Tobias Brunner [Mon, 26 Jun 2017 14:19:08 +0000 (16:19 +0200)]
android: Add convenience methods to get/set selected apps to/from a sorted set
Tobias Brunner [Mon, 26 Jun 2017 10:38:31 +0000 (12:38 +0200)]
android: Import selected/excluded apps from profile file
Tobias Brunner [Mon, 26 Jun 2017 10:02:11 +0000 (12:02 +0200)]
android: Apply selected apps according to config
Either only the selected apps are able to access the VPN or they are
excluded from access to the VPN.
Tobias Brunner [Mon, 26 Jun 2017 09:35:46 +0000 (11:35 +0200)]
android: Add property for selected apps to VPN profiles
A second property will control if only the selected apps have access to
the VPN or if the selected apps are excluded from the VPN, or if the
functionality is disabled.
Tobias Brunner [Thu, 22 Jun 2017 10:26:19 +0000 (12:26 +0200)]
android: Make custom subnets configurable in the GUI
Tobias Brunner [Thu, 22 Jun 2017 10:01:42 +0000 (12:01 +0200)]
android: Import custom subnets from profile file
Tobias Brunner [Thu, 22 Jun 2017 09:56:31 +0000 (11:56 +0200)]
android: Use configured included subnets instead of negotiated TS
Tobias Brunner [Thu, 22 Jun 2017 09:23:25 +0000 (11:23 +0200)]
android: Add ability to add a range set to another
Tobias Brunner [Thu, 22 Jun 2017 09:15:17 +0000 (11:15 +0200)]
android: Add property for included subnets to VPN profiles
Tobias Brunner [Wed, 21 Jun 2017 16:29:48 +0000 (18:29 +0200)]
android: Make excluded subnets configurable in the GUI
Tobias Brunner [Wed, 21 Jun 2017 16:23:33 +0000 (18:23 +0200)]
android: Import excluded subnets from profile file
Tobias Brunner [Wed, 21 Jun 2017 15:21:30 +0000 (17:21 +0200)]
android: Exclude configured subnets from the VPN
Tobias Brunner [Wed, 21 Jun 2017 14:59:40 +0000 (16:59 +0200)]
android: Implement Iterable interface and addAll() for range set
Tobias Brunner [Wed, 21 Jun 2017 14:22:11 +0000 (16:22 +0200)]
android: Add ability to remove a range set from another
Tobias Brunner [Wed, 21 Jun 2017 13:53:39 +0000 (15:53 +0200)]
android: Parse two addresses separated by - as range
Tobias Brunner [Wed, 21 Jun 2017 13:20:58 +0000 (15:20 +0200)]
android: Add property for excluded subnets to VPN profiles
Tobias Brunner [Wed, 21 Jun 2017 12:35:06 +0000 (14:35 +0200)]
android: Add class to manage a set of IP address ranges/subnets
Tobias Brunner [Tue, 13 Jun 2017 16:41:36 +0000 (18:41 +0200)]
android: Add class to handle IP ranges and subnets
Tobias Brunner [Thu, 15 Jun 2017 17:01:33 +0000 (19:01 +0200)]
android: Log some information about the Android version and the device
Tobias Brunner [Tue, 13 Jun 2017 15:42:33 +0000 (17:42 +0200)]
android: Escape backslashes in settings values
For usernames that use domain specifiers.
Tobias Brunner [Thu, 20 Apr 2017 07:33:41 +0000 (09:33 +0200)]
android: Use a specific action to disconnect from the VPN
Tobias Brunner [Tue, 13 Jun 2017 13:15:53 +0000 (15:15 +0200)]
android: Try to load existing user cert when importing VPN profile
Tobias Brunner [Mon, 12 Jun 2017 13:47:31 +0000 (15:47 +0200)]
android: Enable revocation plugin
Tobias Brunner [Mon, 12 Jun 2017 13:46:41 +0000 (15:46 +0200)]
android: Add a simple HTTP(S) fetcher for CRLs
Tobias Brunner [Thu, 4 May 2017 12:00:50 +0000 (14:00 +0200)]
android: Use LOCAL_LDLIBS to link libdl
Newer NDKs fail otherwise as there is no actual module anymore.
