Compare commits
17 Commits
strongswan
...
strongswan
| Author | SHA1 | Date | |
|---|---|---|---|
| 7522035bd6 | |||
| f98f60a125 | |||
| 87fabb3a9d | |||
| 1d001de369 | |||
|
|
2ba804af93 | ||
|
|
19c48bd52d | ||
|
|
c14cb600a0 | ||
|
|
9e397bfc7d | ||
|
|
9d159bf0d0 | ||
|
|
f779b6c7bb | ||
|
|
9d642ad352 | ||
|
|
0132cc5668 | ||
|
|
33fb3b13a3 | ||
|
|
6000262f47 | ||
|
|
d7206ab591 | ||
|
|
585aca3015 | ||
|
|
ea8056eb33 |
8
.gitignore
vendored
8
.gitignore
vendored
@@ -11,3 +11,11 @@
|
|||||||
/strongswan-5.9.6.tar.bz2.sig
|
/strongswan-5.9.6.tar.bz2.sig
|
||||||
/strongswan-5.9.8.tar.bz2
|
/strongswan-5.9.8.tar.bz2
|
||||||
/strongswan-5.9.8.tar.bz2.sig
|
/strongswan-5.9.8.tar.bz2.sig
|
||||||
|
/strongswan-5.9.9.tar.bz2
|
||||||
|
/strongswan-5.9.9.tar.bz2.sig
|
||||||
|
/strongswan-5.9.10.tar.bz2
|
||||||
|
/strongswan-5.9.10.tar.bz2.sig
|
||||||
|
/strongswan-5.9.11.tar.bz2
|
||||||
|
/strongswan-5.9.11.tar.bz2.sig
|
||||||
|
/strongswan-5.9.14.tar.bz2
|
||||||
|
/strongswan-5.9.14.tar.bz2.sig
|
||||||
|
|||||||
476
0001-charon-add-optional-source-and-remote-overrides-for-.patch
Normal file
476
0001-charon-add-optional-source-and-remote-overrides-for-.patch
Normal file
@@ -0,0 +1,476 @@
|
|||||||
|
From 1baf500104e963e0d0d410c95e7dcec899173b77 Mon Sep 17 00:00:00 2001
|
||||||
|
From: =?UTF-8?q?Zoran=20Peri=C4=8Di=C4=87?= <zpericic@netst.org>
|
||||||
|
Date: Tue, 9 Jul 2024 19:07:57 +0200
|
||||||
|
Subject: [PATCH 1/4] charon: add optional source and remote overrides for
|
||||||
|
initiate
|
||||||
|
|
||||||
|
This introduces support for specifying optional IKE SA specific
|
||||||
|
source and remote address for child sa initiation. This allows
|
||||||
|
to initiate wildcard connection for known address via vici.
|
||||||
|
|
||||||
|
In addition this allows simpler implementation of trap-any patches
|
||||||
|
and is a prerequisite for dmvpn support.
|
||||||
|
---
|
||||||
|
src/libcharon/control/controller.c | 34 ++++++++++++++++--
|
||||||
|
src/libcharon/control/controller.h | 28 +++++++++++++++
|
||||||
|
src/libcharon/plugins/vici/vici_control.c | 41 +++++++++++++++++----
|
||||||
|
src/libcharon/sa/ike_sa_manager.c | 34 +++++++++++++++++-
|
||||||
|
src/libcharon/sa/ike_sa_manager.h | 25 ++++++++++++-
|
||||||
|
src/libcharon/sa/trap_manager.c | 44 +++++++++--------------
|
||||||
|
src/swanctl/commands/initiate.c | 19 +++++++++-
|
||||||
|
7 files changed, 186 insertions(+), 39 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/src/libcharon/control/controller.c b/src/libcharon/control/controller.c
|
||||||
|
index 027f48e93..26501768d 100644
|
||||||
|
--- a/src/libcharon/control/controller.c
|
||||||
|
+++ b/src/libcharon/control/controller.c
|
||||||
|
@@ -1,4 +1,6 @@
|
||||||
|
/*
|
||||||
|
+ * Copyright (C) 2023 Zoran Peričić <zpericic@netst.org>
|
||||||
|
+ * Copyright (C) 2014 Timo Teräs <timo.teras@iki.fi>
|
||||||
|
* Copyright (C) 2011-2023 Tobias Brunner
|
||||||
|
* Copyright (C) 2007-2011 Martin Willi
|
||||||
|
*
|
||||||
|
@@ -107,6 +109,16 @@ struct interface_listener_t {
|
||||||
|
*/
|
||||||
|
ike_sa_t *ike_sa;
|
||||||
|
|
||||||
|
+ /**
|
||||||
|
+ * Our host hint.
|
||||||
|
+ */
|
||||||
|
+ host_t *my_host;
|
||||||
|
+
|
||||||
|
+ /**
|
||||||
|
+ * Other host hint.
