Project

General

Profile

Statistics
| Branch: | Tag: | Revision:

# Date Author Comment
64ed3e60 01/12/2015 08:27 AM Ermal Luçi

Fix inherent issues with isset and empty values set as true by our parser. This made the piep configuration to be wrong at least for passthrough entries. Ticket #3932

4fc1c68f 01/12/2015 01:16 AM Phil Davis

Do not return disabled dynamic gateways

When a dynamic gateway is disabled (by the user through the webGUI), it was still being returned by return_gateways_array(). But when called like that, disabled gateways should not be returned. The first part of the routine was correctly skipping disabled gateways, but then the later part would effectively re-generate those dynamic gateways on-the-fly and not realise they should be skipped because they were disabled....

30656f66 01/11/2015 03:38 PM Ermal Luçi

Fixes #4177 convert password to base64 to be submitted to avoid issues with special chars in shell and HTTP GET parameter passing. Probably should add POST support to fcgicli.

31cf5a93 01/10/2015 09:35 PM Ermal Luçi

Fixes #3281 do not undo any changes already done for gif/gre interface.

9218ecb6 01/09/2015 09:32 PM Ermal Luçi

Let the kernel handle REQID rather than handling it manually. The connection name is the one needed here.

57963e4b 01/09/2015 09:06 PM Jim Pingle

Add tracker and label to IPv4 Link-Local block rules.

557c21da 01/09/2015 07:14 AM Chris Buechler

After the other set of changes had unexpected complications, let's back this out too. Revert "PEAR static method call warning"

This reverts commit 4751f76a6772147097906b699d4216ae38c58c39.

0515117e 01/09/2015 06:40 AM Chris Buechler

This broke a variety of things. Revert "Deprecated and non-static method messages"

This reverts commit 91b9a02fb131746c67fdf9f34282f123a13f1b13.

0391b39b 01/09/2015 06:20 AM Phil Davis

PEAR static method call warning

Forum https://forum.pfsense.org/index.php?topic=86478.0
PEAR is used by
IPv6.inc
auth.inc
captiveportal.inc
radius.inc
xmlrpc_client.inc
radius_accounting.inc
radius_authentication.inc

I have just changed this 1 function to "public static"...

ecefba29 01/09/2015 06:18 AM Chris Buechler

disable this PHP error logging, errors that are really significant end up with a crash report, this is more noise than useful at this stage in 2.2.

ac8f75f1 01/08/2015 09:49 PM Ermal Luçi

Catch packets on all iunterfaces and send them out the correct one. Fixes #4174

bad9dec5 01/08/2015 08:26 PM Phil Davis

Deprecated and non-static method messages

Fix various files that can emit messages like:
PHP Strict Standards: Non-static method SimplePie_Misc::array_unique()
should not be called statically, assuming $this from incompatible
context in /etc/inc/simplepie/simplepie.inc on line 5508...

7c1c70d5 01/08/2015 06:17 PM Renato Botelho

Improve URL and URL ports alias update data:

- Move redundant code to a function parse_aliases_file(). Before the max
number of items was not being respected when URL content is updated,
only when alias was saved. Same was happening with ip/subnet/port
validation and user could end up with a bad pf.conf...

1776d19e 01/08/2015 03:41 PM Jim Pingle

Change OpenVPN CARP VIP test to be more accurate. The client should also not be run if the VIP is in the INIT state.

a980b284 01/08/2015 01:08 PM Renato Botelho

Fix check for cookies, the way it was implemented didn't work because it would need a refresh to check if cookie was set or not. Use javascript to do a simple test

9156a51d 01/08/2015 12:26 PM Renato Botelho

Add a value to cookie, otherwise it's not set. Before my last change parameters were out of order and expiration time was being set as value. It should fix #4069

adf8a74a 01/08/2015 11:33 AM Ermal Luçi

This is not the place for this setting and werid its here!

f585d06e 01/08/2015 06:05 AM Chris Buechler

some lagg modes are missing vlanmtu, but work fine with VLANs. Work around it for now at least. Ticket #4186

74017e32 01/08/2015 05:28 AM Stilez y

"Like with like" - move a few functions to better places in the code (they are placed strangely)

A few functions such as ipcmp(), subnet_expand(), and check_subnets_overlap() are in illogical places - away from all the other ip comparison and subnet basic functions and in the middle of alias handling and interface enumeration....