Tobias Brunner [Fri, 21 Apr 2017 12:30:16 +0000 (14:30 +0200)]
android: Make log view more efficient
This bunches several log messages together before posting Runnables.
Fixes #2148.
Tobias Brunner [Fri, 21 Apr 2017 11:59:04 +0000 (13:59 +0200)]
android: Don't update state fragment if not attached to an Activity
When the bound state service finally connects we might not actually be
attached to an Activity.
Tobias Brunner [Fri, 21 Apr 2017 11:54:51 +0000 (13:54 +0200)]
android: Make sure every listener at the VPN state service is only registered once
We register when the service connects but also in onStart() (as we
unregister in onStop() to avoid updates when not shown). So this could
theoretically cause the listener to get registered twice if the service
is connected before onStart() is called (it seems it usually isn't).
Tobias Brunner [Tue, 18 Apr 2017 15:07:57 +0000 (17:07 +0200)]
android: Add menu item to import VPN profile via Storage Access Framework
This is useful in case the proper MIME type was not set for a downloaded
profile.
Tobias Brunner [Tue, 18 Apr 2017 14:14:45 +0000 (16:14 +0200)]
android: Add translation for Traditional Chinese
Courtesy of Chris Chiang.
Tobias Brunner [Tue, 18 Apr 2017 14:07:55 +0000 (16:07 +0200)]
android: Move Simplified Chinese translation to values-zg-rCN folder
Tobias Brunner [Tue, 18 Apr 2017 14:05:00 +0000 (16:05 +0200)]
android: Update Gradle plugin and wrapper
Tobias Brunner [Thu, 29 Jun 2017 06:36:50 +0000 (08:36 +0200)]
configure: Install charon-systemd.conf
Fixes #2370.
Tobias Brunner [Tue, 20 Jun 2017 10:50:36 +0000 (12:50 +0200)]
ikev1: Only delete redundant CHILD_SAs if configured
If we find a redundant CHILD_SA (the peer probably rekeyed the SA before
us) we might not want to delete the old SA because the peer might still
use it (same applies to old CHILD_SAs after rekeyings). So only delete
them if configured to do so.
Fixes #2358.
Tobias Brunner [Tue, 20 Jun 2017 11:52:16 +0000 (13:52 +0200)]
configure: Enable coverage for all plugins via PLUGIN_CFLAGS
Tobias Brunner [Tue, 20 Jun 2017 09:52:41 +0000 (11:52 +0200)]
ipsec: Remove `starter` as valid command in --help
`start` is basically the same thing.
Fixes #2362.
Tobias Brunner [Thu, 8 Jun 2017 11:35:47 +0000 (13:35 +0200)]
openssl: Properly handle flags in key usage extension
Tobias Brunner [Wed, 7 Jun 2017 13:46:26 +0000 (15:46 +0200)]
charon-tkm: Return cloned host from tkm_kernel_sad_t::get_dst_host()
When an expire is triggered while rekeying, the CHILD_SA might be deleted
while the returned host is still used to queue a rekey job for the CHILD_SA.
