Project

General

Profile

Download (60 KB) Statistics
| Branch: | Tag: | Revision:

# Date Author Comment
4a762cf0 05/10/2019 07:52 PM Steve Beaver

Update copyright notices to 2019. Happy New Year

(cherry picked from commit 0b4c14a491664053aad3cc76e1ffd67b70ff2da1)

5a78cccc 11/12/2018 05:04 PM Jim Pingle

Fix previous regex. Issue #9106

(cherry picked from commit 16b78f3879bdf658274caf750c9360ec97bb8f77)

57ccb98c 11/12/2018 04:55 PM Jim Pingle

Replace '.' in radius name for strongSwan. Fixes #9106

(cherry picked from commit cc955fe63ad44b5aac66721e54965d9bc13e990c)

17dfb092 11/07/2018 08:37 PM Jim Pingle

Add 0.0.0.0/0 to VTI left/rightsubnets. Fixes #8859

No negative feedback from testing, time for a wider push.

This helps with third party devices that require 0.0.0.0/0 to route
traffic on a VTI P2.

(cherry picked from commit 5c4aa94a90256b13b19209f11e4c75b2d0e85ece)

b950e991 10/22/2018 05:29 PM Jim Pingle

Strictly define the EAP Identifier for custom local client entries. Fixes #9055

(cherry picked from commit 2d7ed31e3227566d0474929a3aed84509247f91e)

23b2c59e 09/17/2018 04:55 PM Steve Beaver

Revise async_crypto setting

d08e8255 08/31/2018 02:08 PM Steve Beaver

Make async_crypto explicit enabled/disabled rather than current isset

74e45438 08/31/2018 01:54 PM Jim Pingle

Move IPsec VTI interface cleanup list. Fixes #8858

Generate the cleanup list before the P1 loop but after the initial
interface configuration.

b5a4633f 08/31/2018 01:22 PM Jim Pingle

Use safe_mkdir() for IPsec dirs. Fixes #8856

Simplifies the process of making IPsec dirs, though it may not correct
the original reported issue since that appears to be a disk problem,
it's still better/safer than what was done here before.

cb8443e4 08/22/2018 03:12 PM Steve Beaver

Merge pull request #3965 from Hobby-Student/master

91244542 08/08/2018 07:57 PM Jim Pingle

Add GUI control for IPsec async crypto. Implements #8772

2c3ac0b3 07/23/2018 08:39 PM Jim Pingle

Remove unneeded VTIs in IPsec sync. Issue #8674

Still needs input validation to prevent changes that would remove an
assigned interface.

07ca0162 07/13/2018 02:54 PM Stephen Jones

PHP7 initialize as array instead of string

59a5679c 07/13/2018 12:33 PM christian christian

changes to mobile ipsec dns to support new features

bbc752e1 06/20/2018 01:56 PM christian christian

fixed wrong if conditions
added support of dns server

d4b43c48 06/08/2018 03:18 PM Jim Pingle

Make IPsec IKEv2 conn IDs consistent with IKEv1 or IKEv2 split. Also fix vti test for reqid.

235c051f 06/05/2018 09:00 PM Jim Pingle

Rework how IPsec VTI interfaces and reqid specifications for same are formed. Ticket #8544

65767828 06/04/2018 06:21 PM Jim Pingle

IPsec VTI interface refinements/fixes. Ticket #8544

e8f7e051 05/31/2018 01:53 PM Jim Pingle

A couple vpn.inc refinements for VTI. Ticket #8544

50c4282d 05/31/2018 01:15 PM Jim Pingle

Add vpn.inc changes for IPsec VTI that missed the previous commit. Ticket #8544

af7c0311 04/12/2018 04:19 PM Jim Pingle

For IPsec mobile clients, write out a more specific ipsec.secrets line to help clients find the right key with strongSwan's new lookup code. Fixes #8426

62ea1dbd 04/09/2018 02:17 PM Steve Beaver

Merge pull request #3904 from Hobby-Student/master

d1f69741 02/07/2018 07:30 PM Jim Pingle

Allow Dual Stack IPsec P1 interface. Fixes #6886

Allow "Both" to be selected for IPv4/IPv6 on IPsec P1, in the config use both addresses as "left =" if they both exist.
Some cases where a single address was assumed (e.g. ping hosts) default to using the first address....

