summaryrefslogtreecommitdiff
path: root/sbin/isakmpd
AgeCommit message (Collapse)Author
2007-06-02safer snprintf construct with more paranoid length calculationPeter Valchev
ok millert
2007-06-01Let conf_trans_node() set all parts of the node, so that we don'tMoritz Jodeit
have to expose the node to the outside. Without this, conf_trans_node() created a node, linked it into the conf_trans queue and returned it to the caller. If something failed in one of the callers, the half-initialized node would still be linked in the queue and could get accessed later on. ok hshoexer@
2007-05-31convert to new .Dd format;Jason McIntyre
2007-05-27Don't include sys/mbuf.h it is not needed. OK mcbride@ msf@Claudio Jeker
2007-05-23Get rid of some obsolete exampels.Hans-Joerg Hoexer
ok and prodding @jmc
2007-05-07Bump crypto buffer logging (before crypto/after crypto) to level 70 fromChad Loder
level 30. This was a huge cause of log spam at level 30 and below, and is really not that useful.
2007-05-07It was possible for phase 1 negotiation to fail due to lifetime durationChad Loder
mismatch without any log message stating so. This diff makes sure that all phase 1 negotiation failures due to proposal attribute mismatch are logged. Also change these messages from LOG_NEGOTIATION debug level 70 to always be logged (not just with debug). General idea OK hshoexer, tested here in production.
2007-05-07Document "M active|passive" ui command.Joel Knight
ok jmc@ mpf@
2007-05-05Kill a log message which looks like an error message but is actuallyChad Loder
both meaningless and harmless. ("nat_t_check_vendor_payload: bad size") ok todd
2007-04-22Free allocated node in conf_set_now() before failing,Moritz Jodeit
so we do not leak memory. ok hshoexer@
2007-04-22Use conf_free_list() after calling conf_get_list().Moritz Jodeit
Otherwise we leak memory. ok ho@
2007-04-16There's no point in checking ptr for NULL before doing free(ptr)Moritz Jodeit
since free(NULL) is just fine. ok hshoexer@
2007-04-15Fix interop-issue with vpn peers that start reyking on port 4500 whenHans-Joerg Hoexer
NAT-T is used. Solves problems with cisco and openswan. Tested by todd@ (cisco interop), ok ho@ Original fix with Stefan Roth (stefan dot roth at siemens dot com), thanks!
2007-04-08Fix lint comments. s/Fall through/FALLTHROUGH/.Moritz Jodeit
ok hshoexer@
2007-04-08o Kill another strerror() from a call to log_error(),Moritz Jodeit
which already adds the errno string. o Avoid closing fd, if it's -1. o Don't replace illegal pathes with /dev/null in m_priv_local_sanitize_path(). All callers skip it anyways, in the failure case. ok hshoexer@
2007-04-02Don't append the errno string in a log_error() call,Moritz Jodeit
since it will be automatically be appended. ok hshoexer@
2007-04-02When setting all signals to their default handlers, startMoritz Jodeit
with signal 1, since there's no signal 0. ok hshoexer@
2007-04-02Don't let -r fall through to the next case block,Moritz Jodeit
if INSECURE_RAND is defined. ok hshoexer@
2007-03-26typo in initial RCS tag ($OpenBSD: -> $OpenBSD$)Pedro Martelletto
2007-03-18Fix usage of predefined lifetimes. "Default-phase-[12]-lifetime"Hans-Joerg Hoexer
just specifies the values to be used. However, the specifications are called "LIFE_MAIN_MODE" and "LIFE_QUICK_MODE". ok ho@ jmc@
2007-03-05Set pointer to NULL after freeing it, so callers ofMoritz Jodeit
key_from_printable() are not fooled into using it afterwards. OK hshoexer@
2007-03-03There may be more than one item in the subjectAltName (cropping upTom Cosgrove
with CACert certificates) so don't require the reported length to be exactly equal to the length of the data, but accept it if it's <= the length of the data (i.e. we just use the first alt name). The purpose of the check is to make sure we don't try to read beyond the data we actually have. ok cloder@ hshoexer@
2007-03-03keynote_cert_obtain should not leak in case of error. OK moritz@Chad Loder
2007-03-03Make sure we can't accidentally free() a pointer that's been acceptedTom Cosgrove
by message_add_payload(), since we are no longer responsible for it. ok cloder@ hshoexer@ moritz@
2007-03-01improve the description of -a. specifically, make it clear thatJason McIntyre
ipsec.conf users do not want to run isakmpd -a unless they are messing with manual flows; closes documentation/5399, from sthen original diff and feedback from sthen ok hshoexer
2007-02-22Add a comment that explains, why the VID of draft 2 NAT-T includesHans-Joerg Hoexer
a traling '\n'. suggested by and ok deraadt@, jmc@
2007-02-19tweak;Jason McIntyre
2007-02-19Document NULL encryption.Hans-Joerg Hoexer
2007-02-19isakmpd bits for ESP+NULL encryption. This is useful, when AH canHans-Joerg Hoexer
not be used (when being behind NAT). With Martin Hedenfalk <martin.hedenfalk at gmail.com>, thanks!
