Project

General

Profile

Download (55.3 KB) Statistics
| Branch: | Tag: | Revision:

# Date Author Comment
c01f5dac 04/05/2015 12:36 AM Chris Buechler

fix type. Ticket #4504

755b75c7 04/03/2015 06:08 PM Ermal Luçi

Fixes #4504 Provide a newline to generate proper config

0887e836 04/03/2015 05:59 PM Ermal Luçi

Fixes #4504 Allow the bypass policy for LAN to be enabled and prevent traffic sent to lan ip to go to the ipsec tunnel

8b760d4b 04/03/2015 08:09 AM Chris Buechler

Only use mobile clients PFS config with mobile ph2ent. Ticket #4538

Conflicts:
etc/inc/vpn.inc

db9e5154 04/03/2015 03:59 AM Chris Buechler

enable ike_name for daemon facility as well, to add connection identifiers to logs.

0ca36ca3 03/31/2015 02:03 PM benny benny

Fix IPsec Advanced Settings uniqueids. It was neither set in strongswan config, nor picked up correctly in the UI.

6a2eb517 03/12/2015 07:50 PM Chris Buechler

If we bail not being able to find the P1 source, log an error.

Conflicts:
etc/inc/vpn.inc

c014babd 03/12/2015 01:38 AM Chris Buechler

Move libstrongswan-unity.so when Unity plugin is disabled so it can't modify the P2. Workaround for Ticket #4178

34ba4e5d 03/11/2015 12:20 AM Chris Buechler

Need global $ipsec_idhandling here.

24acc8f4 03/10/2015 10:20 PM Chris Buechler

Don't enable interfaces_use by default. Add checkbox to enable on Advanced
tab, in case there are scenarios where it's desirable. Ticket #4341

79262830 03/09/2015 05:06 PM Phil Davis

Code style etc inc vwx3

rebased version with conflicts resolved due to a bunch of recent changes
in vpn.inc

588d3cf6 03/06/2015 02:45 PM Renato Botelho

Check if it's an array before call foreach(). Ticket

b93bc1fd 03/06/2015 02:29 PM Renato Botelho

Stop trying to fix dns_split during strongswan config generation, we have an upgrade code in place for that, it should fix #4418

c406924f 03/06/2015 06:45 AM Chris Buechler

same change as previous commit, for IPv6. Ticket #4482

29de629e 03/06/2015 06:39 AM Chris Buechler

Use the parent interface, not the _vip for interfaces_use. Part of Ticket #4482

58c58dcf 03/03/2015 06:16 AM Chris Buechler

Remove "Prefer old SA" option, and ignore it in all existing configurations. Breaks things in many cases with strongSwan. For the very rare circumstances where this is actually desirable, it's just a sysctl that can be set in tunables.

a41d910c 02/26/2015 01:26 PM Jim Pingle

Fix type (trime->trim)

883096d8 02/25/2015 03:22 PM Ermal Luçi

Ticket #4418 Actually make each entry a clear token to strongswan parser for dns_split

1f3d4db0 02/25/2015 03:19 PM Ermal Luçi

Ticket #4418 make sure the dns_split is separated with spaces rather than space or comma to comply with strongswan requirements.

e1c4a5ff 02/25/2015 03:16 PM Ermal Luçi

Ticket #4418 Make the DNS names attr 28675 space separated as identified by Jeffrey Dvornek

065e78b3 02/18/2015 06:38 AM Chris Buechler

Add GUI control for MOBIKE. Hide it when IKEv1 selected. Enable toggling of NAT-T field display so it's on for IKEv1, off for IKEv2. Do same for reauth while here. Ticket #3979

d17ad7f5 02/13/2015 11:31 AM Ermal Luçi

Surrond the some mobile clients attributes with " ( quote ) to help the strongswan parser identify properly the values. Ticket #4418

d06f9ebe 02/05/2015 09:41 AM Sebastian Öhman

Use web-gui setting for pap or chap instead of having it hard-coded to chap.

bfcb1e4a 02/02/2015 07:36 PM Ermal Luçi

Allow IPseec clients to properly connect and not stomp over each other. Reported-by https://forum.pfsense.org/index.php?topic=87980.0

1c4540dc 02/02/2015 09:01 AM Ermal Luçi

Ticket #4353 fix typo on unset var spotted-by: Phil Davis

87808568 01/31/2015 06:49 PM Ermal Luçi

Fixes #4360 allow marking a connection as responder only, the same behviour as mobile connections

86e1846f 01/31/2015 06:36 PM Ermal Luçi

Fixes #4359 Allow controlling uniqueids

420fce04 01/31/2015 10:06 AM Ermal Luçi

Fixes #4353 Identify when strongswan.conf needs a reload and restart ipsec service.