6be58d9d 01/08/2015 03:00 AM Chris Buechler

fix strongswan conf file generation with ipcomp. Ticket #4182

4a3ce17a 01/07/2015 11:48 PM Ermal Luçi

Fixes #4188 use the same reqid over same phase1 but different phase2 connections. The dashboard will be fixed with the ticket already open. This should fix a lot of instabilities reported on the forums for people having a dozen or more tunnels

7a959780 01/07/2015 09:31 PM Ermal Luçi

Correct the sense of the check by default unity is enabled

845f9f78 01/07/2015 09:06 PM Ermal Luçi

Provide an advanced setting to be able to disable Unity Plugin(Cisco extensions)

1ada4c8c 01/07/2015 08:02 PM Ermal Luçi

Move to specifically specifying the ID type apart when an ip address to have strongswan do proper behaviour. Also for DynDNS names use the dns type id so strongswan does the resolving by its own.

2f56ac49 01/07/2015 07:26 PM Chris Buechler

Don't hard code the target IP in auto-generated outbound NAT rules, use
previous behavior of setting it to the interface IP.

cc9b3e07 01/07/2015 07:18 PM Ermal Luçi

split is deprecated move to explode

d2884b9a 01/07/2015 06:47 PM Chris Buechler

fix spelling of compression

45efe1b6 01/07/2015 03:33 PM Ermal Luçi

Fixes #4182 by properly managing IPcomp on ipsec tunnels.
Also retires IPsec force reloading advanced sysctl since its useless nowdays with strongswan and remove its call on rc.newipsecdns.

d4e894f6 01/07/2015 11:11 AM Renato Botelho

Fix #4146:

OpenVPN create the tun/tap interface and, when set an IP address to
it, mark it as UP. In some scenarios, when TAP is set as bridge and
doesn't have an IP address set on it, it never goes up and tunnel
doesn't work.

If rc.newwanip is called for this TAP interface, UP flag is set, but,...

19c8976b 01/07/2015 06:47 AM Chris Buechler

Log PHP errors. Ticket #4143

9b182b08 01/06/2015 09:54 PM Ermal Luçi

Enforce subnet check here to avoid any issues resulting from function call.

c8d87d2a 01/06/2015 08:55 PM Renato Botelho

Remove useless check, CARP does not depend of interface having another IP set before

3ffea319 01/06/2015 05:17 PM Renato Botelho

Remove some extra spaces

d9db4862 01/06/2015 05:17 PM Renato Botelho

Fix typo on variable name

374b2f21 01/06/2015 05:17 PM Stilez y

Tighten and IPv6-ify gen_subnet() etc

Tightens, canonicalises and improves for IPv6, the functions
gen_subnet(), gen_subnetv6(), gen_subnet_max(), gen_subnetv6_max()

Changes are transparent to calling code.

Issues:

1) gen_subnet() and gen_subnet_max() will validate both IPv4 and IPv6 as valid args, but will then try to process an IPv6 subnet bitwise as x32 LONG without further checking, causing erroneous but apparently valid responses....

d8540659 01/06/2015 01:44 PM Renato Botelho

Revert "FreeBSD fails to set advskew back to 0 after you set it to any other"

A patch was added to allow set advskew back to 0

This reverts commit eea2ad5d61b2cbcf2957207fb0f13769c203cb36.

b785a40b 01/06/2015 12:01 PM Renato Botelho

Add secure flag when necessary to cookie_test, as we do for session cookie, to avoid false positives in common vulnerabilities scanners. It fixes #4069

055bd1ee 01/05/2015 06:57 PM Phil Davis

Allow IPv6 on loopback needs quick

The following block uses "quick" which causes that block to come into effect before the "pass in" here. The pass rule also needs to be "quick".
Problem noted by Andy Sayler on https://redmine.pfsense.org/issues/4074
Before this change, an attempt to manually do something local with IPv6 fails:...

91a84a26 01/05/2015 06:56 PM Phil Davis

Limit unbound so-rcvbuf: 8m

Issue reported here: https://forum.pfsense.org/index.php?topic=78356.msg472781#msg472781
Most unbound doc places mention setting it at up to 8m. I'm sure it would be possible to investigate more and find a way to make unbound+FreeBSD be able to go higher than 8m. But probably 8m is sufficient for everyone anyway (judging by what the unbound docs seem to assume will be a good value on a busy system)....

0a23cddc 01/05/2015 05:41 PM Renato Botelho

Fix #4090:

- Unbound advanced options may contain double quotes and it breaks the
syntax when a backup is restored because newlines are trimmed. Save it
in base64 format is a safe way to prevent it
- Bump config version to 11.5
- Provide upgrade code to encode current config or the one that came...

24149c31 01/05/2015 02:58 PM Renato Botelho

It's supposed to remove windows EOL here, not ;

62403377 01/05/2015 01:17 PM Phil Davis

Do not monitor a gateway that has not got DHCP yet

When an interface is waiting to get DHCP, but the cable is physically-electrically connected to the upstream device, the interface has an IPv4 address 0.0.0.0 - that was getting past here and, if the interface gateway had a monitor IP specified, that monitor IP was being put into apinger.conf and being monitored. Because the interface has not got a gateway yet, no static route is added to force the traffic for the monitor IP out the particular interface. So the traffic to the monitor IP can follow the default route and perhaps succeed in getting out another WAN to the monitor IP....

