets destroyed.

4 years agodelete-child-sa-job: Add new constructor that takes the unique ID of a CHILD_SA
Tobias Brunner [Tue, 21 Mar 2017 14:56:02 +0000 (15:56 +0100)]
delete-child-sa-job: Add new constructor that takes the unique ID of a CHILD_SA

This makes sure we delete the right SA in case the addresses got updated
in the mean time.

4 years agochild-sa: Remove state to track installation of half the SA again
Tobias Brunner [Tue, 21 Mar 2017 14:39:10 +0000 (15:39 +0100)]
child-sa: Remove state to track installation of half the SA again

4 years agounit-tests: Overload helper macro to check for outbound SA state
Tobias Brunner [Tue, 21 Mar 2017 14:35:30 +0000 (15:35 +0100)]
unit-tests: Overload helper macro to check for outbound SA state

4 years agochild-sa: Expose state of the outbound SA
Tobias Brunner [Tue, 21 Mar 2017 14:08:14 +0000 (15:08 +0100)]
child-sa: Expose state of the outbound SA

4 years agochild-sa: Add method to remove the outbound SA and policies
Tobias Brunner [Mon, 20 Mar 2017 12:35:56 +0000 (13:35 +0100)]
child-sa: Add method to remove the outbound SA and policies

4 years agochild-sa: Keep track whether the outbound SA has been installed or not
Tobias Brunner [Wed, 8 Mar 2017 08:40:40 +0000 (09:40 +0100)]
child-sa: Keep track whether the outbound SA has been installed or not

4 years agochild-delete: Track flags per individual CHILD_SA
Tobias Brunner [Tue, 21 Mar 2017 11:18:12 +0000 (12:18 +0100)]
child-delete: Track flags per individual CHILD_SA

4 years agoikev2: Delay installation of outbound SAs during rekeying on the responder
Tobias Brunner [Wed, 1 Mar 2017 17:02:38 +0000 (18:02 +0100)]
ikev2: Delay installation of outbound SAs during rekeying on the responder

The responder has all the information needed to install both SAs before
the initiator does.  So if the responder immediately installs the outbound
SA it might send packets using the new SA which the initiator is not yet
able to process.  This can be avoided by delaying the installation of the
outbound SA until the replaced SA is deleted.

4 years agochild-sa: Add log message for CHILD_SA state changes
Tobias Brunner [Wed, 1 Mar 2017 15:07:57 +0000 (16:07 +0100)]
child-sa: Add log message for CHILD_SA state changes

4 years agochild-sa: Add method to associate rekeyed CHILD_SAs with their replacement
Tobias Brunner [Tue, 28 Feb 2017 14:03:45 +0000 (15:03 +0100)]
child-sa: Add method to associate rekeyed CHILD_SAs with their replacement

4 years agochild-sa: Add methods that allow partial installation of CHILD_SA
Tobias Brunner [Tue, 28 Feb 2017 14:03:12 +0000 (15:03 +0100)]
child-sa: Add methods that allow partial installation of CHILD_SA

Using install() for the inbound SA and register_outbound() for the
outbound SA followed by install_policies(), will delay the installation of
the outbound SA as well as the installation of the outbound policies
in the kernel until install_outbound() is called later.

4 years agochild-sa: Add new state to track installation of only the inbound SA
Tobias Brunner [Tue, 28 Feb 2017 13:57:51 +0000 (14:57 +0100)]
child-sa: Add new state to track installation of only the inbound SA

4 years agochild-sa: Change API used to set/install policies
Tobias Brunner [Wed, 1 Mar 2017 13:40:15 +0000 (14:40 +0100)]
child-sa: Change API used to set/install policies

This way we only have to pass the traffic selectors once.

4 years agochild-sa: Split in- and outbound policy de-/installation
Tobias Brunner [Tue, 28 Feb 2017 13:44:38 +0000 (14:44 +0100)]
child-sa: Split in- and outbound policy de-/installation

Only install outbound fallback policies.

4 years agochild-create: Trigger NARROW_RESPONDER_POST hook before installing SAs
Tobias Brunner [Wed, 1 Mar 2017 11:34:22 +0000 (12:34 +0100)]
child-create: Trigger NARROW_RESPONDER_POST hook before installing SAs

This makes sure we use the same set of traffic selectors when installing
the SAs and installing the policies.

