Project

General

Profile

Download (84.7 KB) Statistics
| Branch: | Tag: | Revision:

# Date Author Comment
faf07413 03/04/2020 09:12 PM Jim Pingle

Fix IPsec mobile user and pool references. Fixes #10296 Fixes #10314

407a5c28 02/27/2020 07:38 PM Jim Pingle

For mobile IPsec pools, use separate pool for v4 and v6. Fixes #10296

9d60be2a 02/21/2020 05:30 AM Viktor Gurov

Strip IPsec PH2 hash for AEAD ciphers. Issue #9726

f9c9899b 02/18/2020 08:30 AM Viktor Gurov

Accomodate both RADIUS and pool IP addresses in IPsec. Issue #8160

4cd9bc90 02/10/2020 03:17 PM Renato Botelho

Merge pull request #4177 from vktg/gremtu

c519b62f 02/10/2020 03:13 PM Jim Pingle

IPsec VTI IPv6 address correction. Fixes #9801

When setting up IPv6 VTI, assume /64 -- Previous code was assuming /32
which wasn't correct, and it can't be /128 either since the IPv6
addresses are not point-to-point like IPv4.

8c92a782 02/10/2020 01:30 PM Renato Botelho

Merge pull request #4188 from vktg/ipsecph2nohash

ffcfddc6 02/08/2020 05:26 PM Viktor Gurov

Fix IPsec issue if no PH2 hashes selected. Issue #9309

b08a1fa1 02/08/2020 12:03 PM Viktor Gurov

Set correct default MTU for GRE,GIF and GRE/IPsec. Issue #10222

a8287828 02/07/2020 04:17 PM Renato Botelho

Merge pull request #4165 from vktg/resolve46

d3ac1cea 01/24/2020 05:06 PM Viktor Gurov

IPsec IPv6 dynamic FQDN Remote Gateways, resolve_retry() IPv6 support. Issue #9405

f5ddbec1 01/24/2020 12:19 PM Viktor Gurov

Allow manual selection of IPsec IKE Pseudo-Random Function (PRF). Issue #9309

903826b5 01/17/2020 02:03 PM Viktor Gurov

allow to disable IPsec P1 when P2 is disabled VTI. Issue #10190

0284d79e 01/03/2020 04:37 PM Jim Pingle

This is 2020. Issue #9245

1cdd7dd2 01/03/2020 01:59 PM Jim Pingle

Revert "strip hash algo if ealgo == *gcm"

This reverts commit 1f8e92a30c1db4f96625b4591a65902492084eb3.

1f8e92a3 12/28/2019 01:41 PM Viktor Gurov

strip hash algo if ealgo == *gcm

9701089e 12/18/2019 09:27 PM Jim Pingle

Rework IPsec P1 Lifetime GUI options. Fixes #9983

f645d52a 12/16/2019 05:33 PM Viktor Gurov

Token -> PKCS#11

e194f002 12/14/2019 02:48 PM Viktor Gurov

gui renaming pkcs11 -> token + show ID

367d8609 12/14/2019 02:10 PM Viktor Gurov

cert on token check

5f143b6e 12/13/2019 08:19 PM Viktor Gurov

some progress

8c120b1f 12/07/2019 02:02 PM Viktor Gurov

conflicts resolved, needs testing

c6220dcf 12/05/2019 08:29 PM Jim Pingle

IPsec swanctl conversion. Implements #9603

  • Converted IPsec configuration code from ipsec.conf ipsec/stroke style
    to swanctl.conf swanctl/vici style. Issue #9603
  • Split up much of the single large IPsec configuration function into
    multiple functions as appropriate....
0619c2b5 11/27/2019 09:16 AM Viktor Gurov

cosmetic

0de3991f 11/27/2019 09:13 AM vktg

Merge branch 'master' into p11ipsec

2d604c8b 11/27/2019 08:57 AM Viktor Gurov

successful connection

8b859d91 11/27/2019 08:34 AM Viktor Gurov

first steps

d1f5587d 11/19/2019 04:43 PM Jim Pingle

Rename IPsec "RSA" options to "Certificate". Implements #9903

85c85e89 09/17/2019 03:52 PM Jim Pingle

Add GUI option for IPsec tunnel closeaction. Fixes #9767

21bee028 09/13/2019 03:02 PM Jim Pingle

Add IPsec DH/PFS groups 25/26/27. Implements #9757

3a73fc74 08/28/2019 05:57 PM Jim Pingle

IPsec ID type parsing changes. Fixes #9243

  • Move code to function to avoid unnecessary duplication of code
  • Clean up the logic to avoid further redundancies
  • Set keyid type to be quoted and to have its type prefixed
81f19e11 08/07/2019 07:28 PM Jim Pingle

ipsec.inc: Safety belt in case package array is missing.

a264f870 08/05/2019 04:39 PM Jim Pingle

Instead of restarting pkgs, add an IPsec reload hook they can use instead. Fixes #9668

38809d47 07/29/2019 05:50 PM Renato Botelho

Fix copyright message years to reflect BSDP -> ESF -> Netgate

3f45cc99 05/17/2019 03:44 PM Jim Pingle

Add in DH 32, a patch for strongSwan will be in soon to test with. Issue #9531

4fc26748 05/17/2019 03:06 PM Jim Pingle

Add RFC 8031 Group 31 to IPsec. Implements #9531

0b4c14a4 01/02/2019 02:50 PM Steve Beaver

Update copyright notices to 2019. Happy New Year

235c051f 06/05/2018 09:00 PM Jim Pingle

Rework how IPsec VTI interfaces and reqid specifications for same are formed. Ticket #8544

65767828 06/04/2018 06:21 PM Jim Pingle

IPsec VTI interface refinements/fixes. Ticket #8544

bd4c337c 05/30/2018 08:53 PM Jim Pingle

Please welcome routed IPsec using if_ipsec VTI interfaces. Implements #8544

To use, create a P1/P2 and set P2 to VTI using local/remote network as tunnel endpoint addresses, then assign the interface (enable, but IP type = none), and use like any other interface for routing.

