Compare commits
5 Commits
frr-8.4.1-
...
f31-st
| Author | SHA1 | Date | |
|---|---|---|---|
| eeb9dbf200 | |||
| 9eaa8d24f1 | |||
|
|
503dfb41a6 | ||
|
|
4081692c17 | ||
|
|
ca85912ffe |
1
.gitignore
vendored
1
.gitignore
vendored
@@ -1 +1,2 @@
|
|||||||
/frr-7.1.tar.gz
|
/frr-7.1.tar.gz
|
||||||
|
/frr-7.2.tar.gz
|
||||||
|
|||||||
@@ -12,9 +12,9 @@ index 5be3264..33abc1d 100644
|
|||||||
include sharpd/subdir.am
|
include sharpd/subdir.am
|
||||||
include pimd/subdir.am
|
include pimd/subdir.am
|
||||||
@@ -182,7 +180,6 @@ EXTRA_DIST += \
|
@@ -182,7 +180,6 @@ EXTRA_DIST += \
|
||||||
|
snapcraft/defaults \
|
||||||
snapcraft/helpers \
|
snapcraft/helpers \
|
||||||
snapcraft/snap \
|
snapcraft/snap \
|
||||||
\
|
|
||||||
- babeld/Makefile \
|
- babeld/Makefile \
|
||||||
bgpd/Makefile \
|
bgpd/Makefile \
|
||||||
bgpd/rfp-example/librfp/Makefile \
|
bgpd/rfp-example/librfp/Makefile \
|
||||||
|
|||||||
@@ -0,0 +1,68 @@
|
|||||||
|
From 1280a299c696ed925d02ad93d1af9af9dcf43621 Mon Sep 17 00:00:00 2001
|
||||||
|
From: root <root@dm4.st.test2.hr>
|
||||||
|
Date: Sat, 25 Jan 2020 19:38:39 +0100
|
||||||
|
Subject: [PATCH] nhrp: Configure vici socket path using configure
|
||||||
|
--with-vici-socket=/var/run/charon.vici (default)
|
||||||
|
|
||||||
|
---
|
||||||
|
configure.ac | 8 ++++++++
|
||||||
|
nhrpd/README.nhrpd | 3 ++-
|
||||||
|
nhrpd/vici.c | 2 +-
|
||||||
|
3 files changed, 11 insertions(+), 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/configure.ac b/configure.ac
|
||||||
|
index c8371f304..2ef1c3fea 100755
|
||||||
|
--- a/configure.ac
|
||||||
|
+++ b/configure.ac
|
||||||
|
@@ -139,6 +139,13 @@ AC_ARG_WITH([yangmodelsdir], [AS_HELP_STRING([--with-yangmodelsdir=DIR], [yang m
|
||||||
|
])
|
||||||
|
AC_SUBST([yangmodelsdir])
|
||||||
|
|
||||||
|
+AC_ARG_WITH([vici-socket], [AS_HELP_STRING([--with-vici-socket=DIR], [vici-socket (/var/run/charon.vici)])], [
|
||||||
|
+ vici_socket="$withval"
|
||||||
|
+], [
|
||||||
|
+ vici_socket="/var/run/charon.vici"
|
||||||
|
+])
|
||||||
|
+AC_DEFINE_UNQUOTED([VICI_SOCKET], ["$vici_socket"], [StrongSWAN vici interface])
|
||||||
|
+
|
||||||
|
AC_ARG_ENABLE(tcmalloc,
|
||||||
|
AS_HELP_STRING([--enable-tcmalloc], [Turn on tcmalloc]),
|
||||||
|
[case "${enableval}" in
|
||||||
|
@@ -2410,6 +2417,7 @@ group for vty sockets : ${enable_vty_group}
|
||||||
|
config file mask : ${enable_configfile_mask}
|
||||||
|
log file mask : ${enable_logfile_mask}
|
||||||
|
zebra protobuf enabled : ${enable_protobuf:-no}
|
||||||
|
+vici socket path : ${vici_socket}
|
||||||
|
|
||||||
|
The above user and group must have read/write access to the state file
|
||||||
|
directory and to the config files in the config file directory."
|
||||||
|
diff --git a/nhrpd/README.nhrpd b/nhrpd/README.nhrpd
|
||||||
|
index 569b3f446..8bb5f69be 100644
|
||||||
|
--- a/nhrpd/README.nhrpd
|
||||||
|
+++ b/nhrpd/README.nhrpd
|
||||||
|
@@ -126,7 +126,8 @@ Integration with strongSwan
|
||||||
|
|
||||||
|
Contrary to opennhrp, Quagga/NHRP has tight integration with IKE daemon.
|
||||||
|
Currently strongSwan is supported using the VICI protocol. strongSwan
|
||||||
|
-is connected using UNIX socket (hardcoded now as /var/run/charon.vici).
|
||||||
|
+is connected using UNIX socket (default /var/run/charon.vici use configure
|
||||||
|
+argument --with-vici-socket= to change).