4 years agoMerge branch 'fuzzing'
Tobias Brunner [Tue, 23 May 2017 16:33:00 +0000 (18:33 +0200)]
Merge branch 'fuzzing'

Adds support for fuzzing the certificate parser provided by the default
plugins (x509, pem, gmp etc.) on Google's OSS-Fuzz infrastructure (or
generally with libFuzzer). Fixes several issues that were found while
fuzzing these plugins.

When building the libraries monolithically and statically the
plugin constructors are now hard-coded in each library so the plugin
code is not removed by the linker because it thinks none of their symbols
are ever referenced.

4 years agotnc-ifmap: Null-terminate buffer to make sscanf()-calls safe
Tobias Brunner [Tue, 23 May 2017 10:37:05 +0000 (12:37 +0200)]
tnc-ifmap: Null-terminate buffer to make sscanf()-calls safe

4 years agolibimcv: Make sure the first argument to sscanf() is null-terminated
Tobias Brunner [Tue, 23 May 2017 10:24:01 +0000 (12:24 +0200)]
libimcv: Make sure the first argument to sscanf() is null-terminated

4 years agoasn1: Make sure the first argument to sscanf() is null-terminated
Tobias Brunner [Tue, 23 May 2017 10:19:48 +0000 (12:19 +0200)]
asn1: Make sure the first argument to sscanf() is null-terminated

4 years agox509: Fix leak when parsing CDPs if an invalid one follows valid ones
Tobias Brunner [Sat, 20 May 2017 11:04:56 +0000 (13:04 +0200)]
x509: Fix leak when parsing CDPs if an invalid one follows valid ones

4 years agopem: Ensure a value before checking Proc-Type in PEM header
Tobias Brunner [Fri, 5 May 2017 07:01:51 +0000 (09:01 +0200)]
pem: Ensure a value before checking Proc-Type in PEM header

4 years agochunk: Correctly parse Base64 text where four = follow in a row
Tobias Brunner [Thu, 4 May 2017 14:16:33 +0000 (16:16 +0200)]
chunk: Correctly parse Base64 text where four = follow in a row

That's not correct Base64 but invalid data could trigger this. Since
outlen would get reduced four times, but is only ever increased three
times per iteration, this could result in an integer underflow and then
a potential buffer overflow.

4 years agoconfigure: Don't modify CFLAGs if fuzzing is enabled
Tobias Brunner [Thu, 4 May 2017 14:10:00 +0000 (16:10 +0200)]
configure: Don't modify CFLAGs if fuzzing is enabled

Just rely on the flags passed by the build process.

4 years agoplugin-loader: Disable some logging output when building fuzz targets
Tobias Brunner [Wed, 3 May 2017 15:55:34 +0000 (17:55 +0200)]
plugin-loader: Disable some logging output when building fuzz targets

This avoids evaluating %N. An alternative would be to define a printf-hook
for plugin features.

4 years agox509: Manually print CRL/OCSP URIs when fuzzing
Tobias Brunner [Wed, 3 May 2017 16:10:17 +0000 (18:10 +0200)]
x509: Manually print CRL/OCSP URIs when fuzzing

This avoids a warning about the custom %Y printf specifier.

4 years agoprocessor: Move priority threads assignment to set_threads()
Tobias Brunner [Wed, 3 May 2017 15:35:45 +0000 (17:35 +0200)]
processor: Move priority threads assignment to set_threads()

This avoids the evaluation of %N even if the thread pool is never used.
We need to avoid as many custom printf specifiers as possible when
fuzzing our code to avoid excessive log messages.

4 years agofuzz: Change how fuzz_certs is built
Tobias Brunner [Mon, 1 May 2017 14:23:55 +0000 (16:23 +0200)]
fuzz: Change how fuzz_certs is built

We mainly do this because we have to create a self-contained executable
and it isn't so easy to actually get libtool to link e.g. libgmp

4 years agoAdd plugin constructor registration for all libraries that provide plugins
Tobias Brunner [Fri, 28 Apr 2017 15:49:50 +0000 (17:49 +0200)]
Add plugin constructor registration for all libraries that provide plugins

Unfortunately, we can't just add the generated C file to the sources in as the linker would remove that object file when it notices
that no symbol in it is ever referenced.  So we include it in the file
that contains the library initialization, which will definitely be
referenced by the executable.

