aboutsummaryrefslogtreecommitdiff
path: root/net/strongswan
Commit message (Collapse)AuthorAge
* strongswan: fix local_gateway discoveryPhilip Prindeville2021-02-16
| | | | | | | | | | | | | | | This has been observed by myself and @luizluca: ip route get is appending uid0 to the output, as seen from: root@OpenWrt2:~# ip route get 1.1.1.1 1.1.1.1 via 174.27.160.1 dev eth3 src 174.27.182.184 uid 0 cache root@OpenWrt2:~# so the fix is an anchored match, discarding all else. Also, using ip -o means never having to do multiline matches... Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* Merge pull request #14668 from pprindeville/strongswan-create-swanctl.d-dirPhilip Prindeville2021-02-09
|\ | | | | strongswan: create /etc/swanctl/conf.d directory
| * strongswan: include /etc/swanctl/conf.d/ directoryPhilip Prindeville2021-02-08
| | | | | | | | Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* | strongswan: avoid duplicate loggingPhilip Prindeville2021-02-05
|/ | | | Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* strongswan: bump to 5.9.1Stijn Tintel2020-11-30
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: bump to 5.9.0Stijn Tintel2020-09-02
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: add left and mark configuration to UCIMichael C. Bazarewsky2020-08-27
| | | | | | | | This commit allows for UCI configuration of the "left=" and the "mark=" values in a StrongSwan IPSec connection. This improves VTI support and allows certain stricter connection scenarios. Signed-off-by: Michael C. Bazarewsky <github@bazstuff.com>
* strongswan: bump to 5.8.4Stijn Tintel2020-05-08
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: move ipsec.* to strongswan-ipsecStijn Tintel2020-03-30
| | | | | | | | | | | When building with strongswan-ipsec disabled, strongswan fails to build because the ipsec.conf file does not exist. Fix this by moving the ipsec.* files and directories to the strongswan-ipsec package. Closes #10879 while keeping ipsec.conf to avoid breaking existing setups, as opposed to #11709. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: add conffiles for swanctl utilSven Roederer2020-03-25
| | | | | Add a conffiles-section for the /etc/swanctl folder, which is used by the swanctl util. This will keep the configfiles during an sysupgrade. Signed-off-by: Sven Roederer <S.Roederer@colvistec.de>
* strongswan: quote 'comment' parameter in Config.inEneas U de Queiroz2020-03-18
| | | | | | | Newer versions of the kconfig generator require quotes. Prepare the package for an eventual update. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
* strongswan: bump to 5.8.2Stijn Tintel2020-01-17
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: allow to specify per-connection reqid with UCIPaul Fertser2019-11-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is useful to assign all traffic to a fw3 zone, e.g.: /etc/config/ipsec: config remote 'test' list tunnel 'dev' ... config 'tunnel' 'dev' option reqid '33' ... /etc/config/firewall: config zone option name wan option extra_src "-m policy --pol none --dir in" option extra_dest "-m policy --pol none --dir out" ... config zone option name vpn # subnet needed for firewall3 before 22 Nov 2019, 8174814a list subnet '0.0.0.0/0' option extra_src "-m policy --pol ipsec --dir in --reqid 33" option extra_dest "-m policy --pol ipsec --dir out --reqid 33" ... Signed-off-by: Paul Fertser <fercerpav@gmail.com>
* treewide: add PKG_CPE_ID for better cvescanner coverageJan Pavlinec2019-09-17
| | | | Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
* strongswan: bump to 5.8.1Stijn Tintel2019-09-16
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* treewide: Change .*GPL.*+ licenses to SPDX compatible identifierSven Eckelmann2019-09-10
| | | | | | | | The CONTRIBUTING.md requests an (or multiple) SPDX identifier for GPL licenses. But a lot of packages did use a different, non-SPDX style with a "+" at the end instead of "-or-later". Signed-off-by: Sven Eckelmann <sven@narfation.org>
* strongswan: update to 5.8.0Lucian Cristian2019-05-23
| | | | Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
* strongswan: collapse menu itemsMoritz Warning2019-03-27
| | | | Signed-off-by: Moritz Warning <moritzwarning@web.de>
* strongswan: bump to 5.7.2Stijn Tintel2019-01-02
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: bump to 5.7.1Stijn Tintel2018-10-19
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: bump to 5.7.0Stijn Tintel2018-10-07
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: backport upstream fixes for CVEs in gmp pluginMagnus Kroken2018-10-06
| | | | | | | | | | | | | This fixes: * CVE-2018-16151 * CVE-2018-16152 * CVE-2018-17540 Details: https://strongswan.org/blog/2018/09/24/strongswan-vulnerability-(cve-2018-16151,-cve-2018-16152).html https://strongswan.org/blog/2018/10/01/strongswan-vulnerability-(cve-2018-17540).html Signed-off-by: Magnus Kroken <mkroken@gmail.com>
* strongswan: refresh patchesHans Dedecker2018-09-13
| | | | Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* strongswan: fix OpenWrt hotplug script handlingHans Dedecker2018-09-13
| | | | | | | | | | | | Commit 6cd8fcabe added ipsec hotplug script support by calling "exec /sbin/hotplug-call ipsec". Using the exec call breaks the insertion of iptables rules by the _updown.in script as hotplug-call just replaces the current shell meaning the commands following exec do not run since the shell is replaced and as a result lead to connectivity issues. Fix this by removing the exec command in front of /sbin/hotplug-call. Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* Merge pull request #6423 from micmac1/strongswan-uclibc-iconvStijn Tintel2018-08-02
|\ | | | | strongswan: fix uclibc build issue
| * strongswan: include nls.mk for mysql pluginSebastian Kemper2018-07-13
| | | | | | | | | | | | ibmariadb 10.2 needs to be linked in together with iconv. Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