|
||||||
|
Thus nhrpd needs to be run as user that can open that file.
|
||||||
|
|
||||||
|
Currently, you will need patched strongSwan. The working tree is at:
|
||||||
|
diff --git a/nhrpd/vici.c b/nhrpd/vici.c
|
||||||
|
index d6105b71d..86023e1f8 100644
|
||||||
|
--- a/nhrpd/vici.c
|
||||||
|
+++ b/nhrpd/vici.c
|
||||||
|
@@ -478,7 +478,7 @@ static int vici_reconnect(struct thread *t)
|
||||||
|
if (vici->fd >= 0)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
- fd = sock_open_unix("/var/run/charon.vici");
|
||||||
|
+ fd = sock_open_unix(VICI_SOCKET);
|
||||||
|
if (fd < 0) {
|
||||||
|
debugf(NHRP_DEBUG_VICI,
|
||||||
|
"%s: failure connecting VICI socket: %s",
|
||||||
|
--
|
||||||
|
2.24.1
|
||||||
|
|
||||||
78
0002-enable-openssl.patch
Normal file
78
0002-enable-openssl.patch
Normal file
@@ -0,0 +1,78 @@
|
|||||||
|
diff --git a/lib/subdir.am b/lib/subdir.am
|
||||||
|
index 0b7af18..0533e24 100644
|
||||||
|
--- a/lib/subdir.am
|
||||||
|
+++ b/lib/subdir.am
|
||||||
|
@@ -41,7 +41,6 @@ lib_libfrr_la_SOURCES = \
|
||||||
|
lib/linklist.c \
|
||||||
|
lib/log.c \
|
||||||
|
lib/log_vty.c \
|
||||||
|
- lib/md5.c \
|
||||||
|
lib/memory.c \
|
||||||
|
lib/memory_vty.c \
|
||||||
|
lib/mlag.c \
|
||||||
|
@@ -64,7 +64,6 @@ lib_libfrr_la_SOURCES = \
|
||||||
|
lib/routemap.c \
|
||||||
|
lib/sbuf.c \
|
||||||
|
lib/seqlock.c \
|
||||||
|
- lib/sha256.c \
|
||||||
|
lib/sigevent.c \
|
||||||
|
lib/skiplist.c \
|
||||||
|
lib/sockopt.c \
|
||||||
|
@@ -170,7 +170,6 @@ pkginclude_HEADERS += \
|
||||||
|
lib/linklist.h \
|
||||||
|
lib/log.h \
|
||||||
|
lib/log_vty.h \
|
||||||
|
- lib/md5.h \
|
||||||
|
lib/memory.h \
|
||||||
|
lib/memory_vty.h \
|
||||||
|
lib/module.h \
|
||||||
|
@@ -191,7 +190,6 @@ pkginclude_HEADERS += \
|
||||||
|
lib/routemap.h \
|
||||||
|
lib/sbuf.h \
|
||||||
|
lib/seqlock.h \
|
||||||
|
- lib/sha256.h \
|
||||||
|
lib/sigevent.h \
|
||||||
|
lib/skiplist.h \
|
||||||
|
lib/smux.h \
|
||||||
|
diff --git a/isisd/isis_lsp.c b/isisd/isis_lsp.c
|
||||||
|
index 1991666..2e4fe55 100644
|
||||||
|
--- a/isisd/isis_lsp.c
|
||||||
|
+++ b/isisd/isis_lsp.c
|
||||||
|
@@ -35,7 +35,9 @@
|
||||||
|
#include "hash.h"
|
||||||
|
#include "if.h"
|
||||||
|
#include "checksum.h"
|
||||||
|
+#ifdef CRYPTO_INTERNAL
|
||||||
|
#include "md5.h"
|
||||||
|
+#endif
|
||||||
|
#include "table.h"
|
||||||
|
#include "srcdest_table.h"
|
||||||
|
#include "lib_errors.h"
|
||||||
|
diff --git a/isisd/isis_pdu.c b/isisd/isis_pdu.c
|
||||||
|
index 9c63311..7cf594c 100644
|
||||||
|
--- a/isisd/isis_pdu.c
|
||||||
|
+++ b/isisd/isis_pdu.c
|
||||||
|
@@ -33,7 +33,9 @@
|
||||||
|
#include "prefix.h"
|
||||||
|
#include "if.h"
|
||||||
|
#include "checksum.h"
|
||||||
|
+#ifdef CRYPTO_INTERNAL
|
||||||
|
#include "md5.h"
|
||||||
|
+#endif
|
||||||
|
#include "lib_errors.h"
|
||||||
|
|
||||||
|
#include "isisd/isis_constants.h"
|
||||||
|
diff --git a/isisd/isis_te.c b/isisd/isis_te.c
|
||||||
|
index 4ea6c2c..72ff0d2 100644
|
||||||
|
--- a/isisd/isis_te.c
|
||||||
|
+++ b/isisd/isis_te.c
|
||||||
|
@@ -38,7 +38,9 @@
|
||||||
|
#include "if.h"
|
||||||
|
#include "vrf.h"
|
||||||
|
#include "checksum.h"
|
||||||
