Project

General

Profile

Download (11.5 KB) Statistics
| Branch: | Tag: | Revision:

# Date Author Comment
48dae98c 02/21/2020 06:48 PM Jim Pingle

L2TP and PPPoE user password validation. Fixes #10275

0284d79e 01/03/2020 04:37 PM Jim Pingle

This is 2020. Issue #9245

c6220dcf 12/05/2019 08:29 PM Jim Pingle

IPsec swanctl conversion. Implements #9603

  • Converted IPsec configuration code from ipsec.conf ipsec/stroke style
    to swanctl.conf swanctl/vici style. Issue #9603
  • Split up much of the single large IPsec configuration function into
    multiple functions as appropriate....
d1f5587d 11/19/2019 04:43 PM Jim Pingle

Rename IPsec "RSA" options to "Certificate". Implements #9903

cffcf9bf 11/14/2019 08:59 PM Jim Pingle

GUI improvements for ECDSA certificate handling

  • Make central functions to check and test ECDSA compatibility. Issue #9843
  • Filter incompatible certificates from being offered for the GUI or Captive Portal. Implements #9897
  • Do the same for IPsec, which implements #4991...
f3f98e97 10/02/2019 07:11 AM Phillip Davis

Fix random typos

e9c04843 09/19/2019 11:24 AM Renato Botelho

Fix #6263: Deduplicate encryption options on ipsec.conf

On a configuration with multiple P2, all encryption options from all P2
are added to ipsec.conf. The list could have duplicated itens when
multiple P2 use the same options. Deduplicate this list.

85c85e89 09/17/2019 03:52 PM Jim Pingle

Add GUI option for IPsec tunnel closeaction. Fixes #9767

21bee028 09/13/2019 03:02 PM Jim Pingle

Add IPsec DH/PFS groups 25/26/27. Implements #9757

3a73fc74 08/28/2019 05:57 PM Jim Pingle

IPsec ID type parsing changes. Fixes #9243

  • Move code to function to avoid unnecessary duplication of code
  • Clean up the logic to avoid further redundancies
  • Set keyid type to be quoted and to have its type prefixed
38809d47 07/29/2019 05:50 PM Renato Botelho

Fix copyright message years to reflect BSDP -> ESF -> Netgate

3f45cc99 05/17/2019 03:44 PM Jim Pingle

Add in DH 32, a patch for strongSwan will be in soon to test with. Issue #9531

4fc26748 05/17/2019 03:06 PM Jim Pingle

Add RFC 8031 Group 31 to IPsec. Implements #9531

0b4c14a4 01/02/2019 02:50 PM Steve Beaver

Update copyright notices to 2019. Happy New Year

16b78f38 11/12/2018 05:04 PM Jim Pingle

Fix previous regex. Issue #9106

cc955fe6 11/12/2018 04:55 PM Jim Pingle

Replace '.' in radius name for strongSwan. Fixes #9106

5c4aa94a 11/07/2018 08:36 PM Jim Pingle

Add 0.0.0.0/0 to VTI left/rightsubnets. Fixes #8859

No negative feedback from testing, time for a wider push.

This helps with third party devices that require 0.0.0.0/0 to route
traffic on a VTI P2.

2d7ed31e 10/22/2018 05:28 PM Jim Pingle

Strictly define the EAP Identifier for custom local client entries. Fixes #9055

d145caa8 08/31/2018 02:26 PM Steve Beaver

Revise async_crypto setting

d08e8255 08/31/2018 02:08 PM Steve Beaver

Make async_crypto explicit enabled/disabled rather than current isset

74e45438 08/31/2018 01:54 PM Jim Pingle

Move IPsec VTI interface cleanup list. Fixes #8858

Generate the cleanup list before the P1 loop but after the initial
interface configuration.

b5a4633f 08/31/2018 01:22 PM Jim Pingle

Use safe_mkdir() for IPsec dirs. Fixes #8856

Simplifies the process of making IPsec dirs, though it may not correct
the original reported issue since that appears to be a disk problem,
it's still better/safer than what was done here before.

cb8443e4 08/22/2018 03:12 PM Steve Beaver

Merge pull request #3965 from Hobby-Student/master

91244542 08/08/2018 07:57 PM Jim Pingle

Add GUI control for IPsec async crypto. Implements #8772

2c3ac0b3 07/23/2018 08:39 PM Jim Pingle

Remove unneeded VTIs in IPsec sync. Issue #8674

Still needs input validation to prevent changes that would remove an
assigned interface.