|
||||||
|
+ */
|
||||||
|
+ host_t *other_host;
|
||||||
|
+
|
||||||
|
/**
|
||||||
|
* unique ID, used for various methods
|
||||||
|
*/
|
||||||
|
@@ -417,10 +429,16 @@ METHOD(job_t, initiate_execute, job_requeue_t,
|
||||||
|
ike_sa_t *ike_sa;
|
||||||
|
interface_listener_t *listener = &job->listener;
|
||||||
|
peer_cfg_t *peer_cfg = listener->peer_cfg;
|
||||||
|
+ host_t *my_host = listener->my_host;
|
||||||
|
+ host_t *other_host = listener->other_host;
|
||||||
|
|
||||||
|
- ike_sa = charon->ike_sa_manager->checkout_by_config(charon->ike_sa_manager,
|
||||||
|
- peer_cfg);
|
||||||
|
+ ike_sa = charon->ike_sa_manager->checkout_by_config2(charon->ike_sa_manager,
|
||||||
|
+ peer_cfg, my_host, other_host);
|
||||||
|
peer_cfg->destroy(peer_cfg);
|
||||||
|
+
|
||||||
|
+ if (my_host) my_host->destroy(my_host);
|
||||||
|
+ if (other_host) other_host->destroy(other_host);
|
||||||
|
+
|
||||||
|
if (!ike_sa)
|
||||||
|
{
|
||||||
|
DESTROY_IF(listener->child_cfg);
|
||||||
|
@@ -501,6 +519,15 @@ METHOD(controller_t, initiate, status_t,
|
||||||
|
private_controller_t *this, peer_cfg_t *peer_cfg, child_cfg_t *child_cfg,
|
||||||
|
controller_cb_t callback, void *param, level_t max_level, u_int timeout,
|
||||||
|
bool limits)
|
||||||
|
+{
|
||||||
|
+ return this->public.initiate2(this, peer_cfg, child_cfg, NULL, NULL, callback, param, max_level, timeout, limits);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+METHOD(controller_t, initiate2, status_t,
|
||||||
|
+ private_controller_t *this, peer_cfg_t *peer_cfg, child_cfg_t *child_cfg,
|
||||||
|
+ host_t *my_host, host_t *other_host,
|
||||||
|
+ controller_cb_t callback, void *param, level_t max_level, u_int timeout,
|
||||||
|
+ bool limits)
|
||||||
|
{
|
||||||
|
interface_job_t *job;
|
||||||
|
status_t status;
|
||||||
|
@@ -523,6 +550,8 @@ METHOD(controller_t, initiate, status_t,
|
||||||
|
.status = FAILED,
|
||||||
|
.child_cfg = child_cfg,
|
||||||
|
.peer_cfg = peer_cfg,
|
||||||
|
+ .my_host = my_host ? my_host->clone(my_host) : NULL,
|
||||||
|
+ .other_host = other_host ? other_host->clone(other_host) : NULL,
|
||||||
|
.lock = spinlock_create(),
|
||||||
|
.options.limits = limits,
|
||||||
|
},
|
||||||
|
@@ -770,6 +799,7 @@ controller_t *controller_create(void)
|
||||||
|
.public = {
|
||||||
|
.create_ike_sa_enumerator = _create_ike_sa_enumerator,
|
||||||
|
.initiate = _initiate,
|
||||||
|
+ .initiate2 = _initiate2,
|
||||||
|
.terminate_ike = _terminate_ike,
|
||||||
|
.terminate_child = _terminate_child,
|
||||||
|
.destroy = _destroy,
|
||||||
|
diff --git a/src/libcharon/control/controller.h b/src/libcharon/control/controller.h
|
||||||
|
index 36a1d4631..f5c60e2e7 100644
|
||||||
|
--- a/src/libcharon/control/controller.h
|
||||||
|
+++ b/src/libcharon/control/controller.h
|
||||||
|
@@ -98,6 +98,34 @@ struct controller_t {
|
||||||
|
controller_cb_t callback, void *param,
|
||||||
|
level_t max_level, u_int timeout, bool limits);
|
||||||
|
|
||||||
|
+ /**
|
||||||
|
+ * Initiate a CHILD_SA, and if required, an IKE_SA.
|
||||||
|
+ *
|
||||||
|
+ * If a callback is provided the function is synchronous and thus blocks
|
||||||
|
+ * until the IKE_SA is established or failed.
|
||||||
|
+ *
|
||||||
|
+ * @param peer_cfg peer_cfg to use for IKE_SA setup
|
||||||
|
+ * @param child_cfg optional child_cfg to set up CHILD_SA from
|
||||||
|
+ * @param my_host optional address hint for source
|
||||||
|
+ * @param other_host optional address hint for destination
|
||||||
|
+ * @param cb logging callback
|
||||||
|
+ * @param param parameter to include in each call of cb
|
||||||
|
+ * @param max_level maximum log level for which cb is invoked
|
||||||
|
+ * @param timeout timeout in ms to wait for callbacks, 0 to disable
|
||||||
|
+ * @param limits whether to check limits regarding IKE_SA initiation
|
||||||
|
+ * @return
|
||||||
|
+ * - SUCCESS, if CHILD_SA established
|
||||||
|
+ * - FAILED, if setup failed
|
||||||
|
+ * - NEED_MORE, if callback returned FALSE
|
||||||
|
+ * - OUT_OF_RES if timed out
|
||||||
|
+ * - INVALID_STATE if limits prevented initiation
|
||||||
|
+ */
|
||||||
|
+ status_t (*initiate2)(controller_t *this,
|
||||||
|
+ peer_cfg_t *peer_cfg, child_cfg_t *child_cfg,
|
||||||
|
+ host_t *my_host, host_t *other_host,
|
||||||
|
+ controller_cb_t callback, void *param,
|
||||||
|
+ level_t max_level, u_int timeout, bool limits);
|
||||||
|
+
|
||||||
|
/**
|
||||||
|
* Terminate an IKE_SA and all of its CHILD_SAs.
|
||||||
|
*
|
||||||
|
diff --git a/src/libcharon/plugins/vici/vici_control.c b/src/libcharon/plugins/vici/vici_control.c
|
||||||
|
index 1c236d249..932d0cb5a 100644
|
||||||
|
--- a/src/libcharon/plugins/vici/vici_control.c
|
||||||
|
+++ b/src/libcharon/plugins/vici/vici_control.c
|
||||||
|
@@ -1,4 +1,6 @@
|
||||||
|
/*
|
||||||
|
+ * Copyright (C) 2023 Zoran Peričić <zpericic@netst.org>
|
||||||
|
+ * Copyright (C) 2014 Timo Teräs <timo.teras@iki.fi>
|
||||||
|
* Copyright (C) 2015-2017 Tobias Brunner
|
||||||
|
* Copyright (C) 2014 Martin Willi
|
||||||
|
*
|
||||||
|
@@ -173,9 +175,12 @@ static child_cfg_t* find_child_cfg(char *name, char *pname, peer_cfg_t **out)
|
||||||
|
CALLBACK(initiate, vici_message_t*,
|
||||||
|
private_vici_control_t *this, char *name, u_int id, vici_message_t *request)
|
||||||
|
{
|
||||||
|
+ vici_message_t* msg;
|
||||||
|
peer_cfg_t *peer_cfg = NULL;
|
||||||
|
child_cfg_t *child_cfg;
|
||||||
|
char *child, *ike, *type, *sa;
|
||||||
|
+ host_t *my_host = NULL, *other_host = NULL;
|
||||||
|
+ char *my_host_str, *other_host_str;
|
||||||
|
int timeout;
|
||||||
|
bool limits;
|
||||||
|
controller_cb_t log_cb = NULL;
|
||||||
|
@@ -189,6 +194,8 @@ CALLBACK(initiate, vici_message_t*,
|
||||||
|
timeout = request->get_int(request, 0, "timeout");
|
||||||
|
limits = request->get_bool(request, FALSE, "init-limits");
|
||||||
|
log.level = request->get_int(request, 1, "loglevel");
|
||||||
|
+ my_host_str = request->get_str(request, NULL, "my-host");
|
||||||
|
+ other_host_str = request->get_str(request, NULL, "other-host");
|
||||||
|
|
||||||
|
if (!child && !ike)
|
||||||
|
{
|
||||||
|