This allows building an almost stand-alone static version of e.g. charon
when building with `--enable-monolithic --enable-static --disable-shared`
(without `--disable-shared` libtool will only build a version that links
the libraries dynamically).  External libraries (e.g. gmp or openssl) are
not linked statically this way, though.

4 years agoplugin-constructors: Add script to generate constructor registration
Tobias Brunner [Fri, 28 Apr 2017 15:46:57 +0000 (17:46 +0200)]
plugin-constructors: Add script to generate constructor registration

Using a Python script so this works in cross-compilation situations.

4 years agoplugin-loader: Add facility to register plugin constructors
Tobias Brunner [Fri, 28 Apr 2017 15:41:57 +0000 (17:41 +0200)]
plugin-loader: Add facility to register plugin constructors

Enabled when building monolithically and statically.

This should allow us to work around the -whole-archive issue with
libtool.  If the libraries register the plugin constructors they provide
they reference the constructors and will therefore prevent the linker from
removing these seemingly unused symbols from the final executable.

For use cases where dlsym() can be used, e.g. because the static libraries
are manually linked with -whole-archive (Linux) or -force-load (Apple),
this can be disabled by passing ss_cv_static_plugin_constructors=no to
the configure script.

4 years agoconfigure: Don't build static libraries by default
Tobias Brunner [Fri, 28 Apr 2017 13:39:01 +0000 (15:39 +0200)]
configure: Don't build static libraries by default

This way we can actually detect if someone wants to build strongSwan
statically because --enable-static has to be passed explicitly.

4 years agolibrary: Add compile option to disable memwipe() check
Tobias Brunner [Wed, 19 Apr 2017 08:40:40 +0000 (10:40 +0200)]
library: Add compile option to disable memwipe() check

4 years agofuzz: Make path to libFuzzer.a configurable
Tobias Brunner [Wed, 29 Mar 2017 09:32:25 +0000 (11:32 +0200)]
fuzz: Make path to libFuzzer.a configurable

4 years agopem: Don't read beyond line ends
Tobias Brunner [Wed, 29 Mar 2017 09:19:30 +0000 (11:19 +0200)]
pem: Don't read beyond line ends

4 years agox509: Fix leak if there is an empty CDP
Tobias Brunner [Wed, 29 Mar 2017 09:16:34 +0000 (11:16 +0200)]
x509: Fix leak if there is an empty CDP

4 years agox509: Fix leak if a certificate contains multiple authorityKeyIdentifiers
Tobias Brunner [Wed, 15 Mar 2017 10:16:35 +0000 (11:16 +0100)]
x509: Fix leak if a certificate contains multiple authorityKeyIdentifiers

4 years agofuzz: Add fuzzing boilerplate
Tobias Brunner [Wed, 8 Mar 2017 10:00:22 +0000 (11:00 +0100)]
fuzz: Add fuzzing boilerplate

4 years agotesting: Avoid expiration of allocated SPIs due to low retransmission settings
Tobias Brunner [Tue, 14 Mar 2017 16:02:26 +0000 (17:02 +0100)]
testing: Avoid expiration of allocated SPIs due to low retransmission settings

4 years agokernel-netlink: Use total retransmit timeout as acquire timeout
Tobias Brunner [Mon, 13 Mar 2017 11:15:25 +0000 (12:15 +0100)]
kernel-netlink: Use total retransmit timeout as acquire timeout

By using the total retransmit timeout, modifications of timeout settings
automatically reflect on the value of xfrm_acq_expires.  If set, the
value of xfrm_acq_expires configured by the user takes precedence over
the calculated value.

4 years agotask-manager: Add helper function to calculate the total retransmit timeout
Tobias Brunner [Mon, 13 Mar 2017 11:00:40 +0000 (12:00 +0100)]
task-manager: Add helper function to calculate the total retransmit timeout

4 years agoike: Use optional jitter to calculate retransmission timeouts
Tobias Brunner [Fri, 19 May 2017 14:14:40 +0000 (16:14 +0200)]
ike: Use optional jitter to calculate retransmission timeouts

Also adds an optional limit to avoid very high retransmission timeouts
with high numbers of retries.