Tobias Brunner [Wed, 7 Jun 2017 14:22:11 +0000 (16:22 +0200)]
configure: Use pkg-config to determine Ruby CFLAGS/LIBS
Tobias Brunner [Tue, 30 May 2017 12:36:17 +0000 (14:36 +0200)]
nm: Version bump to 1.4.2
Andreas Steffen [Mon, 29 May 2017 10:02:48 +0000 (12:02 +0200)]
Version bump to 5.5.3
Tobias Brunner [Fri, 26 May 2017 16:05:48 +0000 (18:05 +0200)]
NEWS: Add info about CVE-2017-9022/23
Andreas Steffen [Fri, 5 May 2017 09:21:12 +0000 (11:21 +0200)]
x509: nameConstraints sequence does not require a loop
Fixes: CVE-2017-9023
Andreas Steffen [Fri, 5 May 2017 18:57:28 +0000 (20:57 +0200)]
unit-tests: Updated asn1-parser tests
Andreas Steffen [Fri, 5 May 2017 07:01:08 +0000 (09:01 +0200)]
asn1-parser: Fix CHOICE parsing
Fixes: CVE-2017-9023
Tobias Brunner [Wed, 29 Mar 2017 09:26:24 +0000 (11:26 +0200)]
gmp: Make sure the modulus is odd and the exponent not zero
Unlike mpz_powm() its secure replacement mpz_powm_sec() has the additional
requirement that the exponent must be > 0 and the modulus has to be odd.
Otherwise, it will crash with a floating-point exception.
Fixes: CVE-2017-9022
Fixes:
3e35a6e7a1b0 ("Use side-channel secured mpz_powm_sec of libgmp 5, if available")
Andreas Steffen [Mon, 29 May 2017 07:59:20 +0000 (09:59 +0200)]
imv-swid: Fixed memory leak in http REST interface
Andreas Steffen [Sun, 28 May 2017 18:07:20 +0000 (20:07 +0200)]
leak-detective: Whitelisted memory leaks in FHH IMCs and IMVs
Andreas Steffen [Sun, 28 May 2017 18:05:52 +0000 (20:05 +0200)]
imv-test: Fixed memory leak in server retry use case
Andreas Steffen [Sun, 28 May 2017 11:51:28 +0000 (13:51 +0200)]
libtnccs: Fixed memory leak of global variables in libxml2
Tobias Brunner [Mon, 29 May 2017 08:49:57 +0000 (10:49 +0200)]
ike-cfg: Fix memory leak when matching against ranges
traffic_selector_t::to_subnet() always sets the net/host (unless the
address family was invalid).
Fixes:
3070697f9f7c ("ike: support multiple addresses, ranges and subnets in IKE address config")
Tobias Brunner [Fri, 26 May 2017 16:33:12 +0000 (18:33 +0200)]
NEWS: Added some news
Tobias Brunner [Fri, 26 May 2017 16:16:40 +0000 (18:16 +0200)]
ike: Apply retransmission_limit before applying the jitter
Tobias Brunner [Fri, 26 May 2017 14:42:59 +0000 (16:42 +0200)]
eap-sim-file: Remove redundant enumerator allocation
Tobias Brunner [Fri, 26 May 2017 13:10:04 +0000 (15:10 +0200)]
sql: Remove redundant enumerator allocation
Interestingly, this doesn't show up in the regression tests because the
compiler removes the first assignment (and thus the allocation) due to
-O2 that's included in our default CFLAGS.
Tobias Brunner [Fri, 26 May 2017 14:24:35 +0000 (16:24 +0200)]
testing: Add wrapper around service command
When charon is started via service command LEAK_DETECTIVE_LOG is not set
because the command strips the environment. Since we only want the
variable to be set during the automated test runs we can't just set it
in /etc/default/charon. Instead, we do so in this wrapper when charon is
started and remove the variable again when it is stopped.
Tobias Brunner [Fri, 26 May 2017 12:44:06 +0000 (14:44 +0200)]
Fixed some typos, courtesy of codespell
Tobias Brunner [Wed, 24 May 2017 12:49:23 +0000 (14:49 +0200)]
apidoc: Add legacy README so links get properly resolved
Also reorders the input files so the READMEs are listed first in the
navigation menu on the left.