1dc6392b 02/07/2018 06:55 PM Jim Pingle

Consider IPv6 for IPsec bypasslan. Fixes #8321

8e461d38 02/06/2018 02:56 PM christian christian

extended GUI to manage new feature

6e14487b 02/06/2018 01:20 PM christian christian

supporting enhanced user management with strongswan

d205ac7a 02/02/2018 08:26 PM Steve Beaver

Merge pull request #3711 from PiBa-NL/20170427-ipsec-multiple-P1-algo

d2a8a7e7 01/23/2018 12:18 PM christian christian

first change for extending mobile connection

b8f91b7c 01/05/2018 01:44 PM Luiz Souza

Update the Copyright notice for pfSense.

fbdf0a08 01/02/2018 03:55 PM Jim Pingle

Do not make a bypasslan IPsec config block when it should be disable/empty. Fixes #8239

22dbacd0 12/22/2017 12:58 PM Pi Ba

ipsec, allow configuration of multiple ike phase1 encryption ciphers (algo/bits/hash/dh)
this is useful for mobile users that need to connect with different operating systems. This way there is no need to find a single commonly supported weaker cipher.

902a31e3 12/05/2017 03:41 PM Jim Pingle

Fix logging for L2TP and PPPoE server login/logout events. Fixes #8164

See https://redmine.pfsense.org/issues/8164 for the reasoning about why it was done this way.

7e37da2e 11/03/2017 03:27 PM Jim Pingle

When crafting the CA subject for ipsec.conf, handle component values that are arrays. Fixes #7929

ba969e67 08/12/2017 05:36 AM Luiz Souza

Fix a couple of 'route: writing to routing socket: Invalid argument' warnings during the boot.

Use the correct variable and only add the route when the hostname is resolved (if the remote address is a hostname).
route: writing to routing socket: Invalid argument

376e6f67 07/17/2017 12:14 PM hamnur

Use attribute rekey_enable as usual but optionally allow to set margintime if rekeying is not disabled

e18ddb38 07/14/2017 09:58 AM hamnur

Hide margintime if rekeying is disabled

1e0442e0 06/30/2017 08:41 AM hamnur

Activate RADIUS accounting for mobile ipsec if it was selected on the auth server view

95420116 06/29/2017 02:18 PM hamnur

Add strongswan rekeymargin attribute to vpn ipsec phase1 view

5de4b046 05/22/2017 03:50 PM Jim Pingle

Disable internal L2TP users when activating RADIUS, to follow the behavior stated in the GUI. Fixes #7561

45b5afa4 05/22/2017 03:31 PM Jim Pingle

Remove unused WINS code for L2TP. Fixes #7559

e470f721 01/08/2017 01:50 AM Jim Pingle

Rework how IPsec log settings are stored/retreived, adjust the default values. Implements #7007

ee908e93 11/08/2016 08:38 PM Pi Ba

ipsec, apply routes also for IP-aliases with carp parents

94bd7fb3 10/18/2016 01:01 PM Renato Botelho

Fix #6828

Until 2.3.x pfSense carried a patch that changed the behavior of 'route
change' command, making it add the route when it fails to change.
On 2.4 this patch was removed and will not be added back. This change
adjust PHP code to deal with route add / change and make it work...

1289c0c1 10/12/2016 07:23 PM Renato Botelho

Remove all calls to conf_mount_r* functions

81299b5c 09/06/2016 07:23 PM Renato Botelho

Move copyright from ESF to Netgate

8d50c07c 09/01/2016 06:04 PM Renato Botelho

Convert L2TP Server code to mpd5

e4191be8 09/01/2016 01:30 PM Renato Botelho

Add ng interface to pppoe group on mpd.conf and remove dead code from vpn-linkup script

2c0a3677 09/01/2016 12:23 PM Renato Botelho

Convert PPPoE Server code to mpd5

b12ea3fb 07/15/2016 07:30 PM Renato Botelho

Move to Apache License 2.0

c5d81585 07/15/2016 06:30 PM Renato Botelho

Review license / copyright on all files (final round)

ac24dc24 07/14/2016 09:33 PM Renato Botelho

Review license / copyright on all files (1st round)

9a330eff 07/10/2016 12:12 AM Chris Buechler

Remove workaround for Ticket #4754 in 2.4 since 32 bit is dead.

c81ef6e2 06/27/2016 05:00 AM Phil Davis

Always use require_once

The usage of require() and require_once() throughout the system is
inconsistent, and "bugs" come up now and then when the order of
"requires" is a bit different and some require() happens after the
include file is already included/required....

