Tobias Brunner [Mon, 21 Sep 2015 09:12:14 +0000 (11:12 +0200)]
libipsec: Properly support CAMELLIA in CTR mode
Tobias Brunner [Mon, 21 Sep 2015 09:11:33 +0000 (11:11 +0200)]
ikev2: Fix size of key material for CAMELLIA-CTR
Like AES in CTR mode it includes a 4 byte nonce.
Tobias Brunner [Mon, 21 Sep 2015 09:02:45 +0000 (11:02 +0200)]
libipsec: Fix crypter lookup for AES-CTR
Due to the nonce, the ESP key material is four bytes longer than needed for
the actual AES key. The crypto plugins, however, register their AES-CTR
implementations with the AES key length, so the lookup here failed.
For IKEv2 the key material is allocated after creating a crypter instance
with the negotiated AES key size. The length of the actual key material is
retrieved via get_key_size(), which adds the four bytes to the AES key length.
Fixes #1124.
Tobias Brunner [Wed, 23 Sep 2015 08:53:20 +0000 (10:53 +0200)]
ike-mobike: Send retransmits to the current local and remote addresses
These might have changed by a peer-initiated MOBIKE address update.
Fixes #1125.
Tobias Brunner [Fri, 30 Oct 2015 09:33:51 +0000 (10:33 +0100)]
Merge branch 'ikev1-cache-informational'
With these changes an INFORMATIONAL message (e.g. with an INITIAL_CONTACT
notify) that arrives while a responder is waiting for the last Aggressive
Mode request gets queued and delivered later. Previously such messages
caused the IKE_SA to fail as some tasks waiting for the last AM message
fail when trying to handle the INFORMATIONAL message. Therefore, all
other messages, such as TRANSACTION and QUICK_MODE requests, are now
dropped until AM is complete. These don't have to be cached as they get
retransmitted by the other peer.
Fixes #1130.
Tobias Brunner [Mon, 28 Sep 2015 15:39:54 +0000 (17:39 +0200)]
ikev1: Handle queued INFORMATIONAL message after receiving the last AM request
Tobias Brunner [Mon, 28 Sep 2015 15:37:42 +0000 (17:37 +0200)]
ikev1: Queue INFORMATIONAL request if AM is not complete yet
Tobias Brunner [Mon, 28 Sep 2015 15:35:30 +0000 (17:35 +0200)]
ikev1: Handle queued TRANSACTION messages only after processing replies
Tobias Brunner [Mon, 28 Sep 2015 15:33:46 +0000 (17:33 +0200)]
ikev1: Extract queueing of TRANSACTIONAL requests when MM is not complete yet
Tobias Brunner [Mon, 28 Sep 2015 15:30:36 +0000 (17:30 +0200)]
ikev1: Drop TRANSACTION/QUICK_MODE requests until we received the last AM message
Tobias Brunner [Tue, 22 Sep 2015 09:56:44 +0000 (11:56 +0200)]
ikev1: Make maximum number of IKEv1 phase 2 exchanges we keep state about configurable
Fixes #1128.
Tobias Brunner [Thu, 29 Oct 2015 16:37:06 +0000 (17:37 +0100)]
Fix typo in error handling for sigwaitinfo() in charon-systemd and charon-tkm
Fixes
858148092d1e ("Replace usages of sigwait(3) with sigwaitinfo(2)")
Tobias Brunner [Mon, 12 Oct 2015 09:04:55 +0000 (11:04 +0200)]
random: Properly handle errors when reading from /dev/[u]random
If -1 was returned on the first call to read() `done` got SIZE_MAX
and the function returned TRUE even though no actual random data had
been allocated.
Fixes #1156.
Tobias Brunner [Wed, 7 Oct 2015 14:08:22 +0000 (16:08 +0200)]
ikev1: Avoid fourth QM message if third QM messages of multiple exchanges are handled delayed
If we haven't received the third QM message for multiple exchanges the
return value of NEED_MORE for passive tasks that are not responsible for
a specific exchange would trigger a fourth empty QM message.