2006-12-05plug memleak, noticed by jesus@mxtelecom.comHans-Joerg Hoexer
ok moritz@, tested by jesus@mxtelecom.com (thanks!)
2006-12-05some carp/sasyncd bits from msf and myself;Jason McIntyre
ok mpf
2006-12-05Don't leak message structures, when we see unsupported payloadsMoritz Jodeit
or if the payload node allocation fails. Also adjust a comment to make it more clear, who's responsible for freeing the message structs. Input from cloder@. OK hshoexer@
2006-11-30new ui command 'rmv': removes an entry from a list, thus reversing anMarkus Friedl
'add' operation; ok ho, hshoexer, jmc eVS: ----------------------------------------------------------------------
2006-11-29no need to document generation of local.key 3 times;Jason McIntyre
spotted by mcbride, ok hshoexer;
2006-11-29zap trailing spaces;Jason McIntyre
2006-11-29Document the new location of local.pub, and clarify the fact that local.keyRyan Thomas McBride
contains the entire keypair. ok deraadt jmc
2006-11-28do not re-add existing entries; ok hshoexerMarkus Friedl
2006-11-24add support to tag ipsec traffic belonging to specific IKE-initiatedReyk Floeter
phase 2 traffic. this allows policy-based filtering of encrypted and unencrypted ipsec traffic with pf(4). see ipsec.conf(5) and isakmpd.conf(5) for details and examples. this is work in progress and still needs some testing and feedback, but it is safe to put it in now. ok hshoexer@
2006-11-09support public keys w/o SubjectPublicKeyInfo (format: BEGIN RSA PUBLIC KEY)Markus Friedl
ok ho, hshoexer
2006-10-29Fix TAILQ usage, preventing crashesPedro Martelletto
Okay henning@ krw@ millert@ hshoexer@
2006-10-18do not name FILE * variables "fd" since it is confusingTheo de Raadt
2006-10-05Reword sentence to fix grammar nit.Tom Cosgrove
ok jmc@
2006-09-19Use S_IS* macros insted of masking with S_IF* flags. The latter mayOtto Moerbeek
have multiple bits set, which leads to surprising results. Spotted by/partly from Paul Stoeber, more to come. ok ho@ miod@ hshoexer@
2006-09-15Remove "Delete-SAs" config option. This was needed for interactionHans-Joerg Hoexer
with sasyncd(8). Now sasyncd(8) controls isakmpd(8) regarding SA deletion so this option is obsolete. ok mpf jmc
2006-09-09point people towards ipsec.conf.5; after some discussion w/ reykJason McIntyre
ok hshoexer reyk
2006-09-01use shell-independent examples;Jason McIntyre
2006-09-01Add a new UI command to force isakmpd into passive only mode.Marco Pfatschbacher
Will be used by sasyncd to prevent two talking isakmpd's in an HA setup. Based on a diff by ho@. OK ho@, hshoexer@, deraadt@
2006-08-31document an issue with subjectAltName found by reyk;Jason McIntyre
ok hshoexer ho reyk
2006-08-31remove a confusing sentence; ok hshoexer hoJason McIntyre
2006-08-30fix isakmpd -Ka, as used by bgpd, or acquire flows set up via ipsecctl.Henning Brauer
acquire flows need to be recorded on the fly via connection_record_passive(), otherwise later lookups fail and the policy check fails. ok hshoexer ho markus msf deraadt