|
+#ifdef CRYPTO_INTERNAL
|
||||||
|
#include "md5.h"
|
||||||
|
+#endif
|
||||||
|
#include "sockunion.h"
|
||||||
|
#include "network.h"
|
||||||
|
#include "sbuf.h"
|
||||||
252
0003-disable-eigrp-crypto.patch
Normal file
252
0003-disable-eigrp-crypto.patch
Normal file
@@ -0,0 +1,252 @@
|
|||||||
|
diff --git a/eigrpd/eigrp_packet.c b/eigrpd/eigrp_packet.c
|
||||||
|
index bedaf15..8dc09bf 100644
|
||||||
|
--- a/eigrpd/eigrp_packet.c
|
||||||
|
+++ b/eigrpd/eigrp_packet.c
|
||||||
|
@@ -40,8 +40,10 @@
|
||||||
|
#include "log.h"
|
||||||
|
#include "sockopt.h"
|
||||||
|
#include "checksum.h"
|
||||||
|
+#ifdef CRYPTO_INTERNAL
|
||||||
|
#include "md5.h"
|
||||||
|
#include "sha256.h"
|
||||||
|
+#endif
|
||||||
|
#include "lib_errors.h"
|
||||||
|
|
||||||
|
#include "eigrpd/eigrp_structs.h"
|
||||||
|
@@ -95,8 +97,12 @@ int eigrp_make_md5_digest(struct eigrp_interface *ei, struct stream *s,
|
||||||
|
struct key *key = NULL;
|
||||||
|
struct keychain *keychain;
|
||||||
|
|
||||||
|
+
|
||||||
|
unsigned char digest[EIGRP_AUTH_TYPE_MD5_LEN];
|
||||||
|
+#ifdef CRYPTO_OPENSSL
|
||||||
|
+#elif CRYPTO_INTERNAL
|
||||||
|
MD5_CTX ctx;
|
||||||
|
+#endif
|
||||||
|
uint8_t *ibuf;
|
||||||
|
size_t backup_get, backup_end;
|
||||||
|
struct TLV_MD5_Authentication_Type *auth_TLV;
|
||||||
|
@@ -119,6 +125,9 @@ int eigrp_make_md5_digest(struct eigrp_interface *ei, struct stream *s,
|
||||||
|
return EIGRP_AUTH_TYPE_NONE;
|
||||||
|
}
|
||||||
|
|
||||||
|
+#ifdef CRYPTO_OPENSSL
|
||||||
|
+//TBD when this is fixed in upstream
|
||||||
|
+#elif CRYPTO_INTERNAL
|
||||||
|
memset(&ctx, 0, sizeof(ctx));
|
||||||
|
MD5Init(&ctx);
|
||||||
|
|
||||||
|
@@ -146,7 +155,7 @@ int eigrp_make_md5_digest(struct eigrp_interface *ei, struct stream *s,
|
||||||
|
}
|
||||||
|
|
||||||
|
MD5Final(digest, &ctx);
|
||||||
|
-
|
||||||
|
+#endif
|
||||||
|
/* Append md5 digest to the end of the stream. */
|
||||||
|
memcpy(auth_TLV->digest, digest, EIGRP_AUTH_TYPE_MD5_LEN);
|
||||||
|
|
||||||
|
@@ -162,7 +171,10 @@ int eigrp_check_md5_digest(struct stream *s,
|
||||||
|
struct TLV_MD5_Authentication_Type *authTLV,
|
||||||
|
struct eigrp_neighbor *nbr, uint8_t flags)
|
||||||
|
{
|
||||||
|
+#ifdef CRYPTO_OPENSSL
|
||||||
|
+#elif CRYPTO_INTERNAL
|
||||||
|
MD5_CTX ctx;
|
||||||
|
+#endif
|
||||||
|
unsigned char digest[EIGRP_AUTH_TYPE_MD5_LEN];
|
||||||
|
unsigned char orig[EIGRP_AUTH_TYPE_MD5_LEN];
|
||||||
|
struct key *key = NULL;
|
||||||
|
@@ -203,6 +215,9 @@ int eigrp_check_md5_digest(struct stream *s,
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
+#ifdef CRYPTO_OPENSSL
|
||||||
|
+ //TBD when eigrpd crypto is fixed in upstream
|
||||||
|
+#elif CRYPTO_INTERNAL
|
||||||
|
memset(&ctx, 0, sizeof(ctx));
|
||||||
|
MD5Init(&ctx);
|
||||||
|
|
||||||
|
@@ -230,6 +245,7 @@ int eigrp_check_md5_digest(struct stream *s,
|
||||||
|
}
|
||||||
|
|
||||||
|
MD5Final(digest, &ctx);
|
||||||
|
+#endif
|
||||||
|
|
||||||
|
/* compare the two */
|
||||||
|
if (memcmp(orig, digest, EIGRP_AUTH_TYPE_MD5_LEN) != 0) {
|
||||||
|
@@ -254,7 +270,11 @@ int eigrp_make_sha256_digest(struct eigrp_interface *ei, struct stream *s,
|
||||||
|