Fixes:
4de361d92c54 ("ikev1: Fix handling of overlapping Quick Mode exchanges")
References #1076.
Tobias Brunner [Wed, 2 Sep 2015 10:14:35 +0000 (12:14 +0200)]
ikev1: Prevent deadlock when checking for duplicate IKEv1 SAs
Previously, the current segment was held while checking for duplicate
SAs, which requires acquiring all segments. If multiple threads did this
concurrently this resulted in a deadlock as they couldn't acquire the
segments held by the other threads attempting to do the same. With the
default configuration only one segment is used, which prevents the problem
as only one thread can check in an IKE SA concurrently.
Fixes:
a064eaa8a63a ("Handling of initial contact")
Tobias Brunner [Thu, 17 Sep 2015 15:52:14 +0000 (17:52 +0200)]
Replace usages of sigwait(3) with sigwaitinfo(2)
This is basically the same call, but it has the advantage of being
supported by FreeBSD's valgrind, which sigwait() is not.
References #1106.
Tobias Brunner [Mon, 21 Sep 2015 08:12:24 +0000 (10:12 +0200)]
testing: Actually send an uncompressed packet in the ipv6/rw-compress-ikev2 scenario
The default of 56 bytes already exceeds the threshold of 90 bytes (8 bytes
ICMP + 40 bytes IPv6 = 104 bytes). By reducing the size we make sure the
packet is not compressed (40 + 8 + 40 = 88).
This also fixes a strange failure of this scenario due to the recently
added post-test `ip xfrm state` check. The kernel stores a reference to
the used SAs on the inbound skbuffs and since these are garbage collected
it could take a while until all references to an SA disappear and the SA
is finally destroyed. But while SAs might not get destroyed immediately
when we delete them, they are actually marked as dead and therefore won't
show up in `ip xfrm state`. However, that's not the case for the tunnel
SAs the kernel attaches to IPComp SAs, which we don't explicitly delete,
and which aren't modified by the kernel until the IPComp SA is destroyed.
So what happened when the last ping unintentionally got compressed is that
the skbuff had a reference to the IPComp SA and therefore the tunnel SA.
This skbuff often was destroyed after the `ip xfrm state` check ran and
because the tunnel SA would still get reported the test case failed.
Tobias Brunner [Mon, 21 Sep 2015 08:12:17 +0000 (10:12 +0200)]
updown: Add rules to allow IP6IP6 traffic used for uncompressed small packets
Tobias Brunner [Wed, 26 Aug 2015 16:08:14 +0000 (18:08 +0200)]
shunt-manager: Resolve %dynamic to %any4/6 before installing policies
left|rightsubnet default to %dynamic, which is basically 0.0.0.0/0 until an
address is assigned to it. So if only one side was undefined and the other
traffic selector was IPv6 an address family mismatch would occur.
References #595.
Tobias Brunner [Wed, 26 Aug 2015 16:07:06 +0000 (18:07 +0200)]
shunt-manager: Don't install policies in case of an address family or IP protocol mismatch
References #595.
Tobias Brunner [Wed, 16 Sep 2015 09:16:59 +0000 (11:16 +0200)]
openssl: Explicitly include openssl/bn.h
If OpenSSL is compiled with OPENSSL_NO_DEPRECATED some of the headers
we include don't include openssl/bn.h anymore. Therefore, we have to
explicitly include it ourselves where we use BN_* functions.
Fixes #1113.