6317d31d 01/01/2015 12:13 PM Phil Davis

Fix lineup of copyright lines

and module names and other bits of formatting and typos in header
comment sections.

1d709219 12/31/2014 10:18 PM Chris Buechler

Use binat, not nat, where IPsec NAT is configured with an address for local and NAT. Ticket #4169

d961e7e3 12/31/2014 06:22 PM Renato Botelho

Welcome 2015

16a0f334 12/31/2014 02:54 PM Renato Botelho

Add config upgrade code to make sure iketype is set, bump config version to 11.4. It fixes #4163

3cf56fb0 12/31/2014 08:02 AM Chris Buechler

Allow IPv6 on loopback even where IPv6 is otherwise disabled. The intent of that feature is to prevent IPv6 from communicating on the network. Blocking it on localhost can result in issues and is unnecessary. Ticket #4074

c8c4520a 12/31/2014 02:12 AM Chris Buechler

Only set route-to and reply-to on ESP and ISAKMP rules if the remote endpoint is not within the parent interface's subnet. Ticket #4157

430f8380 12/30/2014 11:22 PM Ermal LUÇI

Check for fqdn peerid/myids and prepend @ so strongswan does not try to be smart. Also use %any for myid instead of risking of putting the wrong value in the secrets file for traffic selector

f3106b3f 12/30/2014 11:21 PM Ermal Luçi

Check for fqdn peerid/myids and prepend @ so strongswan does not try to be smart. Also use %any for myid instead of risking of putting the wrong value in the secrets file for traffic selector

1e7d2482 12/30/2014 11:17 PM Ermal LUÇI

Oops this should be 0s rather than 00. Linked with Ticket #4158

68f0da59 12/30/2014 11:14 PM Phil Davis

ipsec_smp_dump_status get out of loop if error

when reading response from socket.
Otherwise it would be in a loop and end up like: https://forum.pfsense.org/index.php?topic=86039.msg471848#msg471848
PHP Fatal error: Maximum execution time of 900 seconds exceeded in /etc/inc/ipsec.inc on line 383...

83650c94 12/30/2014 10:52 PM Ermal Luçi

Unbreak IPsec rules generation for IPsec over CARP. Should help even Ticket #4157

c86c2b8b 12/30/2014 09:45 PM Ermal Luçi

Use base64 encoded secrets which Fixes #4158

ef0d25b3 12/30/2014 11:47 AM Phil Davis

Standardise text in priv list

55f910a3 12/29/2014 02:48 PM Phil Davis

Simplify cron array comparison

This works fine - I had not thought about how arrays are compared. Using "==" checks that the key/value pairs match in both arrays, regardless of the order the arrays happen to be in, which is what we want here.
Using "===" would insist that the key/value pairs are also in the same order in the array and that the types and everything match identically, which we do not require.

71bd5ec1 12/29/2014 02:48 PM Phil Davis

Minimise config updates when checking cron jobs

c07cd2ce 12/26/2014 03:00 PM Renato Botelho

Update /etc/ttys from new partition when upgrading nanobsd, and in this case do not call reload_ttys(). It should fix #4140

da4f9b60 12/26/2014 02:57 PM Renato Botelho

Remove unused variable

553803f4 12/24/2014 06:10 PM Ermal Luçi

Correctly call function for retrieving stats from ipfw. Fixes #4131

046d253a 12/24/2014 05:59 PM Ermal Luçi

Fixes #4130 Check for a certain size of file to start showing data on dashboard and avoiding xml parser errors

5afffea4 12/24/2014 05:47 PM Ermal Luçi

Fix displaying description for IKEv1 connected tunnels

b4997579 12/24/2014 05:22 PM Ermal Luçi

Make this function readble

43067abc 12/24/2014 11:19 AM Renato Botelho

Merge pull request #1395 from wagonza/RELENG_2_2

8b3d14bc 12/23/2014 11:03 AM Phil Davis

Allow dot at end of FQDN for a host

Redmine #4124 has discussion of this.

71ddc9ef 12/23/2014 11:02 AM Phil Davis

Pass src dst IP port through to firewall log

and IP version. So that the receiving code can easily have each pat of the IP addresses and ports, and display them as it wishes.

0000cdf7 12/22/2014 11:36 PM Warren Baker

Prevent resolvconf(8) from stomping all over our newly generated
resolv.conf and subsequent updates.

