summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-03-01Exclude '0s' from public key string input in rsa_convert_pubkey_pemRyan Riske
2015-03-01Add support for RSA keys with strongSwan 5.2.xRyan Riske
strongSwan 5.2.x no longer recognizes keys in RFC 3110 format inlined in ipsec.conf and ipsec.secrets. We need to convert the local private key and peer public keys to PEM format, without changing the config templates or user-visible key formats. This patch will require the Debian packages 'libcrypt-openssl-bignum-perl' and 'libcrypt-openssl-rsa-perl' to be added to the system.
2015-02-16Move execution of nhrp script to "end" of ipsec config so it executes on all ↵Kim Hagen
changes made to the ipsec config
2015-02-13Remove the automatic generation of implicit connectionsJeff Leung
Since charon's existence, generating them is redundant and as a matter of fact causes issues with establishing multiple IKEv1 IPSec tunnels to the same peer.
2015-02-10Allow the user to force UDP encapsulation for a named peerJeff Leung
This might help with strongSwan traversing through firewalls that filter proto 51, but not UDP traffic.
2015-02-090.12.105+vyos2+lithium10debian/0.12.105+vyos2+lithium10Alex Harpin
2015-02-09Removing generation of leftsourceip= parameter in ipsec.confJeff Leung
As confirmed by Thermi in the strongSwan IRC channel inside freenode, this parameter should not have been generated for a S2S VPN setup. If leftsourceip= is specified on both ends in an IKEv1 S2S VPN tunnel, both ends will have charon hanging on MODE_CONFIG. This is because both ends are trying to ask an IP from the remote end which doesn't exist.
2015-02-08Slightly alter aggressive mode selection logicJeff Leung
If the user defines main mode, the config script will always enable aggressive mode. Fix the logic to correctly disable aggressive mode when main mode is asked for in IKEv1 connections.
2015-02-08Correct typo'd aggressive optionJeff Leung
Originally we meant aggressive, not ikev2
2015-02-07Remove the code that generates our ipsec logger at runtimeJeff Leung
Since we're invoking the logger at runtime, there's really no point on keeping this codeblock
2015-02-07Configure the ipsec debug logger at runtimeJeff Leung
Instead of configuring the ipsec logger at config time, configure it at runtime. The codeblock that generated the logger will be removed in a subsequent commit
2015-02-07Merge remote branch 'origin/lithium' into lithium-strongswan5Jeff Leung
2015-02-07Properly clean up site-to-site tunnels on removalJeff Leung
strongSwan's charon by design maintains all established connections regardless, even if the connection's profile has been deleted from ipsec.conf. This change will grab a list of old tunnels from the old configuration and clean up old tunnels that are not present in the new configuration.
2015-02-07Update references from pluto.ctl to charon.ctlJeff Leung
This needs to be updated or VPN configurations won't be properly handled on subsequent updates.
2015-02-07Remove the default value in ipsec ike-group $name modeJeff Leung
Setting this to a default value breaks ikev2 configurations since aggressive mode is only applicable for ikev1 tunnels
2015-02-06Use ipsec reload instead of updateJeff Leung
For some odd reason doing an ipsec update does not make charon pick up any newly created tunnels. However doing an ipsec reload updates all newly created tunnels correctly.
2015-02-05Update ipsec logging log-modes to point towards charon's loggersJeff Leung
log-modes now expose charon's keywords instead of pluto's keywords. Refer to the strongSwan's manual to see what each specific logger does.
2015-02-05Allow users to specify a custom file to be included with ipsec.confJeff Leung
2015-02-05Allow users to specify aggressive mode for IKEv1 key exchangesJeff Leung
Although strongly not recommended by the developers of strongSwan, sometimes remote VPN gateways requires this because of interop reasons or a network admin who doesn't have an idea on why aggressive mode is bad.
2015-02-02Bug #367 - DMVPN Testing, but I do not see ESP traffic.Kim Hagen
2015-01-27Removing pfs and pfsgroup parameter generationJeff Leung
In strongSwan 5.0.0 and later series, pfs= and pfsgroup= parameters have now been removed.
2015-01-27Generate PFS group settings alongside with our ESP settingsJeff Leung
Since strongSwan 5.0.0, defining the PFS group settings has moved in the esp= parameter. If PFS is simply enabled, it will use the first IKE proposal's dh-group as the PFS group.
2015-01-27Have the IKE parameter parser to use our new get_dh_cipher_result submoduleJeff Leung
The IKE parameter parser now uses the new get_dh_cipher_result submodule instead of the old if/else/elseif logic that was hardcoded to the parser. This should help ease developers adding new Diffie-Hellman groups if there are any in the future.