Tobias Brunner [Wed, 9 Sep 2015 12:39:26 +0000 (14:39 +0200)]
unit-tests: Add a test to verify that there is no partial matching of RDNs
Tobias Brunner [Wed, 9 Sep 2015 09:45:17 +0000 (11:45 +0200)]
scepclient: Remove copyright and license from man page
Tobias Brunner [Mon, 7 Sep 2015 10:04:55 +0000 (12:04 +0200)]
include: Add linux/socket.h
__kernel_sa_family_t is defined and used since Linux 3.1, so on systems
with older kernels (like CentOS 6.7, which still ships a 2.6.32 kernel) the
build with the current UAPI headers fails. And using the native headers on
such system does not really work either because we use structs, defines, and
enum values from the newer headers in the kernel-netlink plugin.
__kernel_sa_family_t is defined in linux/socket.h so we ship that too (in
particular the simplified UAPI version from Linux 3.7+).
Fixes #1099.
Andreas Steffen [Sun, 6 Sep 2015 13:05:36 +0000 (15:05 +0200)]
Version bump to 5.3.3
Andreas Steffen [Tue, 1 Sep 2015 15:30:15 +0000 (17:30 +0200)]
testing: added ikev2/alg-chacha20poly1305 scenario
Andreas Steffen [Tue, 1 Sep 2015 15:29:30 +0000 (17:29 +0200)]
testing: update to Linux 4.2 kernel
Andreas Steffen [Tue, 1 Sep 2015 11:16:43 +0000 (13:16 +0200)]
Version bump to 5.3.3rc2
Tobias Brunner [Mon, 31 Aug 2015 14:02:11 +0000 (16:02 +0200)]
imv-os: Add some useful usage output to the pacman utility
Fixes #487.
Tobias Brunner [Wed, 26 Aug 2015 15:46:10 +0000 (17:46 +0200)]
kernel-netlink: Properly set port mask for ICMP type/code if only set on one side
If only one traffic selector had a port (type/code) the other side had
the port mask set to 0, which canceled out the applied type/code.
It also fixes the installation of ICMP type/code on big-endian hosts.
Fixes #1091.
References #595.
Tobias Brunner [Wed, 26 Aug 2015 14:16:30 +0000 (16:16 +0200)]
kernel-pfkey: Properly encode ICMP type/code if only set on one side
References #595.
Tobias Brunner [Mon, 31 Aug 2015 08:59:10 +0000 (10:59 +0200)]
testing: Updated environment variable documentation in updown scripts
Tobias Brunner [Mon, 31 Aug 2015 08:53:22 +0000 (10:53 +0200)]
libimcv: Updated Android.mk file
Tobias Brunner [Fri, 28 Aug 2015 16:10:37 +0000 (18:10 +0200)]
NEWS: Added additional news
Tobias Brunner [Fri, 28 Aug 2015 14:51:05 +0000 (16:51 +0200)]
eap-radius: Fix creation of host_t objects based on Framed-IPv6-Address attributes
Fixes
ec490e68ae37 ("eap-radius: Add support for some basic IPv6-specific RADIUS attributes").
References #1001.
Tobias Brunner [Fri, 28 Aug 2015 13:49:58 +0000 (15:49 +0200)]
conf: Add documentation for new osx-attr option
Tobias Brunner [Thu, 27 Aug 2015 15:53:43 +0000 (17:53 +0200)]
pki: Add new type options to --issue command usage output
Tobias Brunner [Thu, 27 Aug 2015 14:59:12 +0000 (16:59 +0200)]
conf: Fix declaration of default values for imc-hcd options
Tobias Brunner [Thu, 27 Aug 2015 14:42:09 +0000 (16:42 +0200)]
starter: Remove documentation for starter.load option
Tobias Brunner [Thu, 27 Aug 2015 13:15:04 +0000 (15:15 +0200)]
eap-ttls: Limit maximum length of tunneled EAP packet to EAP-TTLS packet
Tobias Brunner [Thu, 27 Aug 2015 12:45:11 +0000 (14:45 +0200)]
trap-manager: Cleanup local address in error cases
Tobias Brunner [Thu, 27 Aug 2015 12:41:13 +0000 (14:41 +0200)]
imv-os: Properly free strings for invalid input in pacman
Tobias Brunner [Thu, 27 Aug 2015 12:31:42 +0000 (14:31 +0200)]
ha: Close control FIFO if it is not valid
Tobias Brunner [Thu, 27 Aug 2015 10:42:21 +0000 (12:42 +0200)]
swanctl: Correctly build man page in out-of-tree builds from the repository
Tobias Brunner [Thu, 27 Aug 2015 10:06:31 +0000 (12:06 +0200)]
Fixed some typos, courtesy of codespell
Tobias Brunner [Thu, 27 Aug 2015 10:03:11 +0000 (12:03 +0200)]
Fix some Doxygen issues
Tobias Brunner [Tue, 25 Aug 2015 09:29:42 +0000 (11:29 +0200)]
unit-tests: Additional test cases to increase coverage
Tobias Brunner [Tue, 25 Aug 2015 17:13:59 +0000 (19:13 +0200)]
traffic-selector: Use calc_netbits() in RFC 3779 constructor
This properly detects prefixes encoded as ranges.