07ca0162 07/13/2018 02:54 PM Stephen Jones

PHP7 initialize as array instead of string

59a5679c 07/13/2018 12:33 PM christian christian

changes to mobile ipsec dns to support new features

bbc752e1 06/20/2018 01:56 PM christian christian

fixed wrong if conditions
added support of dns server

d4b43c48 06/08/2018 03:18 PM Jim Pingle

Make IPsec IKEv2 conn IDs consistent with IKEv1 or IKEv2 split. Also fix vti test for reqid.

235c051f 06/05/2018 09:00 PM Jim Pingle

Rework how IPsec VTI interfaces and reqid specifications for same are formed. Ticket #8544

65767828 06/04/2018 06:21 PM Jim Pingle

IPsec VTI interface refinements/fixes. Ticket #8544

e8f7e051 05/31/2018 01:53 PM Jim Pingle

A couple vpn.inc refinements for VTI. Ticket #8544

50c4282d 05/31/2018 01:15 PM Jim Pingle

Add vpn.inc changes for IPsec VTI that missed the previous commit. Ticket #8544

af7c0311 04/12/2018 04:19 PM Jim Pingle

For IPsec mobile clients, write out a more specific ipsec.secrets line to help clients find the right key with strongSwan's new lookup code. Fixes #8426

62ea1dbd 04/09/2018 02:17 PM Steve Beaver

Merge pull request #3904 from Hobby-Student/master

d1f69741 02/07/2018 07:30 PM Jim Pingle

Allow Dual Stack IPsec P1 interface. Fixes #6886

Allow "Both" to be selected for IPv4/IPv6 on IPsec P1, in the config use both addresses as "left =" if they both exist.
Some cases where a single address was assumed (e.g. ping hosts) default to using the first address....

1dc6392b 02/07/2018 06:55 PM Jim Pingle

Consider IPv6 for IPsec bypasslan. Fixes #8321

8e461d38 02/06/2018 02:56 PM christian christian

extended GUI to manage new feature

6e14487b 02/06/2018 01:20 PM christian christian

supporting enhanced user management with strongswan

d205ac7a 02/02/2018 08:26 PM Steve Beaver

Merge pull request #3711 from PiBa-NL/20170427-ipsec-multiple-P1-algo

d2a8a7e7 01/23/2018 12:18 PM christian christian

first change for extending mobile connection

b8f91b7c 01/05/2018 01:44 PM Luiz Souza

Update the Copyright notice for pfSense.

fbdf0a08 01/02/2018 03:55 PM Jim Pingle

Do not make a bypasslan IPsec config block when it should be disable/empty. Fixes #8239

22dbacd0 12/22/2017 12:58 PM Pi Ba

ipsec, allow configuration of multiple ike phase1 encryption ciphers (algo/bits/hash/dh)
this is useful for mobile users that need to connect with different operating systems. This way there is no need to find a single commonly supported weaker cipher.

902a31e3 12/05/2017 03:41 PM Jim Pingle

Fix logging for L2TP and PPPoE server login/logout events. Fixes #8164

See https://redmine.pfsense.org/issues/8164 for the reasoning about why it was done this way.

7e37da2e 11/03/2017 03:27 PM Jim Pingle

When crafting the CA subject for ipsec.conf, handle component values that are arrays. Fixes #7929

ba969e67 08/12/2017 05:36 AM Luiz Souza

Fix a couple of 'route: writing to routing socket: Invalid argument' warnings during the boot.

