Project

General

Profile

Download (54.8 KB) Statistics
| Branch: | Tag: | Revision:

# Date Author Comment
ba969e67 08/12/2017 05:36 AM Luiz Souza

Fix a couple of 'route: writing to routing socket: Invalid argument' warnings during the boot.

Use the correct variable and only add the route when the hostname is resolved (if the remote address is a hostname).
route: writing to routing socket: Invalid argument

376e6f67 07/17/2017 12:14 PM hamnur

Use attribute rekey_enable as usual but optionally allow to set margintime if rekeying is not disabled

e18ddb38 07/14/2017 09:58 AM hamnur

Hide margintime if rekeying is disabled

1e0442e0 06/30/2017 08:41 AM hamnur

Activate RADIUS accounting for mobile ipsec if it was selected on the auth server view

95420116 06/29/2017 02:18 PM hamnur

Add strongswan rekeymargin attribute to vpn ipsec phase1 view

5de4b046 05/22/2017 03:50 PM Jim Pingle

Disable internal L2TP users when activating RADIUS, to follow the behavior stated in the GUI. Fixes #7561

45b5afa4 05/22/2017 03:31 PM Jim Pingle

Remove unused WINS code for L2TP. Fixes #7559

e470f721 01/08/2017 01:50 AM Jim Pingle

Rework how IPsec log settings are stored/retreived, adjust the default values. Implements #7007

ee908e93 11/08/2016 08:38 PM Pi Ba

ipsec, apply routes also for IP-aliases with carp parents

94bd7fb3 10/18/2016 01:01 PM Renato Botelho

Fix #6828

Until 2.3.x pfSense carried a patch that changed the behavior of 'route
change' command, making it add the route when it fails to change.
On 2.4 this patch was removed and will not be added back. This change
adjust PHP code to deal with route add / change and make it work...

1289c0c1 10/12/2016 07:23 PM Renato Botelho

Remove all calls to conf_mount_r* functions

81299b5c 09/06/2016 07:23 PM Renato Botelho

Move copyright from ESF to Netgate

8d50c07c 09/01/2016 06:04 PM Renato Botelho

Convert L2TP Server code to mpd5

e4191be8 09/01/2016 01:30 PM Renato Botelho

Add ng interface to pppoe group on mpd.conf and remove dead code from vpn-linkup script

2c0a3677 09/01/2016 12:23 PM Renato Botelho

Convert PPPoE Server code to mpd5

b12ea3fb 07/15/2016 07:30 PM Renato Botelho

Move to Apache License 2.0

c5d81585 07/15/2016 06:30 PM Renato Botelho

Review license / copyright on all files (final round)

ac24dc24 07/14/2016 09:33 PM Renato Botelho

Review license / copyright on all files (1st round)

9a330eff 07/10/2016 12:12 AM Chris Buechler

Remove workaround for Ticket #4754 in 2.4 since 32 bit is dead.

c81ef6e2 06/27/2016 05:00 AM Phil Davis

Always use require_once

The usage of require() and require_once() throughout the system is
inconsistent, and "bugs" come up now and then when the order of
"requires" is a bit different and some require() happens after the
include file is already included/required....

87a898b1 06/21/2016 10:10 PM Chris Buechler

require_once auth.inc in vpn.inc since it uses functions from there, though normal use of the system won't require that, those who run certain things manually/custom may require it

03de0c24 06/21/2016 08:24 PM Chris Buechler

Only omit aggressive line from ipsec.conf where IKEv2. Ticket #6513

c7759e4e 05/13/2016 01:21 PM Chris Buechler

Disable ipcomp regardless of config setting to avoid problem. Ticket #6167

b3b9c811 04/29/2016 01:19 AM Chris Buechler

Omit local identifier for mobile PSKs. Ticket #6286

7951cab4 04/23/2016 08:39 AM Chris Buechler

Use leftsendcert=always where leftcert is defined. Ticket #6082

c520e3e3 04/15/2016 02:30 AM Chris Buechler

Add lock in vpn_ipsec_configure. Ticket #6160

4225416f 03/04/2016 09:16 PM Chris Buechler

Always set ignore_acquire_ts = yes. No need for that in any of our use cases, and it fixes problems like Ticket #4719.

1e678c38 02/24/2016 02:12 PM Renato Botelho

Fix indent

51a14c58 02/19/2016 12:22 PM Phil Davis

Internationalize etc inc uvx

9d51fcde 02/18/2016 10:11 PM Chris Buechler

Add support for splitting ipsec.conf conn entries for IKEv2. Ticket #4704

54c36056 02/11/2016 08:38 AM Chris Buechler

Add support for IPsec TFC. Ticket #4688

f15f4c17 02/11/2016 07:27 AM Chris Buechler

Fix IKE version "auto". Ticket #5880

2a5960b0 02/09/2016 09:58 PM Luiz Souza

Review of CARP uniqid changes.