Tobias Brunner [Mon, 24 Aug 2015 10:27:34 +0000 (12:27 +0200)]
ike: Fix half-open count for initiating SAs when initially checked in
Tobias Brunner [Mon, 24 Aug 2015 10:18:16 +0000 (12:18 +0200)]
ike: Only consider number of half-open SAs as responder when deciding whether COOKIEs are sent
Andreas Steffen [Tue, 25 Aug 2015 13:09:19 +0000 (15:09 +0200)]
Version bump to 5.3.3rc1
Andreas Steffen [Tue, 25 Aug 2015 13:08:52 +0000 (15:08 +0200)]
Added some spaces in swanctl.conf
Evan Broder [Sat, 22 Aug 2015 23:20:40 +0000 (19:20 -0400)]
vici: Handle closed sockets in the Ruby gem
From recvfrom(2) (which UDPSocket#recv backs into):
The return value will be 0 when the peer has performed an orderly
shutdown.
(i.e. it will return an empty string)
Previously in this scenario, Vici::Transport#recv_all would spin
forever trying to pull more data off the socket. I'm not entirely
clear what happened that caused strongSwan to shutdown the socket, but
it probably should not cause vici Ruby apps to spin.
Closes strongswan/strongswan#13.
Tobias Brunner [Fri, 21 Aug 2015 16:27:12 +0000 (18:27 +0200)]
Merge branch 'starter-kernel-flush'
Removes flushing of the IPsec state in the kernel when starter
terminates. We can't easily flush only the policies created for
IPsec SAs (and if installpolicies=no is used we don't want to flush
policies anyway). Also, since existing policies don't cause errors
anymore these aren't really an issue anymore (I think this was one of
the main reasons to flush the state). This behavior is also specific to
starter, so nothing is flushed when charon is used via systemd/swanctl.
This will also allow us to merge libhydra with libcharon in a future
release.
If the previous behavior is needed it can easily be replicated with some
external tools (we could also write a simple utility that does this).
Additional checks in the test environment make sure that the daemon
cleans up the state properly.
Tobias Brunner [Fri, 21 Aug 2015 12:33:26 +0000 (14:33 +0200)]
testing: Let test scenarios fail if IPsec SAs or policies are not removed
The IKE daemon should delete all installed SAs and policies when
everything works properly, so we fail the test if that's not the case.
Tobias Brunner [Fri, 21 Aug 2015 12:32:29 +0000 (14:32 +0200)]
testing: Flush state and policies before every scenario
Similar to conntrack we make sure we are working on a clean slate.
Tobias Brunner [Fri, 21 Aug 2015 11:57:00 +0000 (13:57 +0200)]
starter: Don't flush SAs in the kernel
If starter is not used we don't do that either. And this allows us to
move the stuff in libhydra back to libcharon.