62ea1dbd 04/09/2018 02:17 PM Steve Beaver

Merge pull request #3904 from Hobby-Student/master

d1f69741 02/07/2018 07:30 PM Jim Pingle

Allow Dual Stack IPsec P1 interface. Fixes #6886

Allow "Both" to be selected for IPv4/IPv6 on IPsec P1, in the config use both addresses as "left =" if they both exist.
Some cases where a single address was assumed (e.g. ping hosts) default to using the first address....

8e461d38 02/06/2018 02:56 PM christian christian

extended GUI to manage new feature

b8f91b7c 01/05/2018 01:44 PM Luiz Souza

Update the Copyright notice for pfSense.

c720e0ee 01/23/2017 08:16 PM Renato Botelho

Merge pull request #3414 from phil-davis/ipv6-compress

0be9d722 01/23/2017 01:48 PM Steve Beaver

Fixed #6967

587995fb 01/22/2017 08:28 AM Phil Davis

Always force compress when calling Net_IPv6

e470f721 01/08/2017 01:50 AM Jim Pingle

Rework how IPsec log settings are stored/retreived, adjust the default values. Implements #7007

33927941 10/29/2016 10:08 PM Pi Ba

ipsec mobile clients, don't check mobile leases if mobile client isn't enabled to begin with

81299b5c 09/06/2016 07:23 PM Renato Botelho

Move copyright from ESF to Netgate

a46e0d74 07/18/2016 04:18 AM Chris Buechler

Allow AES-GCM for P1 where using IKEv2. Ticket #5990

b12ea3fb 07/15/2016 07:30 PM Renato Botelho

Move to Apache License 2.0

c5d81585 07/15/2016 06:30 PM Renato Botelho

Review license / copyright on all files (final round)

ac24dc24 07/14/2016 09:33 PM Renato Botelho

Review license / copyright on all files (1st round)

e8c516a0 02/18/2016 12:19 PM Phil Davis

Internationalize etc inc i through s

d9901ff4 02/09/2016 11:56 PM Chris Buechler

Fix style issues.

2a5960b0 02/09/2016 09:58 PM Luiz Souza

Review of CARP uniqid changes.

It turns out that current CARP implementation is not much different from an IP alias.

This commit converts the IP alias to also use the CARP uniqid scheme, this simplify the code in all other places because now we have only two different cases to deal with:...

09221bc3 01/15/2016 01:44 PM Renato Botelho

Update license on files from /etc/inc

6aa3723a 12/15/2015 06:03 PM Renato Botelho

Remove all pfSense_MODULE and pfSense_BUILDER_BINARIES definitions, whatever was the reason they were added, it was never finished and it's not being used

4e322e2c 12/10/2015 03:09 PM Phil Davis

Code style and white space in etc

09fe7cf9 11/26/2015 02:30 AM Chris Buechler

Fix what I broke removing DES. pointy-hat-to: me

76bec1ab 11/26/2015 12:34 AM Chris Buechler

Remove GCM options from phase 1, it's only supported in P2. Remove DES while here.

fef38e5a 11/22/2015 03:37 PM Luiz Souza

Fix ipsec_enabled() to return true only when at least one of the phase 1 entries are enabled.

dc0f709e 11/22/2015 01:21 PM Luiz Souza

Convert all the occurrences of $config['ipsec']['enable'] in filter.inc, ipsec.inc and service-utils.inc

Fix ruleset when IPSEC is enabled but there are no Phase 1 entries.

Issue: #5487

c53e411f 11/11/2015 09:17 PM Matthew Smith

Fix #5350. Correct issues with strongswan logging (setting changes did not persist across reboots, setting silent did not work).

796b7651 11/10/2015 06:19 PM Renato Botelho

Change ipsec_dump_mobile() to parse regular output of ipsec leases, we are removing patch that made it to output xml

4e96112a 11/10/2015 03:14 PM Luiz Souza

Add a new function that returns the current state of IPSEC.

Whenever we have phase1 entries, IPSEC is considered enabled.

f3e15492 11/03/2015 07:57 PM Renato Botelho

A new fix for #4130:

The fix added for this bug, that check xml file size is < 200 to decide
if file must or not be read created a new issue, single entry is not
showed.

Instead of doing this, check parse_xml_config() return and return empty
array when it's -1...

1dade399 11/03/2015 06:54 PM Renato Botelho

Only call pfSense_ipsec_list_sa() when IPsec is enabled

e1c34c69 11/03/2015 01:25 PM Renato Botelho

Restore ipsec_dump_spd() accidentally removed on 7fcd5ea8bb2e7c9c94e1f38008fc3da440eb14e8. Pointy hat to: garga

7fcd5ea8 11/03/2015 11:22 AM Renato Botelho

Retire ipsec_smp_dump_status()

46bc6e54 08/25/2015 05:49 PM Renato Botelho

Move main pfSense content to src/