4 years agokernel-netlink: Try to add new inbound SA if update fails
Thomas Egerer [Thu, 9 Mar 2017 17:26:35 +0000 (18:26 +0100)]
kernel-netlink: Try to add new inbound SA if update fails

When establishing a traffic-triggered CHILD_SA involves the setup of an
IKE_SA more than one exchange is required. As a result the temporary
acquire state may have expired -- even if the acquire expiration
(xfrm_acq_expires) time is set properly (165 by default).  The expire
message sent by the kernel is not processed in charon since no trap can
be found by the trap manager.
A possible solution could be to track allocated SPIs.  But since this is
a corner case and the tracking introduces quite a bit of overhead, it
seems much more sensible to add a new state if the update of a state
fails with NOT_FOUND.

Signed-off-by: Thomas Egerer <>
4 years agokernel-pfkey: Update SA addresses if supported by the kernel
Tobias Brunner [Tue, 7 Feb 2017 08:57:09 +0000 (09:57 +0100)]
kernel-pfkey: Update SA addresses if supported by the kernel

Upcoming FreeBSD kernels will support updating the addresses of existing
SAs with new SADB_X_EXT_NEW_ADDRESS_SRC|DST extensions for the SADB_UPDATE

4 years agokernel-pfkey: Use new encap flag on Mac OS X when updating SAs
Tobias Brunner [Tue, 7 Feb 2017 08:55:50 +0000 (09:55 +0100)]
kernel-pfkey: Use new encap flag on Mac OS X when updating SAs

4 years agoreceiver: Restrict init limit to half-open SAs as responder
Thomas Egerer [Fri, 10 Mar 2017 09:45:48 +0000 (10:45 +0100)]
receiver: Restrict init limit to half-open SAs as responder

Signed-off-by: Thomas Egerer <>
4 years agoMerge branch 'hw-offload'
Tobias Brunner [Tue, 23 May 2017 15:00:04 +0000 (17:00 +0200)]
Merge branch 'hw-offload'

Allows enabling hardware offload for IPsec SAs as introduced by Linux 4.11
for specific hardware.

4 years agokernel-netlink: Update hardware offload attribute when SAs are updated
Tobias Brunner [Wed, 30 Nov 2016 09:46:21 +0000 (10:46 +0100)]
kernel-netlink: Update hardware offload attribute when SAs are updated

4 years agokernel-netlink: Base SA update on correct message in multi-message response
Tobias Brunner [Wed, 30 Nov 2016 09:27:10 +0000 (10:27 +0100)]
kernel-netlink: Base SA update on correct message in multi-message response

4 years agovici: Make hardware offload configurable
Tobias Brunner [Mon, 20 Jun 2016 13:29:47 +0000 (15:29 +0200)]
vici: Make hardware offload configurable

4 years agochild-sa: Optionally enable hardware offload for CHILD_SAs
Tobias Brunner [Mon, 20 Jun 2016 13:27:22 +0000 (15:27 +0200)]
child-sa: Optionally enable hardware offload for CHILD_SAs

4 years agochild-cfg: Add flag to enable hardware offload
Tobias Brunner [Mon, 20 Jun 2016 13:24:49 +0000 (15:24 +0200)]
child-cfg: Add flag to enable hardware offload

4 years agochild-cfg: Use flags for boolean options
Tobias Brunner [Wed, 10 May 2017 17:04:25 +0000 (19:04 +0200)]
child-cfg: Use flags for boolean options

Makes it potentially easier to add new flags.

4 years agokernel-netlink: Enable hardware offloading if configured for an SA
Tobias Brunner [Mon, 20 Jun 2016 13:14:40 +0000 (15:14 +0200)]
kernel-netlink: Enable hardware offloading if configured for an SA

4 years agokernel-ipsec: Add flag to enable hardware offloading for an IPsec SA
Tobias Brunner [Mon, 20 Jun 2016 12:59:38 +0000 (14:59 +0200)]
kernel-ipsec: Add flag to enable hardware offloading for an IPsec SA

4 years agoinclude: Update xfrm.h to include hardware offloading extensions
Tobias Brunner [Mon, 20 Jun 2016 12:55:53 +0000 (14:55 +0200)]
include: Update xfrm.h to include hardware offloading extensions

4 years agokernel-netlink: Directly handle Netlink messages if thread pool is empty
Tobias Brunner [Wed, 12 Apr 2017 13:18:45 +0000 (15:18 +0200)]
kernel-netlink: Directly handle Netlink messages if thread pool is empty

During initialization of the plugins the thread pool is not yet
initialized so there is no watcher thread that could handle the queued
Netlink message and the main thread will wait indefinitely for a

Fixes #2199.