unsigned char digest[EIGRP_AUTH_TYPE_SHA256_LEN];
|
||||||
|
unsigned char buffer[1 + PLAINTEXT_LENGTH + 45 + 1] = {0};
|
||||||
|
|
||||||
|
+#ifdef CRYPTO_OPENSSL
|
||||||
|
+ //TBD when eigrpd crypto is fixed in upstream
|
||||||
|
+#elif CRYPTO_INTERNAL
|
||||||
|
HMAC_SHA256_CTX ctx;
|
||||||
|
+#endif
|
||||||
|
void *ibuf;
|
||||||
|
size_t backup_get, backup_end;
|
||||||
|
struct TLV_SHA256_Authentication_Type *auth_TLV;
|
||||||
|
@@ -283,6 +303,9 @@ int eigrp_make_sha256_digest(struct eigrp_interface *ei, struct stream *s,
|
||||||
|
|
||||||
|
inet_ntop(AF_INET, &ei->address.u.prefix4, source_ip, PREFIX_STRLEN);
|
||||||
|
|
||||||
|
+#ifdef CRYPTO_OPENSSL
|
||||||
|
+ //TBD when eigrpd crypto is fixed in upstream
|
||||||
|
+#elif CRYPTO_INTERNAL
|
||||||
|
memset(&ctx, 0, sizeof(ctx));
|
||||||
|
buffer[0] = '\n';
|
||||||
|
memcpy(buffer + 1, key, strlen(key->string));
|
||||||
|
@@ -291,7 +314,7 @@ int eigrp_make_sha256_digest(struct eigrp_interface *ei, struct stream *s,
|
||||||
|
1 + strlen(key->string) + strlen(source_ip));
|
||||||
|
HMAC__SHA256_Update(&ctx, ibuf, strlen(ibuf));
|
||||||
|
HMAC__SHA256_Final(digest, &ctx);
|
||||||
|
-
|
||||||
|
+#endif
|
||||||
|
|
||||||
|
/* Put hmac-sha256 digest to it's place */
|
||||||
|
memcpy(auth_TLV->digest, digest, EIGRP_AUTH_TYPE_SHA256_LEN);
|
||||||
|
diff --git a/eigrpd/eigrp_filter.c b/eigrpd/eigrp_filter.c
|
||||||
|
index 93eed94..f1c7347 100644
|
||||||
|
--- a/eigrpd/eigrp_filter.c
|
||||||
|
+++ b/eigrpd/eigrp_filter.c
|
||||||
|
@@ -47,7 +47,9 @@
|
||||||
|
#include "if_rmap.h"
|
||||||
|
#include "plist.h"
|
||||||
|
#include "distribute.h"
|
||||||
|
+#ifdef CRYPTO_INTERNAL
|
||||||
|
#include "md5.h"
|
||||||
|
+#endif
|
||||||
|
#include "keychain.h"
|
||||||
|
#include "privs.h"
|
||||||
|
#include "vrf.h"
|
||||||
|
diff --git a/eigrpd/eigrp_hello.c b/eigrpd/eigrp_hello.c
|
||||||
|
index dacd5ca..b232cc5 100644
|
||||||
|
--- a/eigrpd/eigrp_hello.c
|
||||||
|
+++ b/eigrpd/eigrp_hello.c
|
||||||
|
@@ -43,7 +43,9 @@
|
||||||
|
#include "sockopt.h"
|
||||||
|
#include "checksum.h"
|
||||||
|
#include "vty.h"
|
||||||
|
+#ifdef CRYPTO_INTERNAL
|
||||||
|
#include "md5.h"
|
||||||
|
+#endif
|
||||||
|
|
||||||
|
#include "eigrpd/eigrp_structs.h"
|
||||||
|
#include "eigrpd/eigrpd.h"
|
||||||
|
diff --git a/eigrpd/eigrp_query.c b/eigrpd/eigrp_query.c
|
||||||
|
index 84dcf5e..a2575e3 100644
|
||||||
|
--- a/eigrpd/eigrp_query.c
|
||||||
|
+++ b/eigrpd/eigrp_query.c
|
||||||
|
@@ -38,7 +38,9 @@
|
||||||
|
#include "log.h"
|
||||||
|
#include "sockopt.h"
|
||||||
|
#include "checksum.h"
|
||||||
|
+#ifdef CRYPTO_INTERNAL
|
||||||
|
#include "md5.h"
|
||||||
|
+#endif
|
||||||
|
#include "vty.h"
|
||||||
|
|
||||||
|
#include "eigrpd/eigrp_structs.h"
|
||||||
|
diff --git a/eigrpd/eigrp_reply.c b/eigrpd/eigrp_reply.c
|
||||||
|
index ccf0496..2902365 100644
|
||||||
|
--- a/eigrpd/eigrp_reply.c
|
||||||
|
+++ b/eigrpd/eigrp_reply.c
|
||||||
|
@@ -42,7 +42,9 @@
|
||||||
|
#include "log.h"
|
||||||
|
#include "sockopt.h"
|
||||||
|
#include "checksum.h"
|
||||||
|
+#ifdef CRYPTO_INTERNAL
|
||||||
|
#include "md5.h"
|
||||||
|
+#endif
|
||||||
|
#include "vty.h"