1959e3d1 01/28/2015 03:42 PM Renato Botelho

Reload filter when IPsec is disabled, fixes #4245

f3caa5a4 01/21/2015 08:46 PM Ermal Luçi

Ticket #4254 do not put duplicate interface names

b61930dc 01/21/2015 08:40 PM Ermal Luçi

Ticket #4254 Actually use proper variables allover to have correct route added

52b25e81 01/21/2015 08:34 PM Ermal Luçi

Ticket #4254 Actually use proper interface to check if gateway exists

1e453232 01/21/2015 08:25 PM Ermal Luçi

Ticket #4254 Use proper variable

c7d44786 01/21/2015 08:09 PM Ermal Luçi

Ticket #4254 actually use the info on the protocol of the vpn sepcification to be more sure on the family to use

7f9844c2 01/21/2015 08:06 PM Ermal Luçi

Ticket #4254 Handle even hosts specified throguh dns name

95783403 01/21/2015 08:06 PM Ermal Luçi

Ticket #4524 Bring back static routes on ipsec to make sure charon does not send traffic through wrong iface. This handles properly ipv6

121cde47 01/21/2015 07:31 PM Ermal Luçi

Be compliant with gatway groups specified on ipsec. Ticket #4254

312a5188 01/21/2015 07:31 PM Ermal Luçi

Ticket #4254 Actually fix this on 2.2 branch since vips are not handled by get_real_interface apparently!

778d2ea9 01/21/2015 08:32 AM Ermal Luçi

Ticket #4254 specify the list of interfaces to be used by charon. This is a workaround for now. Being investigated the fix.

dc41ccaf 01/15/2015 07:18 PM Ermal Luçi

Just do an update since it will handle itself properly.

89f171b0 01/15/2015 07:17 PM Ermal Luçi

Ticket #3997, teach code to track carp through uniqids(). Missing carp GUI changes and upgrade code

07d0d1b2 01/15/2015 07:45 AM Ermal Luçi

Add RSA keys even for eap-mschapv2

37656b10 01/14/2015 04:03 PM Ermal Luçi

Oops add missing curly

54ab1bdc 01/14/2015 04:03 PM Ermal Luçi

Also take care of ph1 mobile settings for eap-tls

10e2acb5 01/14/2015 11:28 AM Ermal Luçi

Add EAP-MSChapv2 implementation for Windows ipsec support as reported here https://forum.pfsense.org/index.php?topic=81657.15

1ec35c4d 01/13/2015 07:21 PM Ermal Luçi

Add some saftey belts here to be safe

1fe208ec 01/13/2015 06:57 PM Ermal Luçi

To avoid issues with clashing SAIDs go back to specifying the reqid in strongswan config.

To be able to manage this first upgrade the config to assign each phase2 an reqid
Second use that during config generation

Ticket #4208

e8cb8b29 01/09/2015 09:32 PM Ermal Luçi

Let the kernel handle REQID rather than handling it manually. The connection name is the one needed here.

2a691e34 01/08/2015 02:59 AM Chris Buechler

fix strongswan conf file generation with ipcomp. Ticket #4182

f8e23dc8 01/07/2015 11:48 PM Ermal Luçi

Fixes #4188 use the same reqid over same phase1 but different phase2 connections. The dashboard will be fixed with the ticket already open. This should fix a lot of instabilities reported on the forums for people having a dozen or more tunnels

0759fdd8 01/07/2015 09:31 PM Ermal Luçi

Correct the sense of the check by default unity is enabled

4a076e36 01/07/2015 09:07 PM Ermal Luçi

Provide an advanced setting to be able to disable Unity Plugin(Cisco extensions)

5324ea38 01/07/2015 08:02 PM Ermal Luçi

Move to specifically specifying the ID type apart when an ip address to have strongswan do proper behaviour. Also for DynDNS names use the dns type id so strongswan does the resolving by its own.

e57a3e40 01/07/2015 06:47 PM Chris Buechler

fix spelling of compression

40cc36d1 01/07/2015 03:35 PM Ermal Luçi

Fixes #4182 by properly managing IPcomp on ipsec tunnels.
Also retires IPsec force reloading advanced sysctl since its useless nowdays with strongswan and remove its call on rc.newipsecdns.

69f7d82f 12/30/2014 11:18 PM Ermal LUÇI

Oops this should be 0s rather than 00. Linked with Ticket #4158

13403bd1 12/30/2014 10:34 PM Ermal Luçi

Check for fqdn peerid/myids and prepend @ so strongswan does not try to be smart. Also use %any for myid instead of risking of putting the wrong value in the secrets file for traffic selector

7f69cbe7 12/30/2014 10:28 PM Ermal Luçi

Use base64 encoded secrets which Fixes #4158

7a8ea3ee 12/22/2014 03:08 PM Ermal Luçi

Correct dashboard with new ipsec generation

d8cb5ff3 12/22/2014 02:37 PM Ermal Luçi

Create a separate connection for IKEv1 with multiple phase2 definitions.

85ea799e 12/19/2014 08:24 PM Ermal Luçi

Correct the leftsubnet specification for transport mode.