Andreas Steffen [Fri, 19 May 2017 19:15:25 +0000 (21:15 +0200)]
testing: Added swanctl/rw-eap-md5-id-rsa scenario
Andreas Steffen [Thu, 11 May 2017 20:22:23 +0000 (22:22 +0200)]
README: Converted to swanctl configuration scheme
Tobias Brunner [Fri, 26 May 2017 11:57:57 +0000 (13:57 +0200)]
Merge branch 'variadic-enumerators'
This adds several changes to enumerator_t and linked_list_t to improve
portability. In particular to Apple's ARM64 iOS platform, whose calling
convention for variadic and regular functions are different. This means
that assigning a non-variadic function to a variadic function pointer,
as we did with our enumerator_t::enumerate() implementations and several
callbacks, will result in crashes as the called function will access the
arguments differently than the caller provided them.
To avoid this issue the enumerator_t interface is now fully variadic.
A new mandatory method is added, venumerate(), that takes a va_list with
the arguments provided while enumerating. enumerate() is replaced with
a generic implementation that prepares a va_list and calls the
enumerator's venumerate() implementation. As this allows passing the
arguments of one enumerator to another it avoids the five pointer hack
used by enumerator_create_nested() and enumerator_create_cleaner().
To simplify the implementation of venumerate() a helper macro is provided
that assigns values from a given va_list to local variables.
The signature of the callback passed to enumerator_create_filter() has
also changed significantly. It's now required to enumerate over the
original enumerator in the callback as this avoids the previous in/out
pointer hack. The arguments to the outer enumerator are provided in a
va_list.
Similar changes to avoid such five pointer hacks affect the signatures
of the callbacks for linked_list_t's invoke_function() and find_first()
methods. For the latter the return type also changed from status_t to
bool, which is important as SUCCESS is defined as 0, so checks for ==
SUCCESS will now fail.
Tobias Brunner [Tue, 16 May 2017 10:11:24 +0000 (12:11 +0200)]
linked-list: Change return value of find_first() and signature of its callback
This avoids the unportable five pointer hack.
Tobias Brunner [Mon, 15 May 2017 15:51:19 +0000 (17:51 +0200)]
linked-list: Change interface of callback for invoke_function()
This avoids the unportable five pointer hack.
Tobias Brunner [Mon, 15 May 2017 15:12:44 +0000 (17:12 +0200)]
linked-list: invoke_offset() doesn't take any additional arguments anymore
Tobias Brunner [Fri, 12 May 2017 10:10:27 +0000 (12:10 +0200)]
Change interface for enumerator_create_filter() callback
This avoids the unportable 5 pointer hack, but requires enumerating in
the callback.
Tobias Brunner [Thu, 11 May 2017 07:17:02 +0000 (09:17 +0200)]
Migrate all enumerators to venumerate() interface change
Tobias Brunner [Tue, 9 May 2017 14:59:37 +0000 (16:59 +0200)]
enumerator: Add venumerate() method to enumerator_t that takes a va_list
This will allow us to implement e.g. enumerator_cleaner without having to
use that unportable 5 pointer forwarding or having to define a callback for
each instance.
A generic implementation for enumerate() is provided so only venumerate()
has to be implemented, which may be simplified by using the VA_ARGS_VGET()
macro.
Tobias Brunner [Wed, 3 May 2017 11:58:02 +0000 (13:58 +0200)]
utils: Add helper macros to read variadic arguments into local variables
Tobias Brunner [Fri, 26 May 2017 11:49:51 +0000 (13:49 +0200)]
testing: Fix ikev2/two-certs scenario
Since
6a8a44be88b0 the certificate received by the client is verified
first, before checking the cached certificates for any with matching
identities. So we usually don't have to attempt to verify the signature
with wrong certificates first and can avoid this message.
Tobias Brunner [Fri, 26 May 2017 09:23:12 +0000 (11:23 +0200)]
Merge branch 'sha-256-96'
Adds an option to locally configure 96-bit truncation for HMAC-SHA256
when negotiated using the official algorithm identifier. This is for
compatibility with peers that incorrectly use this shorter truncation
(like Linux does by default).