@@ -202,28 +209,48 @@ CALLBACK(initiate, vici_message_t*,
|
||||||
|
type = child ? "CHILD_SA" : "IKE_SA";
|
||||||
|
sa = child ?: ike;
|
||||||
|
|
||||||
|
+ if (my_host_str)
|
||||||
|
+ {
|
||||||
|
+ my_host = host_create_from_string(my_host_str, 0);
|
||||||
|
+ }
|
||||||
|
+ if (other_host_str)
|
||||||
|
+ {
|
||||||
|
+ other_host = host_create_from_string(other_host_str, 0);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ DBG1(DBG_CFG, "vici initiate %s '%s', me %H, other %H, limits %d", type, sa, my_host, other_host, limits);
|
||||||
|
+
|
||||||
|
child_cfg = find_child_cfg(child, ike, &peer_cfg);
|
||||||
|
|
||||||
|
- DBG1(DBG_CFG, "vici initiate %s '%s'", type, sa);
|
||||||
|
if (!peer_cfg)
|
||||||
|
{
|
||||||
|
- return send_reply(this, "%s config '%s' not found", type, sa);
|
||||||
|
+ msg = send_reply(this, "%s config '%s' not found", type, sa);
|
||||||
|
+ goto ret;
|
||||||
|
}
|
||||||
|
- switch (charon->controller->initiate(charon->controller, peer_cfg, child_cfg,
|
||||||
|
+ switch (charon->controller->initiate2(charon->controller, peer_cfg, child_cfg,
|
||||||
|
+ my_host, other_host,
|
||||||
|
log_cb, &log, log.level, timeout, limits))
|
||||||
|
{
|
||||||
|
case SUCCESS:
|
||||||
|
- return send_reply(this, NULL);
|
||||||
|
+ msg = send_reply(this, NULL);
|
||||||
|
+ break;
|
||||||
|
case OUT_OF_RES:
|
||||||
|
- return send_reply(this, "%s '%s' not established after %dms", type,
|
||||||
|
+ msg = send_reply(this, "%s '%s' not established after %dms", type,
|
||||||
|
sa, timeout);
|
||||||
|
+ break;
|
||||||
|
case INVALID_STATE:
|
||||||
|
- return send_reply(this, "establishing %s '%s' not possible at the "
|
||||||
|
+ msg = send_reply(this, "establishing %s '%s' not possible at the "
|
||||||
|
"moment due to limits", type, sa);
|
||||||
|
+ break;
|
||||||
|
case FAILED:
|
||||||
|
default:
|
||||||
|
- return send_reply(this, "establishing %s '%s' failed", type, sa);
|
||||||
|
+ msg = send_reply(this, "establishing %s '%s' failed", type, sa);
|
||||||
|
+ break;
|
||||||
|
}
|
||||||
|
+ret:
|
||||||
|
+ if (my_host) my_host->destroy(my_host);
|
||||||
|
+ if (other_host) other_host->destroy(other_host);
|
||||||
|
+ return msg;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
diff --git a/src/libcharon/sa/ike_sa_manager.c b/src/libcharon/sa/ike_sa_manager.c
|
||||||
|
index 7763ae844..59852f253 100644
|
||||||
|
--- a/src/libcharon/sa/ike_sa_manager.c
|
||||||
|
+++ b/src/libcharon/sa/ike_sa_manager.c
|
||||||
|
@@ -1,4 +1,6 @@
|
||||||
|
/*
|
||||||
|
+ * Copyright (C) 2023 Zoran Peričić <zpericic@netst.org>
|
||||||
|
+ * Copyright (C) 2014 Timo Teräs <timo.teras@iki.fi>
|
||||||
|
* Copyright (C) 2008-2022 Tobias Brunner
|
||||||
|
* Copyright (C) 2005-2011 Martin Willi
|
||||||
|
* Copyright (C) 2005 Jan Hutter
|
||||||
|
@@ -1499,6 +1501,13 @@ typedef struct {
|
||||||
|
|
||||||
|
METHOD(ike_sa_manager_t, checkout_by_config, ike_sa_t*,
|
||||||
|
private_ike_sa_manager_t *this, peer_cfg_t *peer_cfg)
|
||||||
|
+{
|
||||||
|
+ return this->public.checkout_by_config2(this, peer_cfg, NULL, NULL);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+METHOD(ike_sa_manager_t, checkout_by_config2, ike_sa_t*,
|
||||||
|
+ private_ike_sa_manager_t *this, peer_cfg_t *peer_cfg,
|
||||||
|
+ host_t *my_host, host_t *other_host)
|
||||||
|
{
|
||||||
|
enumerator_t *enumerator;
|
||||||
|
entry_t *entry;
|
||||||
|
@@ -1509,7 +1518,16 @@ METHOD(ike_sa_manager_t, checkout_by_config, ike_sa_t*,
|
||||||
|
u_int segment;
|
||||||
|
int i;
|
||||||
|
|
||||||
|
- DBG2(DBG_MGR, "checkout IKE_SA by config");
|
||||||
|
+ if (my_host && my_host->get_port(my_host) == 0)
|
||||||
|
+ {
|
||||||
|
+ my_host->set_port(my_host, IKEV2_UDP_PORT);
|
||||||
|
+ }
|
||||||
|
+ if (other_host && other_host->get_port(other_host) == 0)
|
||||||
|
+ {
|
||||||
|
+ other_host->set_port(other_host, IKEV2_UDP_PORT);
|
||||||
|
+ }
|
||||||
|
+ DBG2(DBG_MGR, "checkout IKE_SA by config '%s', me %H, other %H",
|
||||||
|
+ peer_cfg->get_name(peer_cfg), my_host, other_host);
|
||||||
|
|
||||||
|
if (!this->reuse_ikesa && peer_cfg->get_ike_version(peer_cfg) != IKEV1)
|
||||||
|
{ /* IKE_SA reuse disabled by config (not possible for IKEv1) */
|
||||||
|
@@ -1567,6 +1585,15 @@ METHOD(ike_sa_manager_t, checkout_by_config, ike_sa_t*,
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ if (my_host && !my_host->ip_equals(my_host, entry->ike_sa->get_my_host(entry->ike_sa)))
|
||||||
|
+ {
|
||||||
|
+ continue;
|
||||||
|
+ }
|
||||||
|
+ if (other_host && !other_host->ip_equals(other_host, entry->ike_sa->get_other_host(entry->ike_sa)))
|
||||||
|
+ {
|
||||||
|
+ continue;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
current_peer = entry->ike_sa->get_peer_cfg(entry->ike_sa);
|
||||||
|
if (current_peer && current_peer->equals(current_peer, peer_cfg))
|
||||||
|
{
|
||||||
|
@@ -1593,6 +1620,10 @@ METHOD(ike_sa_manager_t, checkout_by_config, ike_sa_t*,
|
||||||
|
{
|
||||||
|
ike_sa->set_peer_cfg(ike_sa, peer_cfg);
|
||||||
|
checkout_new(this, ike_sa);
|
||||||
|
+ if (my_host || other_host)
|
||||||
|
+ {
|
||||||
|
+ ike_sa->update_hosts(ike_sa, my_host, other_host, TRUE);
|
||||||
|
+ }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
charon->bus->set_sa(charon->bus, ike_sa);
|
||||||
|
@@ -2558,6 +2589,7 @@ ike_sa_manager_t *ike_sa_manager_create()
|
||||||
|
.checkout = _checkout,
|
||||||
|
.checkout_by_message = _checkout_by_message,
|
||||||
|
.checkout_by_config = _checkout_by_config,
|
||||||
|
+ .checkout_by_config2 = _checkout_by_config,
|
||||||
|
.checkout_by_id = _checkout_by_id,
|
||||||
|
.checkout_by_name = _checkout_by_name,
|
||||||
|
.new_initiator_spi = _new_initiator_spi,
|
||||||
|
diff --git a/src/libcharon/sa/ike_sa_manager.h b/src/libcharon/sa/ike_sa_manager.h
|
||||||
|
index 004cc2216..d001f5a80 100644
|
||||||
|
--- a/src/libcharon/sa/ike_sa_manager.h
|
||||||
|
+++ b/src/libcharon/sa/ike_sa_manager.h
|
||||||
|
@@ -123,7 +123,8 @@ struct ike_sa_manager_t {
|
||||||
|
ike_sa_t* (*checkout_by_message) (ike_sa_manager_t* this, message_t *message);
|
||||||
|
|
||||||
|
/**
|
||||||
|
- * Checkout an IKE_SA for initiation by a peer_config.
