History log of /openbsd-src/sbin/ipsecctl/pfkdump.c (Results 1 – 25 of 58)
Revision Date Author Comments
# c4f11a12 10-Oct-2023 tobhe <tobhe@openbsd.org>

Print at most pkgsize - hdrsize bytes for pfkey tag and identity to
prevent out-of-bounds read in strlen().

ok tb@


# 8fd570bd 07-Aug-2023 dlg <dlg@openbsd.org>

add support route based ipsec vpn negotiation with sec(4) via isakmpd.

this adds "interface secX" to the grammar that you can use instead
of specifying tunnel/transport modes and traffic selectors.

add support route based ipsec vpn negotiation with sec(4) via isakmpd.

this adds "interface secX" to the grammar that you can use instead
of specifying tunnel/transport modes and traffic selectors.

if you have config like "ike interface sec0 local ... peer ...",
ipsecctl will generate the right config for isakmpd to negotiate
esp tunnels for all traffic between 0.0.0.0/0 and 0.0.0.0/0. however,
this also specifies that they should be set up as interface SAs in
the kernel for use with sec(4).

this supports route-based instead of policy based ipsec encapsulation,
and allows us to more easily operate with other vendors and products
that also offer route-based vpns with opinions about the negotiated
policy that doesnt fit with the SPD.

support from many including markus@ tobhe@ claudio@ sthen@ patrick@
now is a good time deraadt@

show more ...


# 688ebb76 07-Mar-2023 guenther <guenther@openbsd.org>

Delete obsolete /* ARGSUSED1 */ lint comments.

ok claudio@ cheloha@ krw@ deraadt@ miod@ millert@


# 7834797c 22-Oct-2021 bluhm <bluhm@openbsd.org>

After deleting hifn(4) the only provider for the LZS compression
algorithm is gone. Reomve all LZS references from the tree. The
v42bis in isakmpd also looks unsupported.
OK mvs@ patrick@ sthen@


# 094e3f7d 14-Jul-2021 tobhe <tobhe@openbsd.org>

Export SA replay counters via pfkey and print with ipsecctl.
This is useful for debugging replay window issues with 64 bit
sequence numbers in IPsec.

ok bluhm@


# 49c3446e 05-Jul-2021 tobhe <tobhe@openbsd.org>

Print SA MTU if included in pfkey message.

ok bluhm@ sthen@ mpi@


# d8131d03 05-Nov-2020 phessler <phessler@openbsd.org>

Enable support for ASN1_DN ipsec identifiers.

Tested with multiple Window 10 Pro (ver 2004) clients, and OpenBSD+iked
as the server.

OK tobhe@ sthen@ kn@


# 14c62822 01-Jun-2020 tobhe <tobhe@openbsd.org>

Fix "comparison of integers of different signs" warning.

ok patrick@


# f5924638 23-Apr-2020 tobhe <tobhe@openbsd.org>

Support SADB_X_EXT_RDOMAIN extension in pfkey dump (-m).

ok markus@, patrick@


# 515e489c 03-Jul-2019 deraadt <deraadt@openbsd.org>

snprintf/vsnprintf return < 0 on error, rather than -1.


# 7fc6e3f0 28-Aug-2018 mpi <mpi@openbsd.org>

Display per-TDB counters in verbose mode.

ok sthen@


# 0bfe572b 10-Jul-2018 mpi <mpi@openbsd.org>

Include <sys/queue.h> instead of relying on kernel headers to include
it.

ok markus@ as part of a larger diff


# a6bcba92 19-Apr-2017 bluhm <bluhm@openbsd.org>

Rename all SA groups to bundles consistently. The first kernel
commit in 2000 that introduced the features already called them SA
bundles. The word group is taken by Diffie-Hellman, reusing it
caus

Rename all SA groups to bundles consistently. The first kernel
commit in 2000 that introduced the features already called them SA
bundles. The word group is taken by Diffie-Hellman, reusing it
causes confusion.
OK hshoexer@

show more ...


