Age | Commit message (Collapse) | Author | |
---|---|---|---|
2020-08-01 | sstp: use quick linger for closing sockets | Vladislav Grishenko | |
2020-07-01 | sstp: stop being noisy w/o verbose mode | Vladislav Grishenko | |
2020-06-29 | sstp: fix MITM w/o SSTP_MSG_CALL_CONNECTED is being sent | Vladislav Grishenko | |
3.3.2.1 Negotiation Timer When establishing the SSTP connection, the SSTP server starts the negotiation timer. 2. After sending the Call Connect Acknowledge message, if the server does not receive a Call Connected message before the Negotiation timer expires then it MUST send a Call Abort message and start the process of bringing down (disconnecting) the connection. The server MAY implement different timer values for the Call Connected message and the Call Connect Request message. 3.3.7.1 Server-Side Interface with PPP When the server receives a PPP data frame from the PPP layer, the server MUST perform the following steps: * If CurrentState is set to Server_Call_Connected: Generate an SSTP data packet (section 2.2.3) with the PPP frame as the higher-layer payload and send the packet to the HTTPS layer. * Else, drop the PPP frame. sstp-client is known to be broken, it doesn't send SSTP_MSG_CALL_CONNECTED with PAP and CHAP-MD5 auth, no network data flow and disconnect by negotiation timer is expected. | |||
2020-06-29 | sstp: fix compound mac validation with broken clients | Vladislav Grishenko | |
sstp-client sends SSTP_MSG_CALL_CONNECTED message too early, before auth response, so HLAK can't be known yet and subsequent HLAK-based validation fails. workaround the issue by defer accepting SSTP_MSG_CALL_CONNECTED after auth either has been succeeded or bypassed. | |||
2020-06-28 | sstp: fix crypto-binding attr errors logging | Vladislav Grishenko | |
2020-06-08 | ipoe: gracefuly terminate denied sessions | Vladislav Grishenko | |
2020-04-30 | ipoe: dhcp: add rebind-time support | Vladislav Grishenko | |
2020-04-13 | dhcpv4/dhcpv6: improve packet validation | Vladislav Grishenko | |
2020-04-10 | Check for length in pppoe tags | Denys Fedoryshchenko | |
2020-04-06 | pptp: T6: Check timer before modify | DmitriyEshenko | |
2020-03-10 | Merge pull request #121 from themiron/max-starting-cleanup | xebd | |
Add global [common]max-starting option | |||
2020-03-10 | Merge pull request #117 from themiron/echo-opt82 | xebd | |
ipoe: dhcpv4: echo back opt82 if sent by client/relay per rfc3046 | |||
2020-03-07 | sstp: fix max-sessions limit was not applied | Vladislav Grishenko | |
2020-03-07 | session: add global [common]max-starting option | Vladislav Grishenko | |
usually there's no need to have per-proto limitation, since the need of max starting limitation affects the whole server, not particular protocol only. | |||
2020-03-07 | Revert "ipoe,pptp: introduced max-starting option (limit number of starting ↵ | Vladislav Grishenko | |
sessions)" This reverts commit 02008c74a19c538ff7d9ce643c8cd4c738886196. | |||
2020-03-07 | Revert "pppoe: introduced max-starting option (limit number of starting ↵ | Vladislav Grishenko | |
sessions)" This reverts commit 61862862a9fa24db4f16c24db1aed1f1a5f0be19. | |||
2020-02-16 | ipoe: dhcpv4: echo back opt82 if sent by client/unknown relay per rfc3046 | Vladislav Grishenko | |
2020-02-16 | ipoe: dhcpv4: move relay packet logging after padding | Vladislav Grishenko | |
2020-02-16 | ipoe: dhcpv4: implement udp csum and padding per rfc1542 | Vladislav Grishenko | |
2020-01-13 | Merge pull request #110 from themiron/ipv6-pool | xebd | |
Add named ipv6 pools support | |||
2020-01-11 | ipv6pool: add per-proto ipv6-pool and ipv6-pool-delegate options | Vladislav Grishenko | |
also, disable ipv6 pools via chap-secrets, need to find another syntax for it, may be with comments. | |||
2019-12-24 | pppoe: introduced max-starting option (limit number of starting sessions) | Gavrilenkov A | |