Tobias Brunner [Thu, 13 Aug 2015 09:08:41 +0000 (11:08 +0200)]
starter: Don't flush policies in the kernel
We can't control which policies we flush, so if policies are installed
and used outside of strongSwan for other protocols we'd flush them too.
And if installpolicies=no is used we probably shouldn't flush policies
either. Luckily already existing policies are not treated as fatal
errors anymore, so not flushing policies should not be that much of an
issue (in case of a crash in dynamic setups, e.g. with virtual IPs,
policies could be left behind even after restarting the connections and
properly terminating the daemon).
Tobias Brunner [Thu, 13 Aug 2015 09:01:50 +0000 (11:01 +0200)]
kernel-pfkey: Only flush SAs of types we actually manage
Tobias Brunner [Thu, 13 Aug 2015 08:34:47 +0000 (10:34 +0200)]
kernel-netlink: Only flush SAs of types we actually manage
Tobias Brunner [Fri, 21 Aug 2015 16:21:24 +0000 (18:21 +0200)]
Merge branch 'init-limits'
IKE_SAs that are initiated are now counted towards the half-open IKE_SAs
limit. Optionally it is possible to enforce limits towards the number of
half-open IKE_SAs and the job load also when initiating SAs. This is
currently only possible via VICI.
Tobias Brunner [Thu, 16 Jul 2015 15:56:16 +0000 (17:56 +0200)]
vici: Optionally check limits when initiating connections
If the init-limits parameter is set (disabled by default) init limits
will be checked and might prevent new SAs from getting initiated.
Tobias Brunner [Thu, 16 Jul 2015 15:51:40 +0000 (17:51 +0200)]
vici: Add get_bool() convenience getter for VICI messages
Tobias Brunner [Thu, 16 Jul 2015 15:21:54 +0000 (17:21 +0200)]
controller: Optionally adhere to init limits also when initiating IKE_SAs
Tobias Brunner [Fri, 17 Jul 2015 09:48:53 +0000 (11:48 +0200)]
ike: Also track initiating IKE_SAs as half-open
Tobias Brunner [Mon, 3 Aug 2015 17:36:45 +0000 (19:36 +0200)]
stroke: Allow %any as local address
Actually, resolving addresses in `left` might be overkill as we'll assume
left=local anyway (the only difference is the log message).
Tobias Brunner [Mon, 3 Aug 2015 17:26:54 +0000 (19:26 +0200)]
stroke: Add an option to disable side-swapping of configuration options
In some scenarios it might be preferred to ensure left is always local
and no unintended swaps occur.
Tobias Brunner [Fri, 17 Jul 2015 12:08:09 +0000 (14:08 +0200)]
ikev1: Assign different job priorities for inbound IKEv1 messages
Tobias Brunner [Fri, 21 Aug 2015 15:48:37 +0000 (17:48 +0200)]
testing: Fix typo in p2pnat/behind-same-nat scenario
Tobias Brunner [Wed, 19 Aug 2015 14:16:01 +0000 (16:16 +0200)]
child-rekey: Don't add a REKEY_SA notify if the child-create task is deleting the SA
Tobias Brunner [Wed, 19 Aug 2015 13:53:00 +0000 (15:53 +0200)]
child-create: Cache proposed IPsec protocol
This allows us to DELETE CHILD_SAs on failures that occur before we
retrieved the selected proposal.
Tobias Brunner [Wed, 19 Aug 2015 13:08:02 +0000 (15:08 +0200)]
child-create: Don't attempt to delete the SA if we don't have all the information
Since we only support single protocols we could probably guess it and always
send a DELETE.
Tobias Brunner [Tue, 28 Jul 2015 13:28:33 +0000 (15:28 +0200)]
child-rekey: Remove redundant migrate() call for child-create sub-task
When retrying due to a DH group mismatch this is already done by the
child-create task itself. And in other cases where the task returns
NEED_MORE we actually will need access to a possible proposal to properly
delete it.