It turns out that current CARP implementation is not much different from an IP alias.

This commit converts the IP alias to also use the CARP uniqid scheme, this simplify the code in all other places because now we have only two different cases to deal with:...

f362c73b 02/02/2016 06:24 AM Chris Buechler

Use the NAS IP configured for PPPoE server instances. Ticket #185

1ee4cd19 01/26/2016 08:28 AM Phil Davis

Fix #5816 (re)start of IPsec

d9a17eaf 01/23/2016 08:41 AM Chris Buechler

Switch to disabling strongswan unity plugin by default. Ticket #4178

6801de75 01/22/2016 04:45 PM Jim Pingle

Somehow missed this in the committed version.

fa6e6196 01/22/2016 03:33 PM Jim Pingle

Relocate subnet mask drop-down to a more sensible place on the PPPoE server, add a user login count option.

2a44b0eb 01/20/2016 05:16 PM Renato Botelho

Fix #4178:

- Stop moving unity .so file around to make it not being loaded
- Include all modules default .conf file from strongswan.d/charon
- After default files are included, define custom settings
- When unity is disabled, add a rule to make strongswan to not load it

de985aea 01/20/2016 05:16 PM Renato Botelho

Fix strongswan.conf indent level

62fb5808 01/20/2016 05:16 PM Renato Botelho

Fix strongswan.conf indent level

09221bc3 01/15/2016 01:44 PM Renato Botelho

Update license on files from /etc/inc

c50634b5 01/12/2016 08:23 AM Stilez y

redmine 5702 - switch to high level IPv4 functions instead of low level ip2long32() etc

6aa3723a 12/15/2015 06:03 PM Renato Botelho

Remove all pfSense_MODULE and pfSense_BUILDER_BINARIES definitions, whatever was the reason they were added, it was never finished and it's not being used

4e322e2c 12/10/2015 03:09 PM Phil Davis

Code style and white space in etc

d315b341 12/05/2015 03:09 AM Chris Buechler

Run ping_hosts.sh once after IPsec start if it's enabled, to avoid a wait of up to 4 minutes for minicron to run it.

ba144b19 11/23/2015 10:24 AM Renato Botelho

Merge pull request #2103 from jlduran/escape-strongswan-radius-key

1a2de6d6 11/22/2015 03:27 PM Luiz Souza

Remove the last usage cases of $config['ipsec']['enable'].

IPSEC is always on in 2.3, where necessary (IPSEC rules, IPSEC daemon), we check the existence of phase 1 entries.

53e8d0a3 11/22/2015 12:30 AM Jose Luis Duran

Escape RADIUS secret in strongswan.conf

If a RADIUS secret is, for example, `#secret-key#`, EAP-RADIUS
authentication will fail, as the `#` can be interpreted by the
strongswan.conf parser as a comment.

To avoid this from happening, set the key within double quotes.

b0e51046 11/17/2015 04:33 PM Renato Botelho

Create symlinks when target doesn't exist, not only when it's not a link

bc771514 11/12/2015 09:47 AM Renato Botelho

Revert "Use --conf when call ipsec start/stop, this make it work with regular package, without changing sysconfdir"

It's not necessary after creating all symlinks

This reverts commit d92c10130df38e264c7c77367cf0d542d10794c0.

c53e411f 11/11/2015 09:17 PM Matthew Smith

Fix #5350. Correct issues with strongswan logging (setting changes did not persist across reboots, setting silent did not work).

680e4db5 11/11/2015 06:23 PM Renato Botelho

Make sure symlink is created

a095a1e5 11/11/2015 06:07 PM Renato Botelho

Make sure symlinks is created

65ed01c5 11/11/2015 05:54 PM Renato Botelho

strongswan.d symlink was created the opposite way, pointy hat to me

03c4effd 11/11/2015 03:36 PM Renato Botelho

Create symlinks of ipsec files and directories under /usr/local to deal with hardcoded paths in strongswan

d92c1013 11/11/2015 12:38 PM Renato Botelho

Use --conf when call ipsec start/stop, this make it work with regular package, without changing sysconfdir

b37b4034 11/10/2015 12:14 PM Phil Davis

etc inc delete $Id comments

and bits of white space.
Note: There are plenty of files still with old-format copyright sections
in here.

ce0dbd72 11/03/2015 06:40 PM Matthew Smith

changes for #5219 accidentally reverted unrelated changes made by other commits. Restore those & remove some dead code that was commented out.