|
||||||
|
+ * Checkout an IKE_SA for initiation by a peer_config and optional
|
||||||
|
+ * source and remote host addresses.
|
||||||
|
*
|
||||||
|
* To initiate, a CHILD_SA may be established within an existing IKE_SA.
|
||||||
|
* This call checks for an existing IKE_SA by comparing the configuration.
|
||||||
|
@@ -140,6 +141,28 @@ struct ike_sa_manager_t {
|
||||||
|
*/
|
||||||
|
ike_sa_t *(*checkout_by_config)(ike_sa_manager_t* this, peer_cfg_t *peer_cfg);
|
||||||
|
|
||||||
|
+ /**
|
||||||
|
+ * Checkout an IKE_SA for initiation by a peer_config and optional
|
||||||
|
+ * source and remote host addresses.
|
||||||
|
+ *
|
||||||
|
+ * To initiate, a CHILD_SA may be established within an existing IKE_SA.
|
||||||
|
+ * This call checks for an existing IKE_SA by comparing the configuration.
|
||||||
|
+ * If the CHILD_SA can be created in an existing IKE_SA, the matching SA
|
||||||
|
+ * is returned.
|
||||||
|
+ * If no IKE_SA is found, a new one is created and registered in the
|
||||||
|
+ * manager. This is also the case when the found IKE_SA is in an unusable
|
||||||
|
+ * state (e.g. DELETING).
|
||||||
|
+ *
|
||||||
|
+ * @note The peer_config is always set on the returned IKE_SA.
|
||||||
|
+ *
|
||||||
|
+ * @param peer_cfg configuration used to find an existing IKE_SA
|
||||||
|
+ * @param my_host source host address for wildcard peer_cfg
|
||||||
|
+ * @param other_host remote host address for wildcard peer_cfg
|
||||||
|
+ * @return checked out/created IKE_SA
|
||||||
|
+ */
|
||||||
|
+ ike_sa_t *(*checkout_by_config2)(ike_sa_manager_t* this, peer_cfg_t *peer_cfg,
|
||||||
|
+ host_t *my_host, host_t *other_host);
|
||||||
|
+
|
||||||
|
/**
|
||||||
|
* Reset initiator SPI.
|
||||||
|
*
|
||||||
|
diff --git a/src/libcharon/sa/trap_manager.c b/src/libcharon/sa/trap_manager.c
|
||||||
|
index 1b85c66a5..bbc480c0c 100644
|
||||||
|
--- a/src/libcharon/sa/trap_manager.c
|
||||||
|
+++ b/src/libcharon/sa/trap_manager.c
|
||||||
|
@@ -523,7 +523,7 @@ METHOD(trap_manager_t, acquire, void,
|
||||||
|
peer_cfg_t *peer;
|
||||||
|
child_cfg_t *child;
|
||||||
|
ike_sa_t *ike_sa;
|
||||||
|
- host_t *host;
|
||||||
|
+ host_t *host, *my_host = NULL, *other_host = NULL;
|
||||||
|
uint32_t allocated_reqid;
|
||||||
|
bool wildcard, ignore = FALSE;
|
||||||
|
|
||||||
|
@@ -603,36 +603,26 @@ METHOD(trap_manager_t, acquire, void,
|
||||||
|
this->lock->unlock(this->lock);
|
||||||
|
|
||||||
|
if (wildcard)
|
||||||
|
- { /* the peer config would match IKE_SAs with other peers */
|
||||||
|
- ike_sa = charon->ike_sa_manager->create_new(charon->ike_sa_manager,
|
||||||
|
- peer->get_ike_version(peer), TRUE);
|
||||||
|
- if (ike_sa)
|
||||||
|
- {
|
||||||
|
- ike_cfg_t *ike_cfg;
|
||||||
|
- uint16_t port;
|
||||||
|
- uint8_t mask;
|
||||||
|
-
|
||||||
|
- ike_sa->set_peer_cfg(ike_sa, peer);
|
||||||
|
- ike_cfg = ike_sa->get_ike_cfg(ike_sa);
|
||||||
|
+ {
|
||||||
|
+ ike_cfg_t *ike_cfg;
|
||||||
|
+ uint16_t port;
|
||||||
|
+ uint8_t mask;
|
||||||
|
|
||||||
|
- port = ike_cfg->get_other_port(ike_cfg);
|
||||||
|
- data->dst->to_subnet(data->dst, &host, &mask);
|
||||||
|
- host->set_port(host, port);
|
||||||
|
- ike_sa->set_other_host(ike_sa, host);
|
||||||
|
+ ike_cfg = peer->get_ike_cfg(peer);
|
||||||
|
|
||||||
|
- port = ike_cfg->get_my_port(ike_cfg);
|
||||||
|
- data->src->to_subnet(data->src, &host, &mask);
|
||||||
|
- host->set_port(host, port);
|
||||||
|
- ike_sa->set_my_host(ike_sa, host);
|
||||||
|
+ port = ike_cfg->get_other_port(ike_cfg);
|
||||||
|
+ data->dst->to_subnet(data->dst, &other_host, &mask);
|
||||||
|
+ other_host->set_port(other_host, port);
|
||||||
|
|
||||||
|
- charon->bus->set_sa(charon->bus, ike_sa);
|
||||||
|
- }
|
||||||
|
- }
|
||||||
|
- else
|
||||||
|
- {
|
||||||
|
- ike_sa = charon->ike_sa_manager->checkout_by_config(
|
||||||
|
- charon->ike_sa_manager, peer);
|
||||||
|
+ port = ike_cfg->get_my_port(ike_cfg);
|
||||||
|
+ data->src->to_subnet(data->src, &my_host, &mask);
|
||||||
|
+ my_host->set_port(my_host, port);
|
||||||
|
}
|
||||||
|
+ ike_sa = charon->ike_sa_manager->checkout_by_config2(
|
||||||
|
+ charon->ike_sa_manager, peer,
|
||||||
|
+ my_host, other_host);
|
||||||
|
+ if (my_host) my_host->destroy(my_host);
|
||||||
|
+ if (other_host) other_host->destroy(other_host);
|
||||||
|
peer->destroy(peer);
|
||||||
|
|
||||||
|
if (ike_sa)
|
||||||
|
diff --git a/src/swanctl/commands/initiate.c b/src/swanctl/commands/initiate.c
|
||||||
|
index e0fffb907..c0fc8c595 100644
|