Tobias Brunner [Tue, 28 Jul 2015 13:10:17 +0000 (15:10 +0200)]
child-create: Fix crash when retrying CHILD_SA rekeying due to a DH group mismatch
If the responder declines our KE payload during a CHILD_SA rekeying migrate()
is called to reuse the child-create task. But the child-rekey task then
calls the same method again.
Fixes:
32df0d81fb46 ("child-create: Destroy nonceg in migrate()")
Tobias Brunner [Fri, 21 Aug 2015 09:40:07 +0000 (11:40 +0200)]
auth-cfg: Don't enforce EAP_RADIUS
Basically the same as
e79b0e07e4ab. EAP_RADIUS is also a virtual method
that will identify itself as a different EAP method later.
Tobias Brunner [Fri, 21 Aug 2015 09:37:23 +0000 (11:37 +0200)]
testing: Add missing sim_files file to ikev2/rw-eap-sim-radius scenario
Tobias Brunner [Fri, 21 Aug 2015 09:15:36 +0000 (11:15 +0200)]
testing: alice is RADIUS server in the ikev2/rw-eap-sim-radius scenario
Tobias Brunner [Fri, 21 Aug 2015 09:13:33 +0000 (11:13 +0200)]
testing: Print triplets.dat files of clients in EAP-SIM scenarios
References #1078.
Tobias Brunner [Thu, 20 Aug 2015 17:37:09 +0000 (19:37 +0200)]
Merge branch 'stroke-ca-sections'
This resolves the duplicate CERTREQ issue when certificates in
ipsec.d/cacerts were referenced in ca sections. It also ensures CA
certificates are reloaded atomically, so there is never a time when
an unchanged CA certificate is not available.
References #842.
Tobias Brunner [Thu, 20 Aug 2015 13:29:33 +0000 (15:29 +0200)]
stroke: Change how CA certificates are stored
Since
11c14bd2f5 CA certificates referenced in ca sections were
enumerated by two credential sets if they were also stored in
ipsec.d/cacerts. This caused duplicate certificate requests to
get sent. All CA certificates, whether loaded automatically or
via a ca section, are now stored in stroke_ca_t.
Certificates referenced in ca sections are now also reloaded
when `ipsec rereadcacerts` is used.
Tobias Brunner [Thu, 20 Aug 2015 08:22:50 +0000 (10:22 +0200)]
stroke: Combine CA certificate load methods
Also use the right credential set for CA cert references loaded from
stroke_ca_t.
Tobias Brunner [Thu, 20 Aug 2015 08:08:08 +0000 (10:08 +0200)]
stroke: Atomically replace CA and AA certificates when reloading them
Previously it was possible that certificates were not found between the
time the credential sets were cleared and the certificates got readded.
Tobias Brunner [Thu, 20 Aug 2015 13:11:02 +0000 (15:11 +0200)]
mem-cred: We don't need a write lock when looking for a certificate
Tobias Brunner [Thu, 20 Aug 2015 07:39:15 +0000 (09:39 +0200)]
mem-cred: Add a method to atomically replace all certificates
Tobias Brunner [Wed, 19 Aug 2015 13:28:02 +0000 (15:28 +0200)]
ikev1: Fix handling of overlapping Quick Mode exchanges
In some cases the third message of a Quick Mode exchange might arrive
after the first message of a subsequent Quick Mode exchange. Previously
these messages were handled incorrectly and the second Quick Mode
exchange failed.
Some implementations might even try to establish multiple Quick Modes
simultaneously, which is explicitly allowed in RFC 2409. We don't fully
support that, though, in particular in case of retransmits.
Fixes #1076.
Tobias Brunner [Wed, 29 Jul 2015 09:23:34 +0000 (11:23 +0200)]
kernel-pfkey: Add support for AES-GCM
The next release of FreeBSD will support this.
