#
c4f11a12 |
| 10-Oct-2023 |
tobhe <tobhe@openbsd.org> |
Print at most pkgsize - hdrsize bytes for pfkey tag and identity to prevent out-of-bounds read in strlen().
ok tb@
|
#
8fd570bd |
| 07-Aug-2023 |
dlg <dlg@openbsd.org> |
add support route based ipsec vpn negotiation with sec(4) via isakmpd.
this adds "interface secX" to the grammar that you can use instead of specifying tunnel/transport modes and traffic selectors.
add support route based ipsec vpn negotiation with sec(4) via isakmpd.
this adds "interface secX" to the grammar that you can use instead of specifying tunnel/transport modes and traffic selectors.
if you have config like "ike interface sec0 local ... peer ...", ipsecctl will generate the right config for isakmpd to negotiate esp tunnels for all traffic between 0.0.0.0/0 and 0.0.0.0/0. however, this also specifies that they should be set up as interface SAs in the kernel for use with sec(4).
this supports route-based instead of policy based ipsec encapsulation, and allows us to more easily operate with other vendors and products that also offer route-based vpns with opinions about the negotiated policy that doesnt fit with the SPD.
support from many including markus@ tobhe@ claudio@ sthen@ patrick@ now is a good time deraadt@
show more ...
|
#
688ebb76 |
| 07-Mar-2023 |
guenther <guenther@openbsd.org> |
Delete obsolete /* ARGSUSED1 */ lint comments.
ok claudio@ cheloha@ krw@ deraadt@ miod@ millert@
|
#
7834797c |
| 22-Oct-2021 |
bluhm <bluhm@openbsd.org> |
After deleting hifn(4) the only provider for the LZS compression algorithm is gone. Reomve all LZS references from the tree. The v42bis in isakmpd also looks unsupported. OK mvs@ patrick@ sthen@
|
#
094e3f7d |
| 14-Jul-2021 |
tobhe <tobhe@openbsd.org> |
Export SA replay counters via pfkey and print with ipsecctl. This is useful for debugging replay window issues with 64 bit sequence numbers in IPsec.
ok bluhm@
|
#
49c3446e |
| 05-Jul-2021 |
tobhe <tobhe@openbsd.org> |
Print SA MTU if included in pfkey message.
ok bluhm@ sthen@ mpi@
|
#
d8131d03 |
| 05-Nov-2020 |
phessler <phessler@openbsd.org> |
Enable support for ASN1_DN ipsec identifiers.
Tested with multiple Window 10 Pro (ver 2004) clients, and OpenBSD+iked as the server.
OK tobhe@ sthen@ kn@
|
#
14c62822 |
| 01-Jun-2020 |
tobhe <tobhe@openbsd.org> |
Fix "comparison of integers of different signs" warning.
ok patrick@
|
#
f5924638 |
| 23-Apr-2020 |
tobhe <tobhe@openbsd.org> |
Support SADB_X_EXT_RDOMAIN extension in pfkey dump (-m).
ok markus@, patrick@
|
#
515e489c |
| 03-Jul-2019 |
deraadt <deraadt@openbsd.org> |
snprintf/vsnprintf return < 0 on error, rather than -1.
|
#
7fc6e3f0 |
| 28-Aug-2018 |
mpi <mpi@openbsd.org> |
Display per-TDB counters in verbose mode.
ok sthen@
|
#
0bfe572b |
| 10-Jul-2018 |
mpi <mpi@openbsd.org> |
Include <sys/queue.h> instead of relying on kernel headers to include it.
ok markus@ as part of a larger diff
|
#
a6bcba92 |
| 19-Apr-2017 |
bluhm <bluhm@openbsd.org> |
Rename all SA groups to bundles consistently. The first kernel commit in 2000 that introduced the features already called them SA bundles. The word group is taken by Diffie-Hellman, reusing it caus
Rename all SA groups to bundles consistently. The first kernel commit in 2000 that introduced the features already called them SA bundles. The word group is taken by Diffie-Hellman, reusing it causes confusion. OK hshoexer@
show more ...