||||||
|
--- a/src/swanctl/commands/initiate.c
|
||||||
|
+++ b/src/swanctl/commands/initiate.c
|
||||||
|
@@ -1,4 +1,5 @@
|
||||||
|
/*
|
||||||
|
+ * Copyright (C) 2014 Timo Teräs <timo.teras@iki.fi>
|
||||||
|
* Copyright (C) 2014 Martin Willi
|
||||||
|
*
|
||||||
|
* Copyright (C) secunet Security Networks AG
|
||||||
|
@@ -38,7 +39,7 @@ static int initiate(vici_conn_t *conn)
|
||||||
|
vici_req_t *req;
|
||||||
|
vici_res_t *res;
|
||||||
|
command_format_options_t format = COMMAND_FORMAT_NONE;
|
||||||
|
- char *arg, *child = NULL, *ike = NULL;
|
||||||
|
+ char *arg, *child = NULL, *ike = NULL, *my_host = NULL, *other_host = NULL;
|
||||||
|
int ret = 0, timeout = 0, level = 1;
|
||||||
|
|
||||||
|
while (TRUE)
|
||||||
|
@@ -65,6 +66,12 @@ static int initiate(vici_conn_t *conn)
|
||||||
|
case 'l':
|
||||||
|
level = atoi(arg);
|
||||||
|
continue;
|
||||||
|
+ case 'S':
|
||||||
|
+ my_host = arg;
|
||||||
|
+ continue;
|
||||||
|
+ case 'R':
|
||||||
|
+ other_host = arg;
|
||||||
|
+ continue;
|
||||||
|
case EOF:
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
@@ -88,6 +95,14 @@ static int initiate(vici_conn_t *conn)
|
||||||
|
{
|
||||||
|
vici_add_key_valuef(req, "ike", "%s", ike);
|
||||||
|
}
|
||||||
|
+ if (my_host)
|
||||||
|
+ {
|
||||||
|
+ vici_add_key_valuef(req, "my-host", "%s", my_host);
|
||||||
|
+ }
|
||||||
|
+ if (other_host)
|
||||||
|
+ {
|
||||||
|
+ vici_add_key_valuef(req, "other-host", "%s", other_host);
|
||||||
|
+ }
|
||||||
|
if (timeout)
|
||||||
|
{
|
||||||
|
vici_add_key_valuef(req, "timeout", "%d", timeout * 1000);
|
||||||
|
@@ -134,6 +149,8 @@ static void __attribute__ ((constructor))reg()
|
||||||
|
{"help", 'h', 0, "show usage information"},
|
||||||
|
{"child", 'c', 1, "initiate a CHILD_SA configuration"},
|
||||||
|
{"ike", 'i', 1, "initiate an IKE_SA, or name of child's parent"},
|
||||||
|
+ {"source", 'S', 1, "override source address"},
|
||||||
|
+ {"remote", 'R', 1, "override remote address"},
|
||||||
|
{"timeout", 't', 1, "timeout in seconds before detaching"},
|
||||||
|
{"raw", 'r', 0, "dump raw response message"},
|
||||||
|
{"pretty", 'P', 0, "dump raw response message in pretty print"},
|
||||||
|
--
|
||||||
|
2.45.2
|
||||||
|
|
||||||
140
0002-vici-send-certificates-for-ike-sa-events.patch
Normal file
140
0002-vici-send-certificates-for-ike-sa-events.patch
Normal file
@@ -0,0 +1,140 @@
|
|||||||
|
From ea77f7d906d5e7bbe44ba6e912dd386f25414492 Mon Sep 17 00:00:00 2001
|
||||||
|
From: =?UTF-8?q?Timo=20Ter=C3=A4s?= <timo.teras@iki.fi>
|
||||||
|
Date: Mon, 21 Sep 2015 13:42:05 +0300
|
||||||
|
Subject: [PATCH 2/4] vici: send certificates for ike-sa events
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: text/plain; charset=UTF-8
|
||||||
|
Content-Transfer-Encoding: 8bit
|
||||||
|
|
||||||
|
Signed-off-by: Timo Teräs <timo.teras@iki.fi>
|
||||||
|
---
|
||||||
|
src/libcharon/plugins/vici/vici_query.c | 50 +++++++++++++++++++++----
|
||||||
|
1 file changed, 42 insertions(+), 8 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/src/libcharon/plugins/vici/vici_query.c b/src/libcharon/plugins/vici/vici_query.c
|
||||||
|
index bacb7b101..19acc0789 100644
|
||||||
|
--- a/src/libcharon/plugins/vici/vici_query.c
|
||||||
|
+++ b/src/libcharon/plugins/vici/vici_query.c
|
||||||
|
@@ -402,7 +402,7 @@ static void list_vips(private_vici_query_t *this, vici_builder_t *b,
|
||||||
|
* List details of an IKE_SA
|
||||||
|
*/
|
||||||
|
static void list_ike(private_vici_query_t *this, vici_builder_t *b,
|
||||||
|
- ike_sa_t *ike_sa, time_t now)
|
||||||
|
+ ike_sa_t *ike_sa, time_t now, bool add_certs)
|
||||||
|
{
|
||||||
|
time_t t;
|
||||||
|
ike_sa_id_t *id;
|
||||||
|
@@ -411,6 +411,8 @@ static void list_ike(private_vici_query_t *this, vici_builder_t *b,
|
||||||
|
uint32_t if_id;
|
||||||
|
uint16_t alg, ks;
|
||||||
|
host_t *host;
|
||||||
|
+ auth_cfg_t *auth_cfg;
|
||||||
|
+ enumerator_t *enumerator;
|
||||||
|
|
||||||
|
b->add_kv(b, "uniqueid", "%u", ike_sa->get_unique_id(ike_sa));
|
||||||
|
b->add_kv(b, "version", "%u", ike_sa->get_version(ike_sa));
|
||||||
|
@@ -420,11 +422,43 @@ static void list_ike(private_vici_query_t *this, vici_builder_t *b,
|
||||||
|
b->add_kv(b, "local-host", "%H", host);
|
||||||
|
b->add_kv(b, "local-port", "%d", host->get_port(host));
|
||||||
|
b->add_kv(b, "local-id", "%Y", ike_sa->get_my_id(ike_sa));
|
||||||
|
+ if (add_certs)
|
||||||
|
+ {
|
||||||
|
+ enumerator = ike_sa->create_auth_cfg_enumerator(ike_sa, TRUE);
|
||||||
|