While Linux defines constants for AES-GCM in pfkeyv2.h since 2.6.25 it
does not actually support it. When SAs are installed via PF_KEY only a
lookup in XFRM's list of encryption algorithms is done, but AES-GCM is in
a different table for AEAD algorithms (there is currently no lookup
function to find algorithms in that table via PF_KEY identifier).
Tobias Brunner [Thu, 20 Aug 2015 16:35:23 +0000 (18:35 +0200)]
auth-cfg: Don't enforce EAP_DYNAMIC
We now store the actual method on the auth config, which won't match
anymore if rightauth=eap-dynamic is configured.
Tobias Brunner [Wed, 19 Aug 2015 14:47:45 +0000 (16:47 +0200)]
ikev2: Compare initiator flag again, partially reverts
17ec1c74de
We should ignore messages that have the flag set incorrectly.
This restores RFC compliance which was broken since the mentioned commit.
Tobias Brunner [Wed, 10 Jun 2015 13:53:08 +0000 (15:53 +0200)]
ikev2: Drop IKE_SA_INIT messages that don't have the initiator flag set
While this doesn't really create any problems it is not 100% correct to
accept such messages because, of course, the sender of an IKE_SA_INIT
request is always the original initiator of an IKE_SA.
We currently don't check the flag later, so we wouldn't notice if the
peer doesn't set it in later messages (ike_sa_id_t.equals doesn't
compare it anymore since we added support for IKEv1, in particular since
17ec1c74de).
Tobias Brunner [Wed, 19 Aug 2015 15:25:30 +0000 (17:25 +0200)]
ikev1: Pass current auth-cfg when looking for key to determine auth method
If multiple certificates use the same subjects we might choose the wrong
one otherwise. This way we use the one referenced with leftcert and
stored in the auth-cfg and we actually do the same thing later in the
pubkey authenticator.
Fixes #1077.
Tobias Brunner [Mon, 8 Jun 2015 14:52:03 +0000 (16:52 +0200)]
ikev2: Store outer EAP method used to authenticate remote peer in auth-cfg
This allows symmetric configuration of EAP methods (i.e. the same value
in leftauth and rightauth) when mutual EAP-only authentication is used.
Previously the client had to configure rightauth=eap or rightauth=any,
which prevented it from using this same config as responder.
Tobias Brunner [Wed, 19 Aug 2015 10:10:09 +0000 (12:10 +0200)]
imc: get_default_pwd_status(), as it currently is, works on Windows too
This fixes the build on Windows.
Tobias Brunner [Tue, 18 Aug 2015 15:35:39 +0000 (17:35 +0200)]
ike: Use the original port when remote resolves to %any
When reestablishing the IKE_SA we should still use the original port
when right resolves to %any as some implementations might not like
initial IKE messages on port 4500 (especially for IKEv1).
Tobias Brunner [Thu, 16 Jul 2015 10:53:18 +0000 (12:53 +0200)]
testing: Add ikev2/trap-any scenario
Tobias Brunner [Tue, 30 Oct 2012 08:10:05 +0000 (09:10 +0100)]
trap-manager: Enable auto=route with right=%any for transport mode connections
Fixes #196.
Andreas Steffen [Wed, 19 Aug 2015 05:18:30 +0000 (07:18 +0200)]
Version bump to 5.3.3dr6
Andreas Steffen [Mon, 17 Aug 2015 15:56:39 +0000 (17:56 +0200)]
Extend HCD attribute data for tnc/tnccs-20-hcd-eap scenario
Andreas Steffen [Mon, 17 Aug 2015 15:37:52 +0000 (17:37 +0200)]
Added reason string support to HCD IMV
Andreas Steffen [Tue, 4 Aug 2015 19:43:49 +0000 (21:43 +0200)]
Fixed patches format delimited by CR/LF
Andreas Steffen [Mon, 27 Jul 2015 07:43:40 +0000 (09:43 +0200)]
Added imc-hcd attributes to strongswan.conf