792dbafd 12/22/2014 05:07 PM Renato Botelho

Add config upgrade code to validate changes made on c2fe67eb and d269747b. It fixes #4134

fe2e680b 12/22/2014 04:20 PM Ermal Luçi

Correct ipsec status page to make connect button work

3c5af33a 12/22/2014 03:14 PM Ermal Luçi

Manually merge vpn.inc from master since cherry-picking is very messy to perform.

ad9bce2c 12/22/2014 02:33 PM Ermal Luçi

Correct issue with not reloading CP properly on calling interface configure.

d90d869e 12/22/2014 02:24 PM Ermal Luçi

Fix issue reported on https://forum.pfsense.org/index.php?topic=85737.0

1eff6ee0 12/22/2014 11:03 AM Ermal Luçi

Do not apply bw limits if the setting is not enabled in CP. Though still respect radius attributes for now with this setting. Resolves #4127

41c4ef39 12/19/2014 08:25 PM Ermal Luçi

Correct the leftsubnet specification for transport mode.

7c2a9397 12/19/2014 07:54 PM Ermal Luçi

Ooops fix this identation on final config

83aaa431 12/19/2014 06:43 PM Warren Baker

Remove option that has now been merged into infra-host-ttl.

51a2c561 12/19/2014 06:01 PM Ermal Luçi

Remove unused function

964dcb25 12/19/2014 08:34 AM Ermal Luçi

Enforce some more checking to avoid https://forum.pfsense.org/index.php?topic=85580.0

19ddaa31 12/19/2014 12:22 AM Chris Buechler

include $myid in these PSK lines. Ticket #4126

019c7b2d 12/18/2014 06:13 PM Renato Botelho

Simplify logic using a proper function as spotted by Ermal

0fcab48b 12/18/2014 03:52 PM Renato Botelho

Replace ; by newlines when upgrading custom_options from unbound packages, it's related to ticket #4090

02f65ece 12/18/2014 10:03 AM Renato Botelho

Add openvpn interfaces to group when they are created, it should fix #4110

afe81d69 12/18/2014 10:03 AM Renato Botelho

Check if interface exist before try to add it to group

55092b0e 12/17/2014 06:48 PM Renato Botelho

Bump latest_config version that I forgot on previous commit. Spotted by Jim Pingle

264d17a5 12/17/2014 06:25 PM Chris Buechler

syslogd can't just be HUPed to pick up its new config, as many of those
are command line arguments. Go back to 2.1x and prior behavior of TERM and
restart. Fixes source IP use with syslog among other config changes.

56c8376a 12/17/2014 06:17 PM Renato Botelho

Add a cron item to expire items from webConfiguratorlockout, also add config upgrade code. This fixes #4122

aafa7657 12/17/2014 05:27 PM Renato Botelho

Check if interface is disabled when configuring DHCP server. It fixes #4119

2ae99d06 12/17/2014 02:02 PM Ermal Luçi

Give the proper value for the logging level since even 0 is the correct value coming from GUI.

136217fd 12/16/2014 01:33 PM Renato Botelho

Make logic more visible as suggested by Ermal

43157c8f 12/16/2014 12:22 PM Renato Botelho

Teach interface_vip_bring_down() to deal with IP Alias over CARP

03226d75 12/15/2014 07:18 PM Renato Botelho

Use newline to separate unbound custom options during config upgrade, it should fix #4104

7dd5f0f7 12/13/2014 07:25 PM Chris Buechler

Where binding Unbound to *:53, set "interface-automatic: yes" so replies are sourced from the correct IP. Ideally this should always work this way, but setting this causes Unbound to bind to *:53, which shouldn't happen where specific interfaces are chosen. Ticket #4111

d3bf4a41 12/11/2014 09:47 PM Renato Botelho

Split ICMP and ICMPv6 types on Firewall Rules

- Remove redundant declaration of $icmptypes and move it to a common
place (filter.inc)
- Add missing ICMP types for v4
- Add ICMPv6 types
- Adjust javascripts to show correct options depending of IP Protocol...

52e97bcc 12/10/2014 11:58 AM Renato Botelho

Make sure this message is only displayed on console

c02acef2 12/10/2014 11:56 AM Renato Botelho

get_failover_interface() is already called inside get_interface_ip(v6), no need to call it twice. It should fix #4089

e2a319f3 12/08/2014 09:45 PM Renato Botelho

Use exit instead of return here, otherwise script's return code is always 0 and user with wrong password is authenticated

a4e07baf 12/05/2014 09:06 PM Chris Buechler

Disable RC4 ciphers in lighttpd

04d307d8 12/05/2014 05:39 AM Chris Buechler

dyn.dns.he.net uses a self-signed cert, disable verification for it.

514512dd 12/05/2014 05:19 AM Chris Buechler

Don't try to launch 3gstats unless it's on a valid device.

5ed9fab7 12/05/2014 05:10 AM Chris Buechler

Proper CA certificates are in place to validate SSL in these cases where it previously couldn't be, remove disabling of verification.