+ if (enumerator->enumerate(enumerator, &auth_cfg))
|
||||||
|
+ {
|
||||||
|
+ certificate_t *cert = auth_cfg->get(auth_cfg, AUTH_RULE_SUBJECT_CERT);
|
||||||
|
+ chunk_t encoding;
|
||||||
|
+
|
||||||
|
+ if (cert && cert->get_encoding(cert, CERT_ASN1_DER, &encoding))
|
||||||
|
+ {
|
||||||
|
+ b->add(b, VICI_KEY_VALUE, "local-cert-data", encoding);
|
||||||
|
+ free(encoding.ptr);
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ enumerator->destroy(enumerator);
|
||||||
|
+ }
|
||||||
|
|
||||||
|
host = ike_sa->get_other_host(ike_sa);
|
||||||
|
b->add_kv(b, "remote-host", "%H", host);
|
||||||
|
b->add_kv(b, "remote-port", "%d", host->get_port(host));
|
||||||
|
b->add_kv(b, "remote-id", "%Y", ike_sa->get_other_id(ike_sa));
|
||||||
|
+ if (add_certs)
|
||||||
|
+ {
|
||||||
|
+ enumerator = ike_sa->create_auth_cfg_enumerator(ike_sa, FALSE);
|
||||||
|
+ if (enumerator->enumerate(enumerator, &auth_cfg))
|
||||||
|
+ {
|
||||||
|
+ certificate_t *cert = auth_cfg->get(auth_cfg, AUTH_RULE_SUBJECT_CERT);
|
||||||
|
+ chunk_t encoding;
|
||||||
|
+
|
||||||
|
+ if (cert && cert->get_encoding(cert, CERT_ASN1_DER, &encoding))
|
||||||
|
+ {
|
||||||
|
+ b->add(b, VICI_KEY_VALUE, "remote-cert-data", encoding);
|
||||||
|
+ free(encoding.ptr);
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ enumerator->destroy(enumerator);
|
||||||
|
+ }
|
||||||
|
|
||||||
|
eap = ike_sa->get_other_eap_id(ike_sa);
|
||||||
|
|
||||||
|
@@ -556,7 +590,7 @@ CALLBACK(list_sas, vici_message_t*,
|
||||||
|
b = vici_builder_create();
|
||||||
|
b->begin_section(b, ike_sa->get_name(ike_sa));
|
||||||
|
|
||||||
|
- list_ike(this, b, ike_sa, now);
|
||||||
|
+ list_ike(this, b, ike_sa, now, TRUE);
|
||||||
|
|
||||||
|
b->begin_section(b, "child-sas");
|
||||||
|
csas = ike_sa->create_child_sa_enumerator(ike_sa);
|
||||||
|
@@ -1774,7 +1808,7 @@ METHOD(listener_t, ike_updown, bool,
|
||||||
|
}
|
||||||
|
|
||||||
|
b->begin_section(b, ike_sa->get_name(ike_sa));
|
||||||
|
- list_ike(this, b, ike_sa, now);
|
||||||
|
+ list_ike(this, b, ike_sa, now, up);
|
||||||
|
b->end_section(b);
|
||||||
|
|
||||||
|
this->dispatcher->raise_event(this->dispatcher,
|
||||||
|
@@ -1799,10 +1833,10 @@ METHOD(listener_t, ike_rekey, bool,
|
||||||
|
b = vici_builder_create();
|
||||||
|
b->begin_section(b, old->get_name(old));
|
||||||
|
b->begin_section(b, "old");
|
||||||
|
- list_ike(this, b, old, now);
|
||||||
|
+ list_ike(this, b, old, now, TRUE);
|
||||||
|
b->end_section(b);
|
||||||
|
b->begin_section(b, "new");
|
||||||
|
- list_ike(this, b, new, now);
|
||||||
|
+ list_ike(this, b, new, now, TRUE);
|
||||||
|
b->end_section(b);
|
||||||
|
b->end_section(b);
|
||||||
|
|
||||||
|
@@ -1833,7 +1867,7 @@ METHOD(listener_t, ike_update, bool,
|
||||||
|
b->add_kv(b, "remote-port", "%d", remote->get_port(remote));
|
||||||
|
|
||||||
|
b->begin_section(b, ike_sa->get_name(ike_sa));
|
||||||
|
- list_ike(this, b, ike_sa, now);
|
||||||
|
+ list_ike(this, b, ike_sa, now, TRUE);
|
||||||
|
b->end_section(b);
|
||||||
|
|
||||||
|
this->dispatcher->raise_event(this->dispatcher,
|
||||||
|
@@ -1863,7 +1897,7 @@ METHOD(listener_t, child_updown, bool,
|
||||||
|
}
|
||||||
|
|
||||||
|
b->begin_section(b, ike_sa->get_name(ike_sa));
|
||||||
|
- list_ike(this, b, ike_sa, now);
|
||||||
|
+ list_ike(this, b, ike_sa, now, up);
|
||||||
|
b->begin_section(b, "child-sas");
|
||||||
|
|
||||||
|
snprintf(buf, sizeof(buf), "%s-%u", child_sa->get_name(child_sa),
|
||||||
|
@@ -1898,7 +1932,7 @@ METHOD(listener_t, child_rekey, bool,
|
||||||
|
b = vici_builder_create();
|
||||||
|
|
||||||
|
b->begin_section(b, ike_sa->get_name(ike_sa));
|
||||||
|
- list_ike(this, b, ike_sa, now);
|
||||||
|
+ list_ike(this, b, ike_sa, now, TRUE);
|
||||||
|
b->begin_section(b, "child-sas");
|
||||||
|
|
||||||
|
b->begin_section(b, old->get_name(old));
|
||||||
|
--
|
||||||
|
2.45.2
|
||||||
|
|
||||||
160
0003-vici-add-support-for-individual-sa-state-changes.patch
Normal file
160
0003-vici-add-support-for-individual-sa-state-changes.patch
Normal file
@@ -0,0 +1,160 @@
|
|||||||
|
From 3f4e26a2163bf30481887795f9faad208bfc1be0 Mon Sep 17 00:00:00 2001
|
||||||
|
From: =?UTF-8?q?Timo=20Ter=C3=A4s?= <timo.teras@iki.fi>
|
||||||
|
Date: Mon, 21 Sep 2015 13:42:11 +0300
|
||||||
|
Subject: [PATCH 3/4] vici: add support for individual sa state changes
|
||||||
|
MIME-Version: 1.0
|
||||||
|
Content-Type: text/plain; charset=UTF-8
|
||||||
|
Content-Transfer-Encoding: 8bit
|
||||||
|
|
||||||
|
Useful for monitoring and tracking full SA.