Use the correct variable and only add the route when the hostname is resolved (if the remote address is a hostname).
route: writing to routing socket: Invalid argument

376e6f67 07/17/2017 12:14 PM hamnur

Use attribute rekey_enable as usual but optionally allow to set margintime if rekeying is not disabled

e18ddb38 07/14/2017 09:58 AM hamnur

Hide margintime if rekeying is disabled

1e0442e0 06/30/2017 08:41 AM hamnur

Activate RADIUS accounting for mobile ipsec if it was selected on the auth server view

95420116 06/29/2017 02:18 PM hamnur

Add strongswan rekeymargin attribute to vpn ipsec phase1 view

5de4b046 05/22/2017 03:50 PM Jim Pingle

Disable internal L2TP users when activating RADIUS, to follow the behavior stated in the GUI. Fixes #7561

45b5afa4 05/22/2017 03:31 PM Jim Pingle

Remove unused WINS code for L2TP. Fixes #7559

e470f721 01/08/2017 01:50 AM Jim Pingle

Rework how IPsec log settings are stored/retreived, adjust the default values. Implements #7007

ee908e93 11/08/2016 08:38 PM Pi Ba

ipsec, apply routes also for IP-aliases with carp parents

94bd7fb3 10/18/2016 01:01 PM Renato Botelho

Fix #6828

Until 2.3.x pfSense carried a patch that changed the behavior of 'route
change' command, making it add the route when it fails to change.
On 2.4 this patch was removed and will not be added back. This change
adjust PHP code to deal with route add / change and make it work...

1289c0c1 10/12/2016 07:23 PM Renato Botelho

Remove all calls to conf_mount_r* functions

81299b5c 09/06/2016 07:23 PM Renato Botelho

Move copyright from ESF to Netgate

8d50c07c 09/01/2016 06:04 PM Renato Botelho

Convert L2TP Server code to mpd5

e4191be8 09/01/2016 01:30 PM Renato Botelho

Add ng interface to pppoe group on mpd.conf and remove dead code from vpn-linkup script

2c0a3677 09/01/2016 12:23 PM Renato Botelho

Convert PPPoE Server code to mpd5

b12ea3fb 07/15/2016 07:30 PM Renato Botelho

Move to Apache License 2.0

c5d81585 07/15/2016 06:30 PM Renato Botelho

Review license / copyright on all files (final round)

ac24dc24 07/14/2016 09:33 PM Renato Botelho

Review license / copyright on all files (1st round)

9a330eff 07/10/2016 12:12 AM Chris Buechler

Remove workaround for Ticket #4754 in 2.4 since 32 bit is dead.

c81ef6e2 06/27/2016 05:00 AM Phil Davis

Always use require_once

The usage of require() and require_once() throughout the system is
inconsistent, and "bugs" come up now and then when the order of
"requires" is a bit different and some require() happens after the
include file is already included/required....

87a898b1 06/21/2016 10:10 PM Chris Buechler

require_once auth.inc in vpn.inc since it uses functions from there, though normal use of the system won't require that, those who run certain things manually/custom may require it

03de0c24 06/21/2016 08:24 PM Chris Buechler

Only omit aggressive line from ipsec.conf where IKEv2. Ticket #6513

c7759e4e 05/13/2016 01:21 PM Chris Buechler

Disable ipcomp regardless of config setting to avoid problem. Ticket #6167

b3b9c811 04/29/2016 01:19 AM Chris Buechler

Omit local identifier for mobile PSKs. Ticket #6286

7951cab4 04/23/2016 08:39 AM Chris Buechler

Use leftsendcert=always where leftcert is defined. Ticket #6082

c520e3e3 04/15/2016 02:30 AM Chris Buechler

Add lock in vpn_ipsec_configure. Ticket #6160

4225416f 03/04/2016 09:16 PM Chris Buechler

Always set ignore_acquire_ts = yes. No need for that in any of our use cases, and it fixes problems like Ticket #4719.