1bd77f26 12/19/2014 07:49 PM Ermal Luçi

Heh remove debugging code

0b7f174c 12/19/2014 07:48 PM Ermal Luçi

Ooops fix this identation on final config

7a683b46 12/19/2014 06:30 PM Ermal Luçi

Just whitespace save from removing a useless else { branch

42a10991 12/19/2014 12:19 AM Chris Buechler

include $myid in these PSK lines. Ticket #4126

c1476a2a 12/17/2014 11:54 AM Ermal Luçi

Give the proper value for the logging level since even 0 is the correct value coming from GUI.

b8dd129d 12/10/2014 11:58 AM Renato Botelho

Make sure this message is only displayed on console

c02c81de 12/04/2014 09:19 AM Ermal Luçi

Proper fix was put on f658bac
Revert "Can't skip this if booting, ends up breaking config. Ticket #4071"

This reverts commit effb3a3cfe4e57b781f35ba8a145eb627014d8ce.

effb3a3c 12/04/2014 02:43 AM Chris Buechler

Can't skip this if booting, ends up breaking config. Ticket #4071

e3afacbb 11/29/2014 07:43 PM Chris Buechler

Only set i_dont_care_about_security_and_use_aggressive_mode_psk=yes where there is a P1 with aggressive+PSK enabled. Log a warning when such a configuration is in use.

285ef132 11/26/2014 12:10 PM Ermal Luçi

Rather than set the g['booting'] on globals provide a function to test for that doing the right checks

02069977 11/25/2014 08:40 PM Ermal Luçi

Ooops do the right things for a correct config and php syntax

1eb378ed 11/25/2014 08:39 PM Ermal Luçi

Put the aggressive line only during ikev1 configs

7786c9d6 11/22/2014 03:52 AM Chris Buechler

clean up tabs in strongswan.conf

bdf5efc5 11/19/2014 04:33 PM Phil Davis

Matching bracket in vpn.inc

Reported forum https://forum.pfsense.org/index.php?topic=84322.0

ddabd9d6 11/19/2014 07:54 AM Ermal LUÇI

Ticket #3987. Strongswan support autodetection of IKE version exchange. Support this by allowing an auto version in the GUI.

b095e370 11/19/2014 07:46 AM Ermal LUÇI

Ticket #3809 use the setting with number rather than string since the parser of attr plugin understands only numbers. Reported on: https://forum.pfsense.org/index.php?topic=84304.0

1e0544a6 11/17/2014 08:17 AM Ermal LUÇI

Fix the generation of certificates for rsa type. strpos returns the pos as 0 for rsasig but it php considers that as false anyhow

21cd92ac 11/12/2014 08:41 PM Ermal LUÇI

Oops wrong choice the checkbox is only for javascript

c9b70c0a 11/12/2014 08:41 PM Ermal LUÇI

Remove redundant code and check for dpd_enable checkbox to be set

63ba4729 11/11/2014 07:57 PM Ermal LUÇI

Use leftcert for more options on IPsec authentication

80be089f 11/07/2014 06:28 PM Ermal LUÇI

Fixes #3995. Do not set rightsourceip on site-to-site VPNs but only on mobile users ones otherwise nothing works.

e82a1d11 11/07/2014 01:14 PM Ermal LUÇI

Reload also the configuration not only the secrets before trying to apply existing configuration. Ticket #3981

d3d23754 11/07/2014 04:03 AM Chris Buechler

fix text, PPPoE Server, not VPN

dbb95f38 11/06/2014 06:49 PM Chris Buechler

set install_routes=no for charon to avoid the issues noted in ticket

531686c1 11/05/2014 01:09 AM Chris Buechler

use tabs rather than spaces, as most of this already did.

32171e59 11/05/2014 12:18 AM Chris Buechler

fix invalid ipsec.conf

0810a719 11/04/2014 08:21 PM Ermal LUÇI

Restore 3 values back on NAT-T settings Just Enable now its Auto as per strongswan default. and off disabled mobike. Ticket #3979

8cb7d3e3 11/01/2014 10:41 PM Ermal LUÇI

Properly configure NAT Tranversal setting.

6af85718 11/01/2014 07:54 PM Ermal LUÇI

Remove debugging code

737b18f2 10/30/2014 08:35 PM Ermal LUÇI

Allow accept_unencrypted_mainmode_messages to be enabled if needed

23ed5b78 10/24/2014 05:18 PM Ermal LUÇI

Enable unity plugin as per request from https://forum.pfsense.org/index.php?topic=79737.msg452808#msg452808

7e7f07ae 09/12/2014 07:17 PM Ermal LUÇI

This really does not need the =

3d77ec5d 09/12/2014 05:49 PM Ermal LUÇI

Ooops restore this

3b9ef0ef 09/12/2014 05:40 PM Ermal LUÇI

Inverse the sense of the toggles to avoid configuration upgrades

16c02722 09/12/2014 05:34 PM Ermal LUÇI

Actually use the new toggles

fa4e059e 09/12/2014 05:22 PM Ermal LUÇI

Provide a first implementation of EAP-TLS authentication with IKEv2. It is a start and might not work on all cases

e373e4cd 09/12/2014 03:13 PM Ermal LUÇI

Make this work properly and not throw out errors.

3b977eff 09/10/2014 04:38 PM Ermal LUÇI

Put some tuning on number of half open connection possible in one time.

816672f1 09/10/2014 04:36 PM Ermal LUÇI

Provide some parallellizm on the IKESA lookups for heavy loaded boxes.