|
||||||
|
|
||||||
|
Signed-off-by: Timo Teräs <timo.teras@iki.fi>
|
||||||
|
---
|
||||||
|
src/libcharon/plugins/vici/vici_query.c | 106 ++++++++++++++++++++++++
|
||||||
|
1 file changed, 106 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/src/libcharon/plugins/vici/vici_query.c b/src/libcharon/plugins/vici/vici_query.c
|
||||||
|
index 19acc0789..fa1aca953 100644
|
||||||
|
--- a/src/libcharon/plugins/vici/vici_query.c
|
||||||
|
+++ b/src/libcharon/plugins/vici/vici_query.c
|
||||||
|
@@ -1774,8 +1774,16 @@ static void manage_commands(private_vici_query_t *this, bool reg)
|
||||||
|
this->dispatcher->manage_event(this->dispatcher, "ike-updown", reg);
|
||||||
|
this->dispatcher->manage_event(this->dispatcher, "ike-rekey", reg);
|
||||||
|
this->dispatcher->manage_event(this->dispatcher, "ike-update", reg);
|
||||||
|
+ this->dispatcher->manage_event(this->dispatcher, "ike-state-established", reg);
|
||||||
|
+ this->dispatcher->manage_event(this->dispatcher, "ike-state-destroying", reg);
|
||||||
|
this->dispatcher->manage_event(this->dispatcher, "child-updown", reg);
|
||||||
|
this->dispatcher->manage_event(this->dispatcher, "child-rekey", reg);
|
||||||
|
+ this->dispatcher->manage_event(this->dispatcher, "child-state-installing", reg);
|
||||||
|
+ this->dispatcher->manage_event(this->dispatcher, "child-state-installed", reg);
|
||||||
|
+ this->dispatcher->manage_event(this->dispatcher, "child-state-updating", reg);
|
||||||
|
+ this->dispatcher->manage_event(this->dispatcher, "child-state-rekeying", reg);
|
||||||
|
+ this->dispatcher->manage_event(this->dispatcher, "child-state-rekeyed", reg);
|
||||||
|
+ this->dispatcher->manage_event(this->dispatcher, "child-state-destroying", reg);
|
||||||
|
manage_command(this, "list-sas", list_sas, reg);
|
||||||
|
manage_command(this, "list-policies", list_policies, reg);
|
||||||
|
manage_command(this, "list-conns", list_conns, reg);
|
||||||
|
@@ -1876,6 +1884,46 @@ METHOD(listener_t, ike_update, bool,
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
+
|
||||||
|
+METHOD(listener_t, ike_state_change, bool,
|
||||||
|
+ private_vici_query_t *this, ike_sa_t *ike_sa, ike_sa_state_t state)
|
||||||
|
+{
|
||||||
|
+ char *event;
|
||||||
|
+ vici_builder_t *b;
|
||||||
|
+ time_t now;
|
||||||
|
+
|
||||||
|
+ switch (state)
|
||||||
|
+ {
|
||||||
|
+ case IKE_ESTABLISHED:
|
||||||
|
+ event = "ike-state-established";
|
||||||
|
+ break;
|
||||||
|
+ case IKE_DESTROYING:
|
||||||
|
+ event = "ike-state-destroying";
|
||||||
|
+ break;
|
||||||
|
+ default:
|
||||||
|
+ return TRUE;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (!this->dispatcher->has_event_listeners(this->dispatcher, event))
|
||||||
|
+ {
|
||||||
|
+ return TRUE;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ now = time_monotonic(NULL);
|
||||||
|
+
|
||||||
|
+ b = vici_builder_create();
|
||||||
|
+ b->begin_section(b, ike_sa->get_name(ike_sa));
|
||||||
|
+ list_ike(this, b, ike_sa, now, state != IKE_DESTROYING);
|
||||||
|
+ b->begin_section(b, "child-sas");
|
||||||
|
+ b->end_section(b);
|
||||||
|
+ b->end_section(b);
|
||||||
|
+
|
||||||
|
+ this->dispatcher->raise_event(this->dispatcher,
|
||||||
|
+ event, 0, b->finalize(b));
|
||||||
|
+
|
||||||
|
+ return TRUE;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
METHOD(listener_t, child_updown, bool,
|
||||||
|
private_vici_query_t *this, ike_sa_t *ike_sa, child_sa_t *child_sa, bool up)
|
||||||
|
{
|
||||||
|
@@ -1955,6 +2003,62 @@ METHOD(listener_t, child_rekey, bool,
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
+METHOD(listener_t, child_state_change, bool,
|
||||||
|
+ private_vici_query_t *this, ike_sa_t *ike_sa, child_sa_t *child_sa, child_sa_state_t state)
|
||||||
|
+{
|
||||||
|
+ char *event;
|
||||||
|
+ vici_builder_t *b;
|
||||||
|
+ time_t now;
|
||||||
|
+
|
||||||
|
+ switch (state)
|
||||||
|
+ {
|
||||||
|
+ case CHILD_INSTALLING:
|
||||||
|
+ event = "child-state-installing";
|
||||||
|
+ break;
|
||||||
|
+ case CHILD_INSTALLED:
|
||||||
|
+ event = "child-state-installed";
|
||||||
|
+ break;
|
||||||
|
+ case CHILD_UPDATING:
|
||||||
|
+ event = "child-state-updating";
|
||||||
|
+ break;
|
||||||
|
+ case CHILD_REKEYING:
|
||||||
|
+ event = "child-state-rekeying";
|
||||||
|
+ break;
|
||||||
|
+ case CHILD_REKEYED:
|
||||||
|
+ event = "child-state-rekeyed";
|
||||||
|
+ break;
|
||||||
|
+ case CHILD_DESTROYING:
|
||||||
|
+ event = "child-state-destroying";
|
||||||
|
+ break;
|
||||||
|
+ default:
|
||||||
|
+ return TRUE;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (!this->dispatcher->has_event_listeners(this->dispatcher, event))