6684d594 11/03/2015 05:17 PM Matthew Smith

Don't allow IPsec mobile clients user auth source to not be a RADIUS server if
the phase1 auth method is EAP-RADIUS. Properly handle selection of multiple
RADIUS servers when using EAP-RADIUS. Fixes #5219.

524999ec 10/31/2015 03:21 PM Luiz Souza

It is not necessary manually disable the IPSEC processing when not used.

With the recent IPSEC changes by gnn@, there is no more performance penalty
for 1G networks if you have IPSEC compiled in kernel but not used.

TAG: tryforward

5f0b15e5 10/31/2015 03:04 PM Luiz Souza

The net.inet.ip.fastforward sysctl is retired now.

Tryforward instead, is always on and is compatible with IPSEC.

TAG: tryforward

76827b9c 10/28/2015 05:51 PM Jim Pingle

Set leftsendcert=always for IKEv2 configurations with certificates to better accommodate OS X and iOS manual configurations. Fixes #5353

41f7b662 10/21/2015 01:34 PM Matthew Smith

Make setting charon.plugins.attr.subnet conditional on net_list being set. Set
it's value to list of subnets configured as P2's for mobile IPsec. Fixes #5327.

ebd73e24 10/20/2015 09:09 PM Chris Buechler

Disable strongswan logging under auth since it's all logged under daemon,
so nothing is duplicated. Ticket #5242

9d8f66b9 10/16/2015 01:40 PM Matthew Smith

Limit strongswan trusted CA certificates to those required for authentication of
the configured IPsec SA's instead of trusting all known CA's. Fixes #5243.

a6ee1b41 10/15/2015 08:20 PM Chris Buechler

only use daemon and not auth for strongswan logging. As it was, all logs were duplicated. Ticket #5242

7a7e1ba9 10/15/2015 03:30 PM Matthew Smith

Set rightca for IPsec phase 1 using Mutual RSA, Mutual RSA + xauth, or EAP-TLS. Fixes #5241.

92c57679 10/14/2015 03:14 PM Matthew Smith

Merge pull request #1689 from jlduran/l2tp-mschapv2

96d5ca11 10/13/2015 03:05 AM Chris Buechler

Remove strongswan's cert directories and repopulate them, to ensure no removed CAs, certs, or CRLs remain. Ticket #5238

31630f47 10/13/2015 02:49 AM Chris Buechler

Fix up strongswan logging levels. Remove charondebug since strongswan.conf settings take precedence. Set logging levels in strongswan.conf to match what's set on a running system via 'ipsec stroke loglevel', and remove log levels that were hard coded in strongswan.conf. Ticket #5242

7b1e6c3a 10/07/2015 08:30 PM Matthew Smith

https://redmine.pfsense.org/issues/5207
change auth methods for both peers when using hybrid RSA + xauth with IKEv1

446db735 10/07/2015 08:22 PM Matthew Smith

Add support for an IPv6 pool for mobile clients.

41d968bd 10/02/2015 05:14 AM Chris Buechler

Specify PSK for mobile configurations without the leading ID selectors. Fixes PSK mismatches from iOS clients.

86330e2b 10/01/2015 07:02 PM Jim Pingle

When using eap-radius, if the virtual address pool is left blank, pull the IP addresses from RADIUS instead. (Will need an IP address defined for each account.)
Doesn't seem to be possible to pull from either RADIUS or a local pool that I can see from experimenting and looking at strongSwan's docs.

a83fce46 10/01/2015 06:23 PM Chris Buechler

Specify %any where identifier is "any", so the note on these pages
actually works.

3fac0afc 09/22/2015 09:01 AM Jose Luis Duran

Add MS-CHAPv2 option to L2TP Configuration

See [#4732](https://redmine.pfsense.org/issues/4732)

adc70099 09/21/2015 07:36 PM Renato Botelho

Merge pull request #1750 from TarasSavchuk/patch-1

d10e5e90 09/21/2015 06:02 PM Renato Botelho

Merge pull request #1808 from miken32/master

6990ad35 09/16/2015 08:58 AM Phil Davis

White space and minor bits in etc

Cleaner version of https://github.com/pfsense/pfsense/pull/1846

c9d46a8e 09/15/2015 09:20 PM Renato Botelho

Retire PPTP server, fixes #4226:

- Remove PPTP server and all related code
- Bump config version 12.2
- Write upgrade config code to remove pptpd section and also cleanup
firewall and NAT rules using PPTP interface or src/des

46bc6e54 08/25/2015 05:49 PM Renato Botelho

Move main pfSense content to src/