4 years agosocket-default: Add an option to force the sending interface via IP_PKTINFO
Martin Willi [Fri, 16 Sep 2016 12:50:07 +0000 (14:50 +0200)]
socket-default: Add an option to force the sending interface via IP_PKTINFO

On Linux, setting the source address is insufficient to force a packet to be
sent over a certain path. The kernel uses the best route to select the outgoing
interface, even if we set a source address of a lower priority interface. This
is not only true for interfaces attaching to the same subnet, but also for
unrelated interfaces; the kernel (at least on 4.7) sends out the packet on
whatever interface it sees fit, even if that network does not expect packets
from the source address we force to.

When a better interface becomes available, strongSwan sends its MOBIKE address
list update using the old source address. But the kernel sends that packet over
the new best interface. If that network drops packets having the unexpected
source address from the old path, the MOBIKE update fails and the SA finally
times out.

To enforce a specific interface for our packet, we explicitly set the interface
index from the interface where the source address is installed. According to
ip(7), this overrules the specified source address to the primary interface
address. As this could have side effects to installations using multiple
addresses on a single interface, we disable the option by default for now.

This also allows using IPv6 link-local addresses, which won't work if
the outbound interface is not set explicitly.

4 years agoAdd an option to announce support for IKE fragmentation but not sending fragments
Tobias Brunner [Fri, 5 May 2017 13:48:14 +0000 (15:48 +0200)]
Add an option to announce support for IKE fragmentation but not sending fragments

4 years agoswanctl: Use returned key ID to track loaded private keys
Tobias Brunner [Fri, 12 May 2017 07:15:24 +0000 (09:15 +0200)]
swanctl: Use returned key ID to track loaded private keys

There was a direct call to load_key() for unencrypted keys that didn't
remove the key ID from the hashtable, which caused keys to get unloaded
when --load-creds was called multiple times.

4 years agovici: Return key ID from load-key command
Tobias Brunner [Fri, 12 May 2017 07:10:15 +0000 (09:10 +0200)]
vici: Return key ID from load-key command

We already do this for load-token and this should simplify client

4 years agocredential-manager: Prefer local over global sets
Adrian-Ken Rueegsegger [Wed, 26 Apr 2017 11:46:26 +0000 (13:46 +0200)]
credential-manager: Prefer local over global sets

Invert set enumeration order to first enumerate local and then global
credential sets.

4 years agoikev1: Send NAT-D payloads after HASH payloads in Aggressive Mode requests
Tobias Brunner [Thu, 4 May 2017 09:29:50 +0000 (11:29 +0200)]
ikev1: Send NAT-D payloads after HASH payloads in Aggressive Mode requests

Some implementations seem to have problems if the third AM message
contains NAT-D payloads before the HASH payload.

Fixes #2314.

4 years agoike-sa-manager: Improve scalability of IKE_SA count checking
Thomas Egerer [Thu, 23 Mar 2017 08:43:06 +0000 (09:43 +0100)]
ike-sa-manager: Improve scalability of IKE_SA count checking

Much like in commit a68454b, we now use a global atomic counter to keep
track of the number of IKE_SAs currently registered. This should improve
scalability for a large number of segments even more.

Signed-off-by: Thomas Egerer <>
4 years agotun-device: Use next free TUN device on FreeBSD
Tobias Brunner [Wed, 3 May 2017 08:01:12 +0000 (10:01 +0200)]
tun-device: Use next free TUN device on FreeBSD

While this API is documented as legacy (and there is a sysctl option to
disable it) the documentation also mentions that it will probably stay
enabled by default due to compatibility issues with existing applications.

With the previous approach only 255 devices could be opened then the
daemon had to be restarted.

Fixes #2313.

4 years agotun-device: TUN devices are not supported on iOS
Tobias Brunner [Tue, 18 Apr 2017 09:06:13 +0000 (11:06 +0200)]
tun-device: TUN devices are not supported on iOS

4 years agoattr-sql: Make release of online leases during startup optional
Tobias Brunner [Tue, 21 Mar 2017 07:53:02 +0000 (08:53 +0100)]
attr-sql: Make release of online leases during startup optional

This cleanup prevents sharing the same DB between multiple VPN gateways.