1e678c38 02/24/2016 02:12 PM Renato Botelho

Fix indent

51a14c58 02/19/2016 12:22 PM Phil Davis

Internationalize etc inc uvx

9d51fcde 02/18/2016 10:11 PM Chris Buechler

Add support for splitting ipsec.conf conn entries for IKEv2. Ticket #4704

54c36056 02/11/2016 08:38 AM Chris Buechler

Add support for IPsec TFC. Ticket #4688

f15f4c17 02/11/2016 07:27 AM Chris Buechler

Fix IKE version "auto". Ticket #5880

2a5960b0 02/09/2016 09:58 PM Luiz Souza

Review of CARP uniqid changes.

It turns out that current CARP implementation is not much different from an IP alias.

This commit converts the IP alias to also use the CARP uniqid scheme, this simplify the code in all other places because now we have only two different cases to deal with:...

f362c73b 02/02/2016 06:24 AM Chris Buechler

Use the NAS IP configured for PPPoE server instances. Ticket #185

1ee4cd19 01/26/2016 08:28 AM Phil Davis

Fix #5816 (re)start of IPsec

d9a17eaf 01/23/2016 08:41 AM Chris Buechler

Switch to disabling strongswan unity plugin by default. Ticket #4178

6801de75 01/22/2016 04:45 PM Jim Pingle

Somehow missed this in the committed version.

fa6e6196 01/22/2016 03:33 PM Jim Pingle

Relocate subnet mask drop-down to a more sensible place on the PPPoE server, add a user login count option.

2a44b0eb 01/20/2016 05:16 PM Renato Botelho

Fix #4178:

- Stop moving unity .so file around to make it not being loaded
- Include all modules default .conf file from strongswan.d/charon
- After default files are included, define custom settings
- When unity is disabled, add a rule to make strongswan to not load it

de985aea 01/20/2016 05:16 PM Renato Botelho

Fix strongswan.conf indent level

62fb5808 01/20/2016 05:16 PM Renato Botelho

Fix strongswan.conf indent level

09221bc3 01/15/2016 01:44 PM Renato Botelho

Update license on files from /etc/inc

c50634b5 01/12/2016 08:23 AM Stilez y

redmine 5702 - switch to high level IPv4 functions instead of low level ip2long32() etc

6aa3723a 12/15/2015 06:03 PM Renato Botelho

Remove all pfSense_MODULE and pfSense_BUILDER_BINARIES definitions, whatever was the reason they were added, it was never finished and it's not being used

4e322e2c 12/10/2015 03:09 PM Phil Davis

Code style and white space in etc

d315b341 12/05/2015 03:09 AM Chris Buechler

Run ping_hosts.sh once after IPsec start if it's enabled, to avoid a wait of up to 4 minutes for minicron to run it.

ba144b19 11/23/2015 10:24 AM Renato Botelho

Merge pull request #2103 from jlduran/escape-strongswan-radius-key

1a2de6d6 11/22/2015 03:27 PM Luiz Souza

Remove the last usage cases of $config['ipsec']['enable'].

IPSEC is always on in 2.3, where necessary (IPSEC rules, IPSEC daemon), we check the existence of phase 1 entries.

53e8d0a3 11/22/2015 12:30 AM Jose Luis Duran

Escape RADIUS secret in strongswan.conf

If a RADIUS secret is, for example, `#secret-key#`, EAP-RADIUS
authentication will fail, as the `#` can be interpreted by the
strongswan.conf parser as a comment.

To avoid this from happening, set the key within double quotes.

b0e51046 11/17/2015 04:33 PM Renato Botelho

Create symlinks when target doesn't exist, not only when it's not a link

bc771514 11/12/2015 09:47 AM Renato Botelho

Revert "Use --conf when call ipsec start/stop, this make it work with regular package, without changing sysconfdir"

It's not necessary after creating all symlinks

This reverts commit d92c10130df38e264c7c77367cf0d542d10794c0.

c53e411f 11/11/2015 09:17 PM Matthew Smith

Fix #5350. Correct issues with strongswan logging (setting changes did not persist across reboots, setting silent did not work).

680e4db5 11/11/2015 06:23 PM Renato Botelho

Make sure symlink is created

a095a1e5 11/11/2015 06:07 PM Renato Botelho

Make sure symlinks is created