* | strongswan: add openwrt hotplug script handlingFlorian Eckert2018-07-16
|/ | | | | | | | Ipsec user script (/etc/ipsec.user) now get called indirectly by openwrt "/sbin/hotplug-call". So other packages could also install their scripts in "/etc/hotplug.d/ipsec". Signed-off-by: Florian Eckert <fe@dev.tdt.de>
* strongswan: bump to 5.6.3Stijn Tintel2018-05-28
| | | | | | | | Fixes the following CVEs: - CVE-2018-5388 - CVE-2018-10811 Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: bump to 5.6.2Stijn Tintel2018-02-27
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: add interface uci listHans Dedecker2017-12-13
| | | | | | | | | | | | | The interface config option allows users to configure logical OpenWRT interface names in the ipsec section; it allows StrongSwan to listen and send traffic on specified interface(s). It translates to interfaces_use StrongSwan option which is a comma sepearted list of network devices that should be used by charon. Since StrongSwan can only be started when one of the specified logical OpenWRT interface is up procd interface triggers are installed to trigger the reload script. Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* strongswan: fix reload serviceHans Dedecker2017-12-13
| | | | | | | | | | | | Based on the ipsec running state reload_service is either reloading ipsec or starting ipsec. However in the latter case it calls ipsec start which bypasses the procd start_service function which means the running ipsec instance is not managed by procd. Fix this by calling start in case ipsec is not running; at the same time add service_running function which is used by procd provided running function. Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* strongswan: bump to 5.6.1Stijn Tintel2017-11-30
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: bump to 5.6.0Stijn Tintel2017-08-28
| | | | | | Fixes CVE-2017-11185. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: use -eq when testing booleansStijn Tintel2017-08-07
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: convert init script to procdStijn Tintel2017-08-07
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: check return value instead of outputStijn Tintel2017-08-07
| | | | | | | | | | When the strongswan service is running, `ipsec status` returns 0. Check the return value instead of checking its output. While at it, remove the [[ ]] bashism, use rereadall instead of (reread)secrets, and move it inside the if statement. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: remove checks for UCI configStijn Tintel2017-08-07
| | | | | | | | | | | In commit 36e073d8201fe7cf133ef3eea41f8855c3344c71, some checks were added to see if the UCI config file exists and if there are any peers configured in it. Due to these checks, if /etc/config/ipsec exists, but contains no enabled peers, strongswan will not be started. This is not ideal, as a user might want to experiment with the UCI config while keeping existing connections in /etc/ipsec.conf operational. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: add charon-cmd utilityStijn Tintel2017-08-07
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: add missing charon config filesStijn Tintel2017-08-07
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: add swanctl utilityStijn Tintel2017-08-07
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: add vici pluginStijn Tintel2017-08-07
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: rename -utils to -ipsecStijn Tintel2017-08-07
| | | | | | | Since the strongswan-utils package now only contains the aging ipsec utility, rename it to strongswan-ipsec. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: split scepclient into separate packageStijn Tintel2017-08-07
| | | | | | | | | | | | We currently include the SCEP client in strongswan-utils, which is a dependency of the strongswan-default meta-package. As it's generally not recommended to generate keys on embedded devices due to lack of entropy, move the SCEP client to a separate package, and only depend on it in the strongswan-full meta-package. While at it, add scepclient.conf to the package. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: split PKI tool into separate packageStijn Tintel2017-08-07
| | | | | | | | | | | | We currently include the PKI tool in strongswan-utils, which is a dependency of the strongswan-default meta-package. As it's generally not recommended to generate keys on embedded devices due to lack of entropy, move the PKI tool to a separate package, and only depend on it in the strongswan-full meta-package. While at it, add pki.conf to the package. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: fix typoStijn Tintel2017-05-30
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: add curve25519 pluginStijn Tintel2017-05-30
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: bump to 5.5.3Stijn Tintel2017-05-30
| | | | | | Fixes CVE-2017-9022, CVE-2017-9023. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* strongswan: bump to 5.5.2Stijn Tintel2017-04-26
| | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* Merge pull request #3585 from dedeckeh/strongswan_uciStijn Tintel2017-03-09
|\ | | | | strongswan: UCI support
| * strongswan: uci config supportHans Dedecker2017-01-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add support to configure strongswan via uci. uci support is based on the following sections -ipsec : Global config items belonging in the strongswan.conf file -remote : Defines the remote peer(s) -tunnel : Defines the IPSec connections in tunnel mode -transport : Defines the IPSec connections in transport mode -crypto_proposal : Defines the different crypto proposals Signed-off-by: Pierre Lebleu <pme.lebleu@gmail.com> Signed-off-by: Gino Peeters <peeters.gino@gmail.com> Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>