4 years agocharon-nm: Fix typo to actually use random NAT-T port
Tobias Brunner [Wed, 3 May 2017 07:54:52 +0000 (09:54 +0200)]
charon-nm: Fix typo to actually use random NAT-T port

Fixes: af16b5afb0ee ("Use random ports in NetworkManager backend")

4 years agoaf-alg: Fix crypt() definition conflict
Baruch Siach [Thu, 11 May 2017 11:04:47 +0000 (14:04 +0300)]
af-alg: Fix crypt() definition conflict

Rename the crypt() method to avoid conflict with POSIX crypt(). Fixes the
following build failure with musl libc:

In file included from ../../../../src/libstrongswan/utils/utils.h:53:0,
                 from ../../../../src/libstrongswan/library.h:101,
                 from af_alg_ops.h:24,
                 from af_alg_ops.c:16:
af_alg_ops.c:110:22: error: conflicting types for 'crypt'
 METHOD(af_alg_ops_t, crypt, bool,
../../../../src/libstrongswan/utils/utils/object.h:99:13: note: in definition of macro 'METHOD'
  static ret name(union {iface *_public; this;} \
In file included from af_alg_ops.c:18:0:
.../host/usr/x86_64-buildroot-linux-musl/sysroot/usr/include/unistd.h:144:7: note: previous declaration of 'crypt' was here
 char *crypt(const char *, const char *);

Closes strongswan/strongswan#72.

4 years agoVersion bump to 5.3.3dr2 5.5.3dr2
Andreas Steffen [Mon, 8 May 2017 20:38:12 +0000 (22:38 +0200)]
Version bump to 5.3.3dr2

4 years agox509: Evaluate return codes of parsing functions
Andreas Steffen [Fri, 5 May 2017 07:04:19 +0000 (09:04 +0200)]
x509: Evaluate return codes of parsing functions

4 years agonm: Explicitly prevent the smartcard PIN from being stored
Raphael Geissert [Thu, 3 Nov 2016 16:00:21 +0000 (17:00 +0100)]
nm: Explicitly prevent the smartcard PIN from being stored

The secret storage flag wasn't being saved when using smartcard
authentication, resulting in the PIN being stored.

Fixes #2166.

4 years agonm: IKE/ESP proposal customization support
Defunct [Sat, 29 Apr 2017 19:02:36 +0000 (19:02 +0000)]
nm: IKE/ESP proposal customization support

Closes strongswan/strongswan#70.

4 years agocharon-nm: IKE/ESP proposal customization support
Defunct [Sat, 29 Apr 2017 16:32:02 +0000 (16:32 +0000)]
charon-nm: IKE/ESP proposal customization support

Closes strongswan/strongswan#69.

4 years agoVersion bump to 5.5.3dr1 5.5.3dr1
Andreas Steffen [Wed, 26 Apr 2017 19:29:42 +0000 (21:29 +0200)]
Version bump to 5.5.3dr1

4 years agoconfigure: Include curve25519 in the pki default plugin list
Martin Willi [Wed, 29 Mar 2017 15:04:03 +0000 (17:04 +0200)]
configure: Include curve25519 in the pki default plugin list

The plugin provides ed25519 public key support, and is required to generate
keys or sign certificates with pki.

4 years agotesting: Created swanctl/rw-eap-aka-sql-rsa scenario
Andreas Steffen [Wed, 26 Apr 2017 10:43:40 +0000 (12:43 +0200)]
testing: Created swanctl/rw-eap-aka-sql-rsa scenario

4 years agotesting: Created ikev2/rw-eap-aka-sql-rsa scenario
Andreas Steffen [Sun, 23 Apr 2017 07:19:22 +0000 (09:19 +0200)]
testing: Created ikev2/rw-eap-aka-sql-rsa scenario

This test scenario tests the eap-simaka-sql plugin.

4 years agoeap-simaka-sql: Fixed database column from use to used
Andreas Steffen [Wed, 26 Apr 2017 08:37:45 +0000 (10:37 +0200)]
eap-simaka-sql: Fixed database column from use to used

4 years agopki: Reset variable so error handling works properly
Tobias Brunner [Wed, 19 Apr 2017 16:56:43 +0000 (18:56 +0200)]
pki: Reset variable so error handling works properly

If we jump to `end` without this we crash (not necessarily visibly) due
to a double free and the actual error message is not printed.