|
||||||
|
#include "keychain.h"
|
||||||
|
#include "plist.h"
|
||||||
|
diff --git a/eigrpd/eigrp_siaquery.c b/eigrpd/eigrp_siaquery.c
|
||||||
|
index ff38325..09b9369 100644
|
||||||
|
--- a/eigrpd/eigrp_siaquery.c
|
||||||
|
+++ b/eigrpd/eigrp_siaquery.c
|
||||||
|
@@ -38,7 +38,9 @@
|
||||||
|
#include "log.h"
|
||||||
|
#include "sockopt.h"
|
||||||
|
#include "checksum.h"
|
||||||
|
+#ifdef CRYPTO_INTERNAL
|
||||||
|
#include "md5.h"
|
||||||
|
+#endif
|
||||||
|
#include "vty.h"
|
||||||
|
|
||||||
|
#include "eigrpd/eigrp_structs.h"
|
||||||
|
diff --git a/eigrpd/eigrp_siareply.c b/eigrpd/eigrp_siareply.c
|
||||||
|
index d3dd123..f6a2bd6 100644
|
||||||
|
--- a/eigrpd/eigrp_siareply.c
|
||||||
|
+++ b/eigrpd/eigrp_siareply.c
|
||||||
|
@@ -37,7 +37,9 @@
|
||||||
|
#include "log.h"
|
||||||
|
#include "sockopt.h"
|
||||||
|
#include "checksum.h"
|
||||||
|
+#ifdef CRYPTO_INTERNAL
|
||||||
|
#include "md5.h"
|
||||||
|
+#endif
|
||||||
|
#include "vty.h"
|
||||||
|
|
||||||
|
#include "eigrpd/eigrp_structs.h"
|
||||||
|
diff --git a/eigrpd/eigrp_snmp.c b/eigrpd/eigrp_snmp.c
|
||||||
|
index 21c9238..cfb8890 100644
|
||||||
|
--- a/eigrpd/eigrp_snmp.c
|
||||||
|
+++ b/eigrpd/eigrp_snmp.c
|
||||||
|
@@ -42,7 +42,9 @@
|
||||||
|
#include "log.h"
|
||||||
|
#include "sockopt.h"
|
||||||
|
#include "checksum.h"
|
||||||
|
+#ifdef CRYPTO_INTERNAL
|
||||||
|
#include "md5.h"
|
||||||
|
+#endif
|
||||||
|
#include "keychain.h"
|
||||||
|
#include "smux.h"
|
||||||
|
|
||||||
|
diff --git a/eigrpd/eigrp_update.c b/eigrpd/eigrp_update.c
|
||||||
|
index 8db4903..2a4f0bb 100644
|
||||||
|
--- a/eigrpd/eigrp_update.c
|
||||||
|
+++ b/eigrpd/eigrp_update.c
|
||||||
|
@@ -42,7 +42,9 @@
|
||||||
|
#include "log.h"
|
||||||
|
#include "sockopt.h"
|
||||||
|
#include "checksum.h"
|
||||||
|
+#ifdef CRYPTO_INTERNAL
|
||||||
|
#include "md5.h"
|
||||||
|
+#endif
|
||||||
|
#include "vty.h"
|
||||||
|
#include "plist.h"
|
||||||
|
#include "plist_int.h"
|
||||||
|
diff --git a/eigrpd/eigrp_cli.c b/eigrpd/eigrp_cli.c
|
||||||
|
index a93d4c8..b01e121 100644
|
||||||
|
--- a/eigrpd/eigrp_cli.c
|
||||||
|
+++ b/eigrpd/eigrp_cli.c
|
||||||
|
@@ -25,6 +25,7 @@
|
||||||
|
#include "lib/command.h"
|
||||||
|
#include "lib/log.h"
|
||||||
|
#include "lib/northbound_cli.h"
|
||||||
|
+#include "lib/libfrr.h"
|
||||||
|
|
||||||
|
#include "eigrp_structs.h"
|
||||||
|
#include "eigrpd.h"
|
||||||
|
@@ -726,6 +726,20 @@ DEFPY(
|
||||||
|
"Keyed message digest\n"
|
||||||
|
"HMAC SHA256 algorithm \n")
|
||||||
|
{
|
||||||
|
+ //EIGRP authentication is currently broken in FRR
|
||||||
|
+ switch (frr_get_cli_mode()) {
|
||||||
|
+ case FRR_CLI_CLASSIC:
|
||||||
|
+ vty_out(vty, "%% Eigrp Authentication is disabled\n\n");
|
||||||
|
+ break;
|
||||||
|
+ case FRR_CLI_TRANSACTIONAL:
|
||||||
|
+ vty_out(vty,
|
||||||
|
+ "%% Failed to edit candidate configuration - "
|
||||||
|
+ "Eigrp Authentication is disabled.\n\n");
|
||||||
|
+ break;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ return CMD_WARNING_CONFIG_FAILED;
|
||||||
|
+
|
||||||
|
char xpath[XPATH_MAXLEN], xpath_auth[XPATH_MAXLEN + 64];
|
||||||
|
|
||||||
|