87a898b1 06/21/2016 10:10 PM Chris Buechler

require_once auth.inc in vpn.inc since it uses functions from there, though normal use of the system won't require that, those who run certain things manually/custom may require it

03de0c24 06/21/2016 08:24 PM Chris Buechler

Only omit aggressive line from ipsec.conf where IKEv2. Ticket #6513

c7759e4e 05/13/2016 01:21 PM Chris Buechler

Disable ipcomp regardless of config setting to avoid problem. Ticket #6167

b3b9c811 04/29/2016 01:19 AM Chris Buechler

Omit local identifier for mobile PSKs. Ticket #6286

7951cab4 04/23/2016 08:39 AM Chris Buechler

Use leftsendcert=always where leftcert is defined. Ticket #6082

c520e3e3 04/15/2016 02:30 AM Chris Buechler

Add lock in vpn_ipsec_configure. Ticket #6160

4225416f 03/04/2016 09:16 PM Chris Buechler

Always set ignore_acquire_ts = yes. No need for that in any of our use cases, and it fixes problems like Ticket #4719.

1e678c38 02/24/2016 02:12 PM Renato Botelho

Fix indent

51a14c58 02/19/2016 12:22 PM Phil Davis

Internationalize etc inc uvx

9d51fcde 02/18/2016 10:11 PM Chris Buechler

Add support for splitting ipsec.conf conn entries for IKEv2. Ticket #4704

54c36056 02/11/2016 08:38 AM Chris Buechler

Add support for IPsec TFC. Ticket #4688

f15f4c17 02/11/2016 07:27 AM Chris Buechler

Fix IKE version "auto". Ticket #5880

2a5960b0 02/09/2016 09:58 PM Luiz Souza

Review of CARP uniqid changes.

It turns out that current CARP implementation is not much different from an IP alias.

This commit converts the IP alias to also use the CARP uniqid scheme, this simplify the code in all other places because now we have only two different cases to deal with:...

f362c73b 02/02/2016 06:24 AM Chris Buechler

Use the NAS IP configured for PPPoE server instances. Ticket #185

1ee4cd19 01/26/2016 08:28 AM Phil Davis

Fix #5816 (re)start of IPsec

d9a17eaf 01/23/2016 08:41 AM Chris Buechler

Switch to disabling strongswan unity plugin by default. Ticket #4178

6801de75 01/22/2016 04:45 PM Jim Pingle

Somehow missed this in the committed version.

fa6e6196 01/22/2016 03:33 PM Jim Pingle

Relocate subnet mask drop-down to a more sensible place on the PPPoE server, add a user login count option.

2a44b0eb 01/20/2016 05:16 PM Renato Botelho

Fix #4178:

- Stop moving unity .so file around to make it not being loaded
- Include all modules default .conf file from strongswan.d/charon
- After default files are included, define custom settings
- When unity is disabled, add a rule to make strongswan to not load it

de985aea 01/20/2016 05:16 PM Renato Botelho

Fix strongswan.conf indent level

62fb5808 01/20/2016 05:16 PM Renato Botelho

Fix strongswan.conf indent level

09221bc3 01/15/2016 01:44 PM Renato Botelho

Update license on files from /etc/inc

c50634b5 01/12/2016 08:23 AM Stilez y

redmine 5702 - switch to high level IPv4 functions instead of low level ip2long32() etc

6aa3723a 12/15/2015 06:03 PM Renato Botelho

Remove all pfSense_MODULE and pfSense_BUILDER_BINARIES definitions, whatever was the reason they were added, it was never finished and it's not being used

4e322e2c 12/10/2015 03:09 PM Phil Davis

Code style and white space in etc

d315b341 12/05/2015 03:09 AM Chris Buechler

Run ping_hosts.sh once after IPsec start if it's enabled, to avoid a wait of up to 4 minutes for minicron to run it.

ba144b19 11/23/2015 10:24 AM Renato Botelho

Merge pull request #2103 from jlduran/escape-strongswan-radius-key

1a2de6d6 11/22/2015 03:27 PM Luiz Souza

Remove the last usage cases of $config['ipsec']['enable'].