4 years agovici: Fix type error exception in Python bindings
odi79 [Fri, 14 Apr 2017 14:40:57 +0000 (16:40 +0200)]
vici: Fix type error exception in Python bindings

Line 66 yields "TypeError: can't concat bytes to str" using Python 3.4.
"requestdata" was introduced in 22f08609f1b6 but is not actually used.
Since the original "request" is not used anywhere else this can be changed
to be similar to the other UTF-8 encoding changes in that commit.

Fixes: 22f08609f1b6 ("vici: Explicitly set the Python encoding type").
Closes strongswan/strongswan#66.

4 years agoVersion bump to 5.5.2 5.5.2
Andreas Steffen [Mon, 27 Mar 2017 14:57:03 +0000 (16:57 +0200)]
Version bump to 5.5.2

4 years agotesting: List BLIS certs in swanctl/rw-newhope-bliss scenario
Andreas Steffen [Mon, 27 Mar 2017 14:56:50 +0000 (16:56 +0200)]
testing: List BLIS certs in swanctl/rw-newhope-bliss scenario

4 years agokernel-netlink: Avoid O(n^2) copy operations when concatenating Netlink responses
Jiri Horky [Thu, 23 Mar 2017 21:59:45 +0000 (22:59 +0100)]
kernel-netlink: Avoid O(n^2) copy operations when concatenating Netlink responses

When constructing the result, all responses from Netlink were concatenated
iteratively, i.e. for each response, the previously acquired result was
copied to newly allocated memory and the current response appended to it.
This results in O(n^2) copy operations. Instead, we now check for the
total final length of the result and copy the individual responses to it
in one pass, i.e. in O(n) copy operations. In particular, this issue caused
very high CPU usage in memcpy() function as the result is copied over and
over. Common way how to hit the issue is when having 1000+ routes and 5+
connecting clients a second. In that case, the memcpy() function can
take 50%+ of one CPU thread on a decent CPU and the whole charon daemon
is stuck just reading routes and concatenating them together (connecting
clients are blocked in that particular case as this is done under mutex).

Closes strongswan/strongswan#65.
References #2055.

4 years agolibtls: Replace expired certificates for unit tests
Tobias Brunner [Fri, 24 Mar 2017 09:18:32 +0000 (10:18 +0100)]
libtls: Replace expired certificates for unit tests

Only the tests with client authentication failed, the client accepted
the trusted self-signed certificate even when it was expired.  On the
server the lookup (based on the pre-configured SAN) first found the ECDSA
cert, which it dismissed for the RSA authentication the client used, and
since only the first "pretrusted" cert is considered the following RSA
cert was verified more thoroughly.
The lookup on the client always uses the full DN of the server certificate
not the pre-configured identity so it found the correct certificate on
the first try.

4 years agopki: Actually make the default key type KEY_ANY for --self
Tobias Brunner [Fri, 24 Mar 2017 09:10:13 +0000 (10:10 +0100)]
pki: Actually make the default key type KEY_ANY for --self

Fixes: 05ccde0a8bd9 ("pki: Add generic 'priv' key type that loads any
type of private key")

4 years agoaddrblock: Narrow selectors when rekeying a CHILD_SA as original responder
Martin Willi [Thu, 23 Mar 2017 07:48:46 +0000 (08:48 +0100)]
addrblock: Narrow selectors when rekeying a CHILD_SA as original responder

If a the original responder narrows the selectors of its peer in addrblock,
the peer gets a subset of that selectors. However, once the original responder
initiates rekeying of that CHILD_SA, it sends the full selectors to the peer,
and then narrows the received selectors locally for the installation, only.

This is insufficient, as the peer ends up with wider selectors, sending traffic
that the original responder will reject to the stricter IPsec policy. So
additionally narrow the selectors when rekeying CHILD_SAs before sending the
TS list to the peer.

4 years agoconf: Document recommended lower limit for SPIs
Tobias Brunner [Thu, 23 Mar 2017 16:29:47 +0000 (17:29 +0100)]
conf: Document recommended lower limit for SPIs