snprintf(xpath, sizeof(xpath), "./frr-eigrpd:eigrp/instance[asn='%s']",
|
||||||
103
0004-fips-mode.patch
Normal file
103
0004-fips-mode.patch
Normal file
@@ -0,0 +1,103 @@
|
|||||||
|
diff --git a/ospfd/ospf_vty.c b/ospfd/ospf_vty.c
|
||||||
|
index 631465f..e084ff3 100644
|
||||||
|
--- a/ospfd/ospf_vty.c
|
||||||
|
+++ b/ospfd/ospf_vty.c
|
||||||
|
@@ -1136,6 +1136,11 @@ DEFUN (ospf_area_vlink,
|
||||||
|
|
||||||
|
if (argv_find(argv, argc, "message-digest", &idx)) {
|
||||||
|
/* authentication message-digest */
|
||||||
|
+ if(FIPS_mode())
|
||||||
|
+ {
|
||||||
|
+ vty_out(vty, "FIPS mode is enabled, md5 authentication is disabled\n");
|
||||||
|
+ return CMD_WARNING_CONFIG_FAILED;
|
||||||
|
+ }
|
||||||
|
vl_config.auth_type = OSPF_AUTH_CRYPTOGRAPHIC;
|
||||||
|
} else if (argv_find(argv, argc, "null", &idx)) {
|
||||||
|
/* "authentication null" */
|
||||||
|
@@ -1993,6 +1998,15 @@ DEFUN (ospf_area_authentication_message_digest,
|
||||||
|
? OSPF_AUTH_NULL
|
||||||
|
: OSPF_AUTH_CRYPTOGRAPHIC;
|
||||||
|
|
||||||
|
+ if(area->auth_type == OSPF_AUTH_CRYPTOGRAPHIC)
|
||||||
|
+ {
|
||||||
|
+ if(FIPS_mode())
|
||||||
|
+ {
|
||||||
|
+ vty_out(vty, "FIPS mode is enabled, md5 authentication is disabled\n");
|
||||||
|
+ return CMD_WARNING_CONFIG_FAILED;
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
return CMD_SUCCESS;
|
||||||
|
}
|
||||||
|
|
||||||
|
@@ -6665,6 +6679,11 @@ DEFUN (ip_ospf_authentication_args,
|
||||||
|
|
||||||
|
/* Handle message-digest authentication */
|
||||||
|
if (argv[idx_encryption]->arg[0] == 'm') {
|
||||||
|
+ if(FIPS_mode())
|
||||||
|
+ {
|
||||||
|
+ vty_out(vty, "FIPS mode is enabled, md5 authentication is disabled\n");
|
||||||
|
+ return CMD_WARNING_CONFIG_FAILED;
|
||||||
|
+ }
|
||||||
|
SET_IF_PARAM(params, auth_type);
|
||||||
|
params->auth_type = OSPF_AUTH_CRYPTOGRAPHIC;
|
||||||
|
return CMD_SUCCESS;
|
||||||
|
@@ -6971,6 +6990,11 @@ DEFUN (ip_ospf_message_digest_key,
|
||||||
|
"The OSPF password (key)\n"
|
||||||
|
"Address of interface\n")
|
||||||
|
{
|
||||||
|
+ if(FIPS_mode())
|
||||||
|
+ {
|
||||||
|
+ vty_out(vty, "FIPS mode is enabled, md5 authentication is disabled\n");
|
||||||
|
+ return CMD_WARNING_CONFIG_FAILED;
|
||||||
|
+ }
|
||||||
|
VTY_DECLVAR_CONTEXT(interface, ifp);
|
||||||
|
struct crypt_key *ck;
|
||||||
|
uint8_t key_id;
|
||||||
|
diff --git a/isisd/isis_circuit.c b/isisd/isis_circuit.c
|
||||||
|
index 81b4b39..cce33d9 100644
|
||||||
|
--- a/isisd/isis_circuit.c
|
||||||
|
+++ b/isisd/isis_circuit.c
|
||||||
|
@@ -1318,6 +1318,10 @@ static int isis_circuit_passwd_set(struct isis_circuit *circuit,
|
||||||
|
return ferr_code_bug(
|
||||||
|
"circuit password too long (max 254 chars)");
|
||||||
|
|
||||||
|
+ //When in FIPS mode, the password never gets set in MD5
|
||||||
|
+ if((passwd_type == ISIS_PASSWD_TYPE_HMAC_MD5) && FIPS_mode())
|
||||||
|
+ return ferr_cfg_invalid("FIPS mode is enabled, md5 authentication is disabled");
|
||||||
|
+
|
||||||
|
circuit->passwd.len = len;
|
||||||
|
strlcpy((char *)circuit->passwd.passwd, passwd,
|
||||||
|
sizeof(circuit->passwd.passwd));
|
||||||
|
diff --git a/isisd/isisd.c b/isisd/isisd.c
|
||||||
|