IPSEC is always on in 2.3, where necessary (IPSEC rules, IPSEC daemon), we check the existence of phase 1 entries.

53e8d0a3 11/22/2015 12:30 AM Jose Luis Duran

Escape RADIUS secret in strongswan.conf

If a RADIUS secret is, for example, `#secret-key#`, EAP-RADIUS
authentication will fail, as the `#` can be interpreted by the
strongswan.conf parser as a comment.

To avoid this from happening, set the key within double quotes.

b0e51046 11/17/2015 04:33 PM Renato Botelho

Create symlinks when target doesn't exist, not only when it's not a link

bc771514 11/12/2015 09:47 AM Renato Botelho

Revert "Use --conf when call ipsec start/stop, this make it work with regular package, without changing sysconfdir"

It's not necessary after creating all symlinks

This reverts commit d92c10130df38e264c7c77367cf0d542d10794c0.

c53e411f 11/11/2015 09:17 PM Matthew Smith

Fix #5350. Correct issues with strongswan logging (setting changes did not persist across reboots, setting silent did not work).

680e4db5 11/11/2015 06:23 PM Renato Botelho

Make sure symlink is created

a095a1e5 11/11/2015 06:07 PM Renato Botelho

Make sure symlinks is created

65ed01c5 11/11/2015 05:54 PM Renato Botelho

strongswan.d symlink was created the opposite way, pointy hat to me

03c4effd 11/11/2015 03:36 PM Renato Botelho

Create symlinks of ipsec files and directories under /usr/local to deal with hardcoded paths in strongswan

d92c1013 11/11/2015 12:38 PM Renato Botelho

Use --conf when call ipsec start/stop, this make it work with regular package, without changing sysconfdir

b37b4034 11/10/2015 12:14 PM Phil Davis

etc inc delete $Id comments

and bits of white space.
Note: There are plenty of files still with old-format copyright sections
in here.

ce0dbd72 11/03/2015 06:40 PM Matthew Smith

changes for #5219 accidentally reverted unrelated changes made by other commits. Restore those & remove some dead code that was commented out.

6684d594 11/03/2015 05:17 PM Matthew Smith

Don't allow IPsec mobile clients user auth source to not be a RADIUS server if
the phase1 auth method is EAP-RADIUS. Properly handle selection of multiple
RADIUS servers when using EAP-RADIUS. Fixes #5219.

524999ec 10/31/2015 03:21 PM Luiz Souza

It is not necessary manually disable the IPSEC processing when not used.

With the recent IPSEC changes by gnn@, there is no more performance penalty
for 1G networks if you have IPSEC compiled in kernel but not used.

TAG: tryforward

5f0b15e5 10/31/2015 03:04 PM Luiz Souza

The net.inet.ip.fastforward sysctl is retired now.

Tryforward instead, is always on and is compatible with IPSEC.

TAG: tryforward

76827b9c 10/28/2015 05:51 PM Jim Pingle

Set leftsendcert=always for IKEv2 configurations with certificates to better accommodate OS X and iOS manual configurations. Fixes #5353

41f7b662 10/21/2015 01:34 PM Matthew Smith

Make setting charon.plugins.attr.subnet conditional on net_list being set. Set
it's value to list of subnets configured as P2's for mobile IPsec. Fixes #5327.

ebd73e24 10/20/2015 09:09 PM Chris Buechler

Disable strongswan logging under auth since it's all logged under daemon,
so nothing is duplicated. Ticket #5242

9d8f66b9 10/16/2015 01:40 PM Matthew Smith

Limit strongswan trusted CA certificates to those required for authentication of
the configured IPsec SA's instead of trusting all known CA's. Fixes #5243.

a6ee1b41 10/15/2015 08:20 PM Chris Buechler

only use daemon and not auth for strongswan logging. As it was, all logs were duplicated. Ticket #5242