|
#
79d7816a |
| 10-Apr-2017 |
deraadt <deraadt@openbsd.org> |
Found another len += snprintf... ok mikeb
|
#
fbd50af5 |
| 02-Mar-2017 |
bluhm <bluhm@openbsd.org> |
Now that the kernel provides information about IPsec SA bundles, print them by default. OK hshoexer@
|
#
d44c51a1 |
| 28-Feb-2017 |
bluhm <bluhm@openbsd.org> |
Depending on the addresses, ipsecctl(8) automatically groups sa bundles together. Extend the kernel interface to export the bundle information to userland. Then ipsecctl -ss -v can show the interna
Depending on the addresses, ipsecctl(8) automatically groups sa bundles together. Extend the kernel interface to export the bundle information to userland. Then ipsecctl -ss -v can show the internal relations. Unfortunately the header SADB_X_EXT_PROTOCOL was reused by SADB_X_GRPSPIS, so it cannot be used to transfer the second sa type with sysctl. Introduce a new SADB_X_EXT_SATYPE2 and use it consistently. OK hshoexer@ markus@
show more ...
|
#
0e800071 |
| 09-Dec-2015 |
naddy <naddy@openbsd.org> |
Remove plain DES encryption from IPsec.
DES is insecure since brute force attacks are practical due to its short key length.
This removes support for DES-CBC encryption in ESP and in IKE main and q
Remove plain DES encryption from IPsec.
DES is insecure since brute force attacks are practical due to its short key length.
This removes support for DES-CBC encryption in ESP and in IKE main and quick mode from the kernel, isakmpd(8), ipsecctl(8), and iked(8).
ok mikeb@
show more ...
|
#
597e5beb |
| 02-Dec-2015 |
naddy <naddy@openbsd.org> |
remove unimplemented PF_KEY algorithms; ok sthen@ mpi@ mikeb@
|
#
f705960c |
| 04-Nov-2015 |
mikeb <mikeb@openbsd.org> |
Decode Chacha20-Poly1305 when dumping SAs; ok reyk, naddy
|
#
6a70b10b |
| 17-Apr-2015 |
mikeb <mikeb@openbsd.org> |
Remove unsupported SADB_X_IDENTTYPE_CONNECTION; OK markus, hshoexer
|
#
d0aa6eba |
| 14-Apr-2015 |
mikeb <mikeb@openbsd.org> |
Remove support for storing credentials and auth information in the kernel.
This code is largely unfinished and is not used for anything. The change leaves identities as only objects referenced by i
Remove support for storing credentials and auth information in the kernel.
This code is largely unfinished and is not used for anything. The change leaves identities as only objects referenced by ipsec_ref structure and their handling requires some changes to support more advanced matching of IPsec connections.
No objections from reyk and hshoexer, with and OK markus.
show more ...
|
#
b9fc9a72 |
| 16-Jan-2015 |
deraadt <deraadt@openbsd.org> |
Replace <sys/param.h> with <limits.h> and other less dirty headers where possible. Annotate <sys/param.h> lines with their current reasons. Switch to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_N
Replace <sys/param.h> with <limits.h> and other less dirty headers where possible. Annotate <sys/param.h> lines with their current reasons. Switch to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_NAME_MAX, etc. Change MIN() and MAX() to local definitions of MINIMUM() and MAXIMUM() where sensible to avoid pulling in the pollution. These are the files confirmed through binary verification. ok guenther, millert, doug (helped with the verification protocol)
show more ...
|
#
4ced5087 |
| 28-Dec-2014 |
claudio <claudio@openbsd.org> |
Unbreak the tree. Looks like tedu did not tedu enough when killing KPDK support.
|
#
b6ffab99 |
| 22-Jan-2014 |
markus <markus@openbsd.org> |
fix printing of IPcomp SAs; ok mikeb@ & todd@
|
#
8639b6ee |
| 18-Sep-2012 |
markus <markus@openbsd.org> |
remove the SADB_X_SAFLAGS_{HALFIV,RANDOMPADDING,NOREPLAY} pfkey-API (not set anywhere) as well as the matching TDBF_{HALFIV,RANDOMPADDING,NOREPLAY} code. ok mikeb@
|