18090 Commits

Author SHA1 Message Date
Tobias Brunner
7030cc7b7f ike-cert-post: Make absolutely sure certificates are only added to IKE_AUTH
The AUTH payload check should be fine, but add some extra checks just to make
really sure and also for clarification.
2021-12-31 17:50:22 +01:00
Tobias Brunner
8372508d32 ike-cert-pre: Support IKE_INTERMEDIATE exchange between IKE_SA_INIT and IKE_AUTH
The first IKE_AUTH does not have MID 1 if that's the case.
2021-12-31 17:50:22 +01:00
Tobias Brunner
8cf3206979 status: Add return_need_more() utility function 2021-12-31 17:50:22 +01:00
Tobias Brunner
8454d094d4 message: Add rules for IKE_FOLLOWUP_KE exchanges 2021-12-31 17:50:22 +01:00
Tobias Brunner
c2f5b7ade8 wip: ike-header: Add IKE_FOLLOWUP_KE exchange type 2021-12-31 17:50:22 +01:00
Tobias Brunner
a6c2589402 message: Add rules for IKE_INTERMEDIATE exchanges 2021-12-31 17:50:22 +01:00
Tobias Brunner
5f724cd2d4 wip: ike-header: Add IKE_INTERMEDIATE exchange type 2021-12-31 17:50:22 +01:00
Tobias Brunner
91ac2f5eff wip: notify-payload: Add notify types for multiple key exchanges 2021-12-31 17:50:22 +01:00
Tobias Brunner
0577bd291d wip: notify-payload: Add notify type for IKE_INTERMEDIATE exchange 2021-12-31 17:50:22 +01:00
Tobias Brunner
473cbd84d0 proposal-substructure: Encode additional key exchange methods 2021-12-31 17:50:22 +01:00
Tobias Brunner
55515a5753 child-cfg: Add method to check if an algorithm is proposed 2021-12-31 17:50:22 +01:00
Tobias Brunner
0c7412391a child-cfg: Generalize get_ke_method() method 2021-12-31 17:50:22 +01:00
Tobias Brunner
d30f1a6418 ike-cfg: Generalize get_ke_method() method 2021-12-31 17:50:22 +01:00
Tobias Brunner
4fa84482e7 proposal: Generalize KE methods 2021-12-31 17:50:22 +01:00
Tobias Brunner
6d18b11e54 proposal: Make all key exchange transforms optional in ESP/AH proposals 2021-12-31 17:50:22 +01:00
Tobias Brunner
3741499149 proposal: Skip all KE transforms if PROPOSAL_SKIP_KE given 2021-12-31 17:50:22 +01:00
Tobias Brunner
1d9d4866ed transform: Add helper to check if transform type negotiates key exchange 2021-12-31 17:50:22 +01:00
Tobias Brunner
2d00ef745c transform: Add additional key exchange transform types 2021-12-31 17:50:22 +01:00
Andreas Steffen
558003d269 Rename MODP_NONE to KE_NONE 2021-12-31 17:50:22 +01:00
Tobias Brunner
94ab8e11c2 Rename diffie_hellman_t to key_exchange_t and change the interface etc.
This makes it more generic so we can use it for QSKE methods.
2021-12-31 17:50:22 +01:00
Andreas Steffen
36c64589d8 Version bump to 5.9.5dr4 5.9.5dr4 2021-12-31 14:46:31 +01:00
Andreas Steffen
903c68e069 sw-collector: Iterate through history logs
The logrotate function causes the apt history to be split into
several parts at arbitrary points in time. If history.log only
is parsed then some package installation changes stored in
zipped backup history files might get lost.

Thus sw-collector now searches all backup history files until
a date older than the current event stored in the collector.db
database is found, so that no entries get overlooked.
2021-12-31 14:33:22 +01:00
Andreas Steffen
0b76ca13ab libtpmtss: Some minor improvements 2021-12-19 13:50:07 +01:00
Andreas Steffen
dadcd9060e Version bump to 5.9.5dr3 5.9.5dr3 2021-12-11 16:39:34 +01:00
Andreas Steffen
8249e6afad libtpmtss: Establish session with TPM 2.0
Using the trusted RSA or ECC Endorsement Key of the TPM 2.0 a
secure session is established via RSA public key encryption or
an ephemeral ECDH key exchange, respectively.

The session allows HMAC-based authenticated communication with
the TPM 2.0 and the exchanged parameters can be encrypted where
necessary to guarantee confidentiality.
2021-12-11 16:21:59 +01:00
Tobias Brunner
b158c08c4b Merge branch 'openssl-providers'
Optionally load the legacy provider in OpenSSL 3 (enabled, by default) to
make algorithms like MD4 and DES available, which we require for
EAP-MSCHAPv2.  Allow explicitly loading the fips provider via existing
fips_mode option.  The loaded providers, whether influenced by the above
options or not, are logged.