index 419127c..a6c36af 100644
|
||||||
|
--- a/isisd/isisd.c
|
||||||
|
+++ b/isisd/isisd.c
|
||||||
|
@@ -1638,6 +1638,10 @@ static int isis_area_passwd_set(struct isis_area *area, int level,
|
||||||
|
if (len > 254)
|
||||||
|
return -1;
|
||||||
|
|
||||||
|
+ //When in FIPS mode, the password never get set in MD5
|
||||||
|
+ if ((passwd_type == ISIS_PASSWD_TYPE_HMAC_MD5) && (FIPS_mode()))
|
||||||
|
+ return ferr_cfg_invalid("FIPS mode is enabled, md5 authentication is disabled");
|
||||||
|
+
|
||||||
|
modified.len = len;
|
||||||
|
strlcpy((char *)modified.passwd, passwd,
|
||||||
|
sizeof(modified.passwd));
|
||||||
|
diff --git a/ripd/rip_cli.c b/ripd/rip_cli.c
|
||||||
|
index 5bb81ef..02a09ef 100644
|
||||||
|
--- a/ripd/rip_cli.c
|
||||||
|
+++ b/ripd/rip_cli.c
|
||||||
|
@@ -796,6 +796,12 @@ DEFPY (ip_rip_authentication_mode,
|
||||||
|
value = "20";
|
||||||
|
}
|
||||||
|
|
||||||
|
+ if(strmatch(mode, "md5") && FIPS_mode())
|
||||||
|
+ {
|
||||||
|
+ vty_out(vty, "FIPS mode is enabled, md5 authentication id disabled\n");
|
||||||
|
+ return CMD_WARNING_CONFIG_FAILED;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
nb_cli_enqueue_change(vty, "./authentication-scheme/mode", NB_OP_MODIFY,
|
||||||
|
strmatch(mode, "md5") ? "md5" : "plain-text");
|
||||||
|
if (strmatch(mode, "md5"))
|
||||||
30
0005-test-typelist-power.patch
Normal file
30
0005-test-typelist-power.patch
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
diff --git a/tests/lib/test_typelist.h b/tests/lib/test_typelist.h
|
||||||
|
index f20bbc52d..9039fa8a4 100644
|
||||||
|
--- a/tests/lib/test_typelist.h
|
||||||
|
+++ b/tests/lib/test_typelist.h
|
||||||
|
@@ -98,12 +98,13 @@ static void ts_hash(const char *text, const char *expect)
|
||||||
|
unsigned i = 0;
|
||||||
|
uint8_t hash[32];
|
||||||
|
char hashtext[65];
|
||||||
|
- uint32_t count;
|
||||||
|
+ uint32_t swap_count, count;
|
||||||
|
|
||||||
|
- count = htonl(list_count(&head));
|
||||||
|
+ count = list_count(&head);
|
||||||
|
+ swap_count = htonl(count);
|
||||||
|
|
||||||
|
SHA256_Init(&ctx);
|
||||||
|
- SHA256_Update(&ctx, &count, sizeof(count));
|
||||||
|
+ SHA256_Update(&ctx, &swap_count, sizeof(swap_count));
|
||||||
|
|
||||||
|
frr_each (list, &head, item) {
|
||||||
|
struct {
|
||||||
|
@@ -115,7 +115,7 @@ static void ts_hash(const char *text, const char *expect)
|
||||||
|
};
|
||||||
|
SHA256_Update(&ctx, &hashitem, sizeof(hashitem));
|
||||||
|
i++;
|
||||||
|
- assert(i < count);
|
||||||
|
+ assert(i <= count);
|
||||||
|
}
|
||||||
|
SHA256_Final(hash, &ctx);
|
||||||
|
|
||||||
28
frr.spec
28
frr.spec
@@ -1,11 +1,12 @@
|
|||||||
%global frrversion 7.1
|
%global frrversion 7.2
|
||||||
%global frr_libdir /usr/lib/frr
|
%global frr_libdir /usr/lib/frr
|
||||||
|
%global checkout .st.1
|
||||||
|
|
||||||
%global _hardened_build 1
|
%global _hardened_build 1
|
||||||
|
|
||||||
Name: frr
|
Name: frr
|
||||||
Version: 7.1
|
Version: 7.2
|
||||||
Release: 2%{?checkout}%{?dist}
|
Release: 1%{?checkout}%{?dist}
|
||||||
Summary: Routing daemon
|
Summary: Routing daemon
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
URL: http://www.frrouting.org
|