Fixes #1353.
Tobias Brunner [Wed, 10 May 2017 17:37:22 +0000 (19:37 +0200)]
vici: Make 96-bit truncation for SHA-256 configurable
Tobias Brunner [Wed, 10 May 2017 17:32:53 +0000 (19:32 +0200)]
stroke: Make 96-bit truncation for SHA-256 configurable
Tobias Brunner [Wed, 10 May 2017 17:15:53 +0000 (19:15 +0200)]
child-cfg: Optionally use 96-bit truncation for HMAC-SHA-256
The correct truncation is 128-bit but some implementations insist on
using 96-bit truncation. With strongSwan this can be negotiated using
an algorithm identifier from a private range. But this doesn't work
with third-party implementations. This adds an option to use 96-bit
truncation even if the official identifier is used.
Tobias Brunner [Fri, 26 May 2017 07:39:21 +0000 (09:39 +0200)]
android-log: Link against liblog
Tobias Brunner [Wed, 24 May 2017 07:34:17 +0000 (09:34 +0200)]
unit-tests: Fix test_chunk_eq() if arguments have side-effects
Tobias Brunner [Tue, 23 May 2017 16:49:13 +0000 (18:49 +0200)]
Merge branch 'avoid-rekey-loss'
This changes the behavior during IKEv2 CHILD_SA rekeyings to avoid
traffic loss. When responding to a CREATE_CHILD_SA request to rekey a
CHILD_SA the responder already has everything available to install and
use the new CHILD_SA. However, this could lead to lost traffic as the
initiator won't be able to process inbound packets until it processed the
CREATE_CHILD_SA response and updated the inbound SA. To avoid this the
responder now only installs the new inbound SA and delays installing the
outbound SA until it receives the DELETE for the replaced CHILD_SA. The
messages transporting these DELETEs could reach the peer before packets
sent with the deleted outbound SAs reach the respective peer. To reduce
the chance of traffic loss due to this the inbound SA of the replaced
CHILD_SA is not removed for a configurable amount of seconds after
the DELETE has been processed.
Fixes #1291.
Tobias Brunner [Wed, 8 Mar 2017 14:47:58 +0000 (15:47 +0100)]
unit-tests: Check installed IPsec SAs in child-rekey tests
Tobias Brunner [Wed, 8 Mar 2017 14:46:39 +0000 (15:46 +0100)]
unit-tests: Add assert to check for installed IPsec SAs
Tobias Brunner [Thu, 9 Mar 2017 09:59:31 +0000 (10:59 +0100)]
unit-tests: Migrate cached IPsec SAs to new IKE_SAs during rekeying
Tobias Brunner [Wed, 8 Mar 2017 14:45:41 +0000 (15:45 +0100)]
unit-tests: Keep track of installed IPsec SAs in mock kernel_ipsec_t implementation
Tobias Brunner [Tue, 21 Mar 2017 15:03:54 +0000 (16:03 +0100)]
child-delete: Delay the removal of the inbound SA of rekeyed CHILD_SAs
After deleting a rekeyed CHILD_SA we uninstall the outbound SA but don't
destroy the CHILD_SA (and the inbound SA) immediately. We delay it
a few seconds or until the SA expires to allow delayed packets to get
processed. The CHILD_SA remains in state CHILD_DELETING until it finally
gets destroyed.
Tobias Brunner [Tue, 21 Mar 2017 14:56:02 +0000 (15:56 +0100)]
delete-child-sa-job: Add new constructor that takes the unique ID of a CHILD_SA
This makes sure we delete the right SA in case the addresses got updated
in the mean time.