# 79d7816a 10-Apr-2017 deraadt <deraadt@openbsd.org>

Found another len += snprintf...
ok mikeb


# fbd50af5 02-Mar-2017 bluhm <bluhm@openbsd.org>

Now that the kernel provides information about IPsec SA bundles,
print them by default.
OK hshoexer@


# d44c51a1 28-Feb-2017 bluhm <bluhm@openbsd.org>

Depending on the addresses, ipsecctl(8) automatically groups sa
bundles together. Extend the kernel interface to export the bundle
information to userland. Then ipsecctl -ss -v can show the interna

Depending on the addresses, ipsecctl(8) automatically groups sa
bundles together. Extend the kernel interface to export the bundle
information to userland. Then ipsecctl -ss -v can show the internal
relations. Unfortunately the header SADB_X_EXT_PROTOCOL was reused
by SADB_X_GRPSPIS, so it cannot be used to transfer the second sa
type with sysctl. Introduce a new SADB_X_EXT_SATYPE2 and use it
consistently.
OK hshoexer@ markus@

show more ...


# 0e800071 09-Dec-2015 naddy <naddy@openbsd.org>

Remove plain DES encryption from IPsec.

DES is insecure since brute force attacks are practical due to its
short key length.

This removes support for DES-CBC encryption in ESP and in IKE main
and q

Remove plain DES encryption from IPsec.

DES is insecure since brute force attacks are practical due to its
short key length.

This removes support for DES-CBC encryption in ESP and in IKE main
and quick mode from the kernel, isakmpd(8), ipsecctl(8), and iked(8).

ok mikeb@

show more ...


# 597e5beb 02-Dec-2015 naddy <naddy@openbsd.org>

remove unimplemented PF_KEY algorithms; ok sthen@ mpi@ mikeb@


# f705960c 04-Nov-2015 mikeb <mikeb@openbsd.org>

Decode Chacha20-Poly1305 when dumping SAs; ok reyk, naddy


# 6a70b10b 17-Apr-2015 mikeb <mikeb@openbsd.org>

Remove unsupported SADB_X_IDENTTYPE_CONNECTION; OK markus, hshoexer


# d0aa6eba 14-Apr-2015 mikeb <mikeb@openbsd.org>

Remove support for storing credentials and auth information in the kernel.

This code is largely unfinished and is not used for anything. The change
leaves identities as only objects referenced by i

Remove support for storing credentials and auth information in the kernel.

This code is largely unfinished and is not used for anything. The change
leaves identities as only objects referenced by ipsec_ref structure and
their handling requires some changes to support more advanced matching of
IPsec connections.

No objections from reyk and hshoexer, with and OK markus.

show more ...


# b9fc9a72 16-Jan-2015 deraadt <deraadt@openbsd.org>

Replace <sys/param.h> with <limits.h> and other less dirty headers where
possible. Annotate <sys/param.h> lines with their current reasons. Switch
to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_N

Replace <sys/param.h> with <limits.h> and other less dirty headers where
possible. Annotate <sys/param.h> lines with their current reasons. Switch
to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_NAME_MAX, etc. Change
MIN() and MAX() to local definitions of MINIMUM() and MAXIMUM() where
sensible to avoid pulling in the pollution. These are the files confirmed
through binary verification.
ok guenther, millert, doug (helped with the verification protocol)

show more ...


# 4ced5087 28-Dec-2014 claudio <claudio@openbsd.org>

Unbreak the tree. Looks like tedu did not tedu enough when killing KPDK
support.


# b6ffab99 22-Jan-2014 markus <markus@openbsd.org>

fix printing of IPcomp SAs; ok mikeb@ & todd@


# 8639b6ee 18-Sep-2012 markus <markus@openbsd.org>

remove the SADB_X_SAFLAGS_{HALFIV,RANDOMPADDING,NOREPLAY} pfkey-API (not set
anywhere) as well as the matching TDBF_{HALFIV,RANDOMPADDING,NOREPLAY} code.
ok mikeb@


123