URL: http://www.frrouting.org
|
||||||
@@ -30,6 +31,11 @@ Conflicts: quagga
|
|||||||
|
|
||||||
Patch0000: 0000-remove-babeld-and-ldpd.patch
|
Patch0000: 0000-remove-babeld-and-ldpd.patch
|
||||||
Patch0001: 0001-use-python3.patch
|
Patch0001: 0001-use-python3.patch
|
||||||
|
Patch0002: 0002-enable-openssl.patch
|
||||||
|
Patch0003: 0003-disable-eigrp-crypto.patch
|
||||||
|
Patch0004: 0004-fips-mode.patch
|
||||||
|
Patch0005: 0005-test-typelist-power.patch
|
||||||
|
Patch0006: 0001-nhrp-Configure-vici-socket-path-using-configure-with.patch
|
||||||
|
|
||||||
%description
|
%description
|
||||||
FRRouting is free software that manages TCP/IP based routing protocols. It takes
|
FRRouting is free software that manages TCP/IP based routing protocols. It takes
|
||||||
@@ -67,6 +73,8 @@ autoreconf -ivf
|
|||||||
--disable-ldpd \
|
--disable-ldpd \
|
||||||
--disable-babeld \
|
--disable-babeld \
|
||||||
--with-moduledir=%{_libdir}/frr/modules \
|
--with-moduledir=%{_libdir}/frr/modules \
|
||||||
|
--with-crypto=openssl \
|
||||||
|
--with-vici-socket=/run/strongswan/charon.vici \
|
||||||
--enable-fpm
|
--enable-fpm
|
||||||
|
|
||||||
%make_build MAKEINFO="makeinfo --no-split" PYTHON=%{__python3}
|
%make_build MAKEINFO="makeinfo --no-split" PYTHON=%{__python3}
|
||||||
@@ -164,13 +172,25 @@ make check PYTHON=%{__python3}
|
|||||||
%{_libdir}/frr/*.so.*
|
%{_libdir}/frr/*.so.*
|
||||||
%{_libdir}/frr/modules/*
|
%{_libdir}/frr/modules/*
|
||||||
%config(noreplace) %attr(644,root,root) /etc/logrotate.d/frr
|
%config(noreplace) %attr(644,root,root) /etc/logrotate.d/frr
|
||||||
/etc/frr/daemons
|
%config(noreplace) /etc/frr/daemons
|
||||||
%config(noreplace) /etc/pam.d/frr
|
%config(noreplace) /etc/pam.d/frr
|
||||||
%{_unitdir}/*.service
|
%{_unitdir}/*.service
|
||||||
/usr/share/yang/*.yang
|
/usr/share/yang/*.yang
|
||||||
#%%{_libdir}/frr/frr/libyang_plugins/*
|
#%%{_libdir}/frr/frr/libyang_plugins/*
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Wed Jan 08 2020 Michal Ruprich <mruprich@redhat.com> - 7.2-1
|
||||||
|
- New version 7.2
|
||||||
|
|
||||||
|
* Mon Oct 07 2019 Michal Ruprich <mruprich@redhat.com> - 7.1-4
|
||||||
|
- Adding noreplace to the /etc/frr/daemons file
|
||||||
|
|
||||||
|
* Fri Sep 13 2019 Michal Ruprich <mruprich@redhat.com> - 7.1-3
|
||||||
|
- New way of finding python version during build
|
||||||
|
- Replacing crypto of all routing daemons with openssl
|
||||||
|
- Disabling EIGRP crypto because it is broken
|
||||||
|
- Disabling crypto in FIPS mode
|
||||||
|
|
||||||
* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> - 7.1-2
|
* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> - 7.1-2
|
||||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
|
||||||
|
|
||||||
|
|||||||
2
sources
2
sources
@@ -1 +1 @@
|
|||||||
SHA512 (frr-7.1.tar.gz) = ee0be872a96737e45dd841b936f66c394db2bcd857c28437dfeeeabf70cf420e69212b4b744569cc1c9f6038e7ca66211c6294ec2e94855ed8131833985e32b0
|
SHA512 (frr-7.2.tar.gz) = a99cd23ef9499e28fdf3b2d23993e4a9bcfea3c5eb4c8ddc33ad50b0afab961733729116e01397af9e77918b8c0de5598f6c22bbab92050b548fb5c21e5d81d8
|
||||||
|
|||||||
Reference in New Issue
Block a user