Tobias Brunner [Tue, 21 Mar 2017 14:39:10 +0000 (15:39 +0100)]
child-sa: Remove state to track installation of half the SA again
Tobias Brunner [Tue, 21 Mar 2017 14:35:30 +0000 (15:35 +0100)]
unit-tests: Overload helper macro to check for outbound SA state
Tobias Brunner [Tue, 21 Mar 2017 14:08:14 +0000 (15:08 +0100)]
child-sa: Expose state of the outbound SA
Tobias Brunner [Mon, 20 Mar 2017 12:35:56 +0000 (13:35 +0100)]
child-sa: Add method to remove the outbound SA and policies
Tobias Brunner [Wed, 8 Mar 2017 08:40:40 +0000 (09:40 +0100)]
child-sa: Keep track whether the outbound SA has been installed or not
Tobias Brunner [Tue, 21 Mar 2017 11:18:12 +0000 (12:18 +0100)]
child-delete: Track flags per individual CHILD_SA
Tobias Brunner [Wed, 1 Mar 2017 17:02:38 +0000 (18:02 +0100)]
ikev2: Delay installation of outbound SAs during rekeying on the responder
The responder has all the information needed to install both SAs before
the initiator does. So if the responder immediately installs the outbound
SA it might send packets using the new SA which the initiator is not yet
able to process. This can be avoided by delaying the installation of the
outbound SA until the replaced SA is deleted.
Tobias Brunner [Wed, 1 Mar 2017 15:07:57 +0000 (16:07 +0100)]
child-sa: Add log message for CHILD_SA state changes
Tobias Brunner [Tue, 28 Feb 2017 14:03:45 +0000 (15:03 +0100)]
child-sa: Add method to associate rekeyed CHILD_SAs with their replacement
Tobias Brunner [Tue, 28 Feb 2017 14:03:12 +0000 (15:03 +0100)]
child-sa: Add methods that allow partial installation of CHILD_SA
Using install() for the inbound SA and register_outbound() for the
outbound SA followed by install_policies(), will delay the installation of
the outbound SA as well as the installation of the outbound policies
in the kernel until install_outbound() is called later.
Tobias Brunner [Tue, 28 Feb 2017 13:57:51 +0000 (14:57 +0100)]
child-sa: Add new state to track installation of only the inbound SA
Tobias Brunner [Wed, 1 Mar 2017 13:40:15 +0000 (14:40 +0100)]
child-sa: Change API used to set/install policies
This way we only have to pass the traffic selectors once.
Tobias Brunner [Tue, 28 Feb 2017 13:44:38 +0000 (14:44 +0100)]
child-sa: Split in- and outbound policy de-/installation
Only install outbound fallback policies.
Tobias Brunner [Wed, 1 Mar 2017 11:34:22 +0000 (12:34 +0100)]
child-create: Trigger NARROW_RESPONDER_POST hook before installing SAs
This makes sure we use the same set of traffic selectors when installing
the SAs and installing the policies.
Tobias Brunner [Tue, 23 May 2017 16:33:00 +0000 (18:33 +0200)]
Merge branch 'fuzzing'
Adds support for fuzzing the certificate parser provided by the default
plugins (x509, pem, gmp etc.) on Google's OSS-Fuzz infrastructure (or
generally with libFuzzer). Fixes several issues that were found while
fuzzing these plugins.
When building the libraries monolithically and statically the
plugin constructors are now hard-coded in each library so the plugin
code is not removed by the linker because it thinks none of their symbols
are ever referenced.
Tobias Brunner [Tue, 23 May 2017 10:37:05 +0000 (12:37 +0200)]
tnc-ifmap: Null-terminate buffer to make sscanf()-calls safe
Tobias Brunner [Tue, 23 May 2017 10:24:01 +0000 (12:24 +0200)]
libimcv: Make sure the first argument to sscanf() is null-terminated
Tobias Brunner [Tue, 23 May 2017 10:19:48 +0000 (12:19 +0200)]
asn1: Make sure the first argument to sscanf() is null-terminated