2015-01-27Add get_dh_cipher_result submoduleJeff Leung
By adding this submodule we can reduce the amount of code we need to maintain by having a single submodule that takes in a Diffie-Hellman group number and translates it to what strongSwan expects.
2015-01-27Removing charonstart from the config setup sectionJeff Leung
In preperation of moving towards the strongSwan 5.x series, we are removing the legacy charonstart=yes parameter in ipsec.conf. Since strongSwan 5.0.0 pluto has been removed from the codebase and charon is now the main daemon that handles IKEv1 and IKEv2 connections.
2015-01-190.12.105+vyos2+lithium9debian/0.12.105+vyos2+lithium9Daniil Baturin
2015-01-19Remove @ from the id/remote-id help string. It was never required.Daniil Baturin
2015-01-190.12.105+vyos2+lithium8debian/0.12.105+vyos2+lithium8Daniil Baturin
2015-01-19Bug #348: remove unnecessary restrictions on the PSK format.Daniil Baturin
2015-01-170.12.105+vyos2+lithium7debian/0.12.105+vyos2+lithium7Alex Harpin
2015-01-17vyatta-cfg-vpn: update pre-shared secret key help for single quotesAlex Harpin
Updated the help for pre-shared secret key usage when special characters are used. These need to be enclosed in single quotes to stop them being expanded by the bash shell. Bug #451 http://bugzilla.vyos.net/show_bug.cgi?id=451
2014-12-260.12.105+vyos2+lithium6debian/0.12.105+vyos2+lithium6Alex Harpin
2014-12-26Update maintainer addressAlex Harpin
2014-12-190.12.105+vyos2+lithium5debian/0.12.105+vyos2+lithium5Daniil Baturin
2014-12-19Bug #415: use remote-id for peer ID unconditionally if it's set.Daniil Baturin
2014-12-19Bug #414: quote the leftid value to avoid problems with non-alphanumeric ↵Daniil Baturin
characters.
2014-12-18Merge pull request #11 from jhendryUK/ikev2_reauth_optionDaniil Baturin
Ikev2 reauth option
2014-12-050.12.105+vyos2+lithium4debian/0.12.105+vyos2+lithium4Alex Harpin
2014-12-05vyatta-cfg-vpn: remove the cfgvti helper programAlex Harpin
The cfgvti helper program was originally added for configuring VTIs. The functionality it provided is now included upstream in iproute, so it is no longer required following the previous commits for Bug #358. Bug #358 http://bugzilla.vyos.net/show_bug.cgi?id=358
2014-12-050.12.105+vyos2+lithium3debian/0.12.105+vyos2+lithium3Alex Harpin
2014-12-04vyatta-cfg-vpn: formatting changes for style consistencyAlex Harpin
Update lib/Vyatta/VPN/vtiIntf.pm to have consistent identation levels and style throughout.
2014-12-04vyatta-cfg-vpn: reduce the vti mark base to prevent integer overflowAlex Harpin
Reduce the vtiMarkBase value to prevent integer overflow on the created ip xfrm states and policies.
2014-12-04vyatta-cfg-vpn: update vti creation in line with changes to strongswanAlex Harpin
Update the VTI creation process to go along with the changes added to the vyatta-strongswan package, due to changes in the kernel vti module. This also removes the need for additional netfilter rules to ensure that packets are directed to the corresponding VTI. Bug #358 http://bugzilla.vyos.net/show_bug.cgi?id=358
2014-12-04vyatta-cfg-vpn: update parseVtiTun to account for vti changesAlex Harpin
Update the parseVtiTun function to account for the new way of configuring VTIs. Bug #358 http://bugzilla.vyos.net/show_bug.cgi?id=358
2014-12-04vyatta-cfg-vpn: move scripts/vtiIntf.pm to lib/Vyatta/VPN/vtiIntf.pmAlex Harpin
Move vtiIntf.pm to a more logical place, in line with all the other packages.
2014-12-01Fixing syntax error in vpn-config.pl, fixing allowed parameters in the ↵Jason Hendry
per-tunnel ikev2-reauth node
2014-12-01Exposing ikev2 reauth option in CLI, defaulting to 'no'Jason Hendry
2014-10-290.12.105+vyos2+lithium2debian/0.12.105+vyos2+lithium2Daniil Baturin
2014-10-29Update changelog for the new branch.Daniil Baturin
2014-10-190.12.105+vyos1+helium4debian/0.12.105+vyos1+helium4Daniil Baturin