2019-09-11 | ipoe: check for ipoe_create_session_dhcpv4 returns not NULL | Dmitry Kozlov | |
2019-09-04 | ipoe,pptp: introduced max-starting option (limit number of starting sessions) | Gavrilenkov A | |
2019-08-29 | ppp/ipoe: cleanup cleck-ip support | Vladislav Grishenko | |
let check-ip setting from [ppp]/[ipoe] sections has prio over [common] for compatibility with older configs. | |||
2019-08-27 | Merge pull request #92 from themiron/sstp | xebd | |
sstp: implement ssl-protocol option and add unsupported features logging | |||
2019-08-20 | Prepared check-ip and for ipoe, migrate to [common]check-ip | DmitriyEshenko | |
2019-07-27 | sstp: enable all client-compat opts | Vladislav Grishenko | |
2019-07-27 | sstp: tie log errors with config options | Vladislav Grishenko | |
2019-07-27 | sstp: log DH/ECDH support warnings as well | Vladislav Grishenko | |
2019-07-27 | sstp: implement ssl-protocol list option | Vladislav Grishenko | |
possible protocols are ssl2, ssl3, tls1, tls1.1, tls1.2 and tls1.3, but support does depend on openssl library. defaults are up to openssl library w/o ssl2/ssl3. | |||
2019-05-29 | Added extra AVP to SCCCN as known to allow MPD5 tunnels | Pedro don't want to be here | |
original commit author is @dyangol | |||
2019-05-13 | ipoe: restored max-lease-time functionality | Dmitry Kozlov | |
2019-05-13 | Revert "ipoe: restored max-lease-time functionality" | Dmitry Kozlov | |
This reverts commit 6f433706a152ea987899fd830ff399e257b0f2a6. | |||
2019-05-13 | Merge branch 'master' of github.com:xebd/accel-ppp | Dmitry Kozlov | |
2019-05-13 | ipoe: restored max-lease-time functionality | Dmitry Kozlov | |
2019-05-09 | ipoe: Fix send NAK for REQUEST with 3 same XID for not existing sessions | DmitriyEshenko | |
2019-03-08 | initialize ssl_halen = ETH_ALEN in sockaddr_ll structures | Dmitry Kozlov | |
2019-02-12 | ipoe: always ignore Gratoitous ARP | Dmitry Kozlov | |
2019-02-02 | ipoe: dhcpv4: add wins1/wins2 config options support | Vladislav Grishenko | |
2019-02-02 | ipoe: dhcpv4: fix dhcp reply with dns1 unset, dns2 set | Vladislav Grishenko | |
2019-02-02 | ipoe: dhcpv4: group radius array attrs into one dhcp option | Vladislav Grishenko | |
2019-01-27 | ipoe: fix start=up not work if set not per-interface | DmitriyEshenko | |
2019-01-23 | ipoe: log invalid start values and fix dist config | Vladislav Grishenko | |
2019-01-21 | Merge pull request #65 from themiron/sstp | xebd | |
sstp: fix proxy-protocol-v2 sanity checks | |||
2019-01-19 | sstp: fix proxy-protocol-v2 sanity checks | Vladislav Grishenko | |
2019-01-19 | ipoe/vlan_mon: add check for already loaded module | Vladislav Grishenko | |
2019-01-19 | ipoe/cli: fix build warnings | Vladislav Grishenko | |
2018-12-20 | ipoe: stricter route deletion | Guillaume Nault | |
Rework the conditionals to make __ipoe_session_activate() and ipoe_session_finished() follow the same logic: * Drop the second '!serv->opt_ifcfg' test in __ipoe_session_activate(), which is is already checked by the parent conditional. * Invert the order of the tests in ipoe_session_finished(), so that it uses the same conditions as __ipoe_session_activate(). Finally, set the 'src' parameter in iproute_del(), so that we can be sure that the deleted route matches the one added by __ipoe_session_activate(). Signed-off-by: Guillaume Nault <g.nault@alphalink.fr> | |||
2018-12-20 | iputils: add 'src' and 'gw' parameters to iproute_del() | Guillaume Nault | |
Rework iproute_del() to have the same parameters as iproute_add(). This will allow callers to specify more precisely the route they want to delete. Callers will later be converted to make use of these parameters to ensure that the removed route precisely matches the one that was originaly inserted. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr> |