Closes strongswan/strongswan#759
2021-12-08 11:34:46 +01:00
Tobias Brunner
910b7d1915 openssl: Log loaded providers 2021-12-08 11:34:22 +01:00
Tobias Brunner
3cd2e2ccc6 openssl: Make fips_mode option work with OpenSSL 3 2021-12-08 11:34:18 +01:00
Tobias Brunner
f556fce16b openssl: Load "legacy" provider in OpenSSL 3 for algorithms like MD4, DES etc.
We still require these algorithms for e.g. EAP-MSCHAPv2, so the option is
enabled, by default.  To use other providers (e.g. fips or even custom
ones), the option can be disabled and the providers to load/activate can
be configured in openssl.cnf.  For instance, the following has the same
effect as enabling the option:

    openssl_conf = openssl_init

    [openssl_init]
    providers = providers

    [providers]
    default = activate
    legacy = activate

    [activate]
    activate = yes
2021-12-08 11:34:13 +01:00
Tobias Brunner
8baa431501 Merge branch 'libtls-tests'
Improves handling failures during unit tests of libtls and includes a
change for the openssl plugin so it only announces ECDH groups for which
the library provides the required ECC curve.

Closes strongswan/strongswan#752
2021-12-08 11:33:32 +01:00
Tobias Brunner
46a6b06282 openssl: Only announce ECDH groups actually supported by OpenSSL
Determined by whether the library provides curves for it or not.
For instance, in the OpenSSL 3 FIPS provider the Brainpool curves are
not included.  And in the Fedora package several weak curves are
explicitly patched out and the Brainpool curves are omitted even in
non-FIPS mode.
2021-12-08 11:33:04 +01:00
Tobias Brunner
03520a0d54 openssl: Add helper to map ECDH groups to curve NIDs 2021-12-08 11:32:59 +01:00
Tobias Brunner
88e7654c6c libtls: Shutdown server socket in test teardown function
If a test fails and the server thread is blocked reading on the socket,
it would stay stuck.
2021-12-08 11:32:55 +01:00
Tobias Brunner
d95381ec7a tls-socket: Handle sending fatal errors better
In particular as server, the previous code might cause it to hang in
recv() if this case wasn't triggered by a close notify (followed by a
shutdown of the socket) but it e.g. failed processing a ServerHello and
responded with a fatal alert.

Fixes: 09fbaad6bd71 ("tls-socket: Don't fail reading if sending data failed")
2021-12-08 11:32:50 +01:00
Andreas Steffen
01485770fd gcrypt: Support of AES-CFB encryption 2021-12-06 13:43:45 +01:00
Andreas Steffen
2d1a1cc907 botan: Support of AES-CFB encryption 2021-12-06 13:28:31 +01:00
Andreas Steffen
54d7e39d40 wolfssl: Support of AES-CFB encryption 2021-12-06 12:53:11 +01:00
Andreas Steffen
695a04d146 openssl: Support of AES-CFB encryption 2021-12-06 12:52:37 +01:00
Tobias Brunner
dcaf9b38f3 child-rekey: Uninstall old outbound SA earlier on initiator/winner
This is useful for kernel implementations where the ordering of SAs
is unpredictable and the new SA might otherwise not be used until the
DELETE response has been received, which is not ideal as the responder
might not keep the old SA around that long.  On Linux, it makes no
difference as we switch to the new outbound SA immediately because the
updated outbound policy references its SPI.
2021-12-01 11:00:40 +01:00
Tobias Brunner
e9ba195910 github: Run charon-tkm tests
Use a Debian-based Docker container to run the unit tests for charon-tkm,
once without and once with TKM running.  The container can also be used
locally to run the tests (see comments in the Dockerfile).
2021-11-29 15:30:43 +01:00
Tobias Brunner
66fd0c4db7 charon-tkm: Make only tests requiring TKM optional
This way we can run many unit tests without having to run the TKM in the
background and as regular user.  To run the other tests, TESTS_TKM can
optionally be defined when running `make check`.
2021-11-29 15:29:22 +01:00
Tobias Brunner
43927e60a7 Revert "testing: Don't run tests when building tkm"
This reverts commit e74bca9e1952cfe4f27f68afeb72be2af56a1256.
2021-11-29 15:06:57 +01:00
Tobias Brunner
6b9c8a674f Revert "testing: Don't run tests when building tkm-rpc"
Let's try that again on current systems.

This reverts commit 9c2aba2735b5b54a892b50e2224008bc0cde4267.
2021-11-29 15:06:57 +01:00
zhangxiaojun
df0999ec93 android: Improved simplified Chinese translation / 完善了简体中文翻译
Closes strongswan/strongswan#779
2021-11-26 15:45:53 +01:00
Tobias Brunner
e43052893d vici: Fix check before applying identity to public keys 2021-11-23 16:15:41 +01:00
Tobias Brunner
deb288ddc1 testing: Increase memory of winnetou
Looks like named requires a lot more memory than previously so that
Apache seems to struggle serving the test results sometimes.
2021-11-19 15:27:58 +01:00
Andreas Steffen
4124b1d376 Version bump to 5.9.5dr2 5.9.5dr2 2021-11-18 22:06:09 +01:00
Tobias Brunner
11b10bc2b0 farp: Fix incompatible function types warning 2021-11-17 18:21:30 +01:00
Tobias Brunner
cceca1a3c4 eap-radius: Fix incompatible function types warnings 2021-11-17 18:18:09 +01:00
Tobias Brunner
9b2e9a943c processor: Fix incompatible function types warnings 2021-11-17 18:06:20 +01:00