|
||||||
|
+ {
|
||||||
|
+ return TRUE;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ now = time_monotonic(NULL);
|
||||||
|
+
|
||||||
|
+ b = vici_builder_create();
|
||||||
|
+ b->begin_section(b, ike_sa->get_name(ike_sa));
|
||||||
|
+ list_ike(this, b, ike_sa, now, state != CHILD_DESTROYING);
|
||||||
|
+ b->begin_section(b, "child-sas");
|
||||||
|
+
|
||||||
|
+ b->begin_section(b, child_sa->get_name(child_sa));
|
||||||
|
+ list_child(this, b, child_sa, now);
|
||||||
|
+ b->end_section(b);
|
||||||
|
+
|
||||||
|
+ b->end_section(b);
|
||||||
|
+ b->end_section(b);
|
||||||
|
+
|
||||||
|
+ this->dispatcher->raise_event(this->dispatcher,
|
||||||
|
+ event, 0, b->finalize(b));
|
||||||
|
+
|
||||||
|
+ return TRUE;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
METHOD(vici_query_t, destroy, void,
|
||||||
|
private_vici_query_t *this)
|
||||||
|
{
|
||||||
|
@@ -1975,8 +2079,10 @@ vici_query_t *vici_query_create(vici_dispatcher_t *dispatcher)
|
||||||
|
.ike_updown = _ike_updown,
|
||||||
|
.ike_rekey = _ike_rekey,
|
||||||
|
.ike_update = _ike_update,
|
||||||
|
+ .ike_state_change = _ike_state_change,
|
||||||
|
.child_updown = _child_updown,
|
||||||
|
.child_rekey = _child_rekey,
|
||||||
|
+ .child_state_change = _child_state_change,
|
||||||
|
},
|
||||||
|
.destroy = _destroy,
|
||||||
|
},
|
||||||
|
--
|
||||||
|
2.45.2
|
||||||
|
|
||||||
292
0004-Support-GRE-key-in-selectors.patch
Normal file
292
0004-Support-GRE-key-in-selectors.patch
Normal file
@@ -0,0 +1,292 @@
|
|||||||
|
From 0ceda5a95355bb803cbcdf3eeabbcb6ec2577922 Mon Sep 17 00:00:00 2001
|
||||||
|
From: =?UTF-8?q?Zoran=20Peri=C4=8Di=C4=87?= <zoran.pericic@infomaas.com>
|
||||||
|
Date: Sun, 21 Jan 2024 03:11:32 +0100
|
||||||
|
Subject: [PATCH 4/4] Support GRE key in selectors.
|
||||||
|
|
||||||
|
---
|
||||||
|
.../kernel_netlink/kernel_netlink_ipsec.c | 20 ++++++++++++
|
||||||
|
.../plugins/load_tester/load_tester_config.c | 22 ++++++++++++-
|
||||||
|
src/libcharon/plugins/stroke/stroke_config.c | 22 ++++++++++++-
|
||||||
|
src/libcharon/plugins/vici/vici_config.c | 32 ++++++++++++++++++-
|
||||||
|
.../selectors/traffic_selector.c | 20 ++++++++++++
|
||||||
|
.../selectors/traffic_selector.h | 12 +++++++
|
||||||
|
src/starter/confread.c | 24 +++++++++++++-
|
||||||
|
src/swanctl/swanctl.opt | 3 ++
|
||||||
|
8 files changed, 151 insertions(+), 4 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/src/libcharon/plugins/kernel_netlink/kernel_netlink_ipsec.c b/src/libcharon/plugins/kernel_netlink/kernel_netlink_ipsec.c
|
||||||
|
index db0b2ac37..e4e7d9ecb 100644
|
||||||
|
--- a/src/libcharon/plugins/kernel_netlink/kernel_netlink_ipsec.c
|
||||||
|
+++ b/src/libcharon/plugins/kernel_netlink/kernel_netlink_ipsec.c
|
||||||
|
@@ -864,6 +864,7 @@ static struct xfrm_selector ts2selector(traffic_selector_t *src,
|
||||||
|
{
|
||||||
|
struct xfrm_selector sel;
|
||||||
|
uint16_t port;
|
||||||
|
+ uint32_t gre_key;
|
||||||
|
|
||||||
|
memset(&sel, 0, sizeof(sel));
|
||||||
|
sel.family = (src->get_type(src) == TS_IPV4_ADDR_RANGE) ? AF_INET : AF_INET6;
|
||||||
|
@@ -884,6 +885,25 @@ static struct xfrm_selector ts2selector(traffic_selector_t *src,
|
||||||
|
sel.dport = htons(traffic_selector_icmp_code(port));
|
||||||
|
sel.dport_mask = sel.dport ? ~0 : 0;
|
||||||
|
}
|
||||||
|
+ if (sel.proto == IPPROTO_GRE)
|
||||||
|
+ {
|
||||||
|
+ /* the kernel expects the GRE key in the source and destination
|
||||||
|
+ * port fields, respectively. */
|
||||||
|
+ gre_key = htons(traffic_selector_gre_key(dst->get_from_port(dst), dst->get_to_port(dst)));
|
||||||
|
+ if ( gre_key != 0 )
|
||||||
|
+ {
|
||||||
|
+ DBG2(DBG_KNL, "Policy GRE key: %d (%d-%d) %d", gre_key, dst->get_from_port(dst), dst->get_to_port(dst), traffic_selector_gre_key(dst->get_from_port(dst), dst->get_to_port(dst)));
|
||||||
|
+ sel.sport = gre_key >> 16;
|
||||||
|
+ sel.sport_mask = ~0;
|
||||||
|
+ sel.dport = gre_key & 0xffff;
|
||||||
|
+ sel.dport_mask = ~0;
|
||||||
|
+ } else {
|
||||||
|
+ sel.sport = 0;
|
||||||
|
+ sel.sport_mask = 0;
|
||||||
|
+ sel.dport = 0;
|
||||||
|
+ sel.dport_mask = 0;
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
sel.ifindex = interface ? if_nametoindex(interface) : 0;
|
||||||
|
sel.user = 0;
|
||||||
|
|
||||||
|
diff --git a/src/libcharon/plugins/load_tester/load_tester_config.c b/src/libcharon/plugins/load_tester/load_tester_config.c
|
||||||
|
index 58e1cd98a..ac67875d8 100644
|
||||||
|
--- a/src/libcharon/plugins/load_tester/load_tester_config.c
|
||||||
|
+++ b/src/libcharon/plugins/load_tester/load_tester_config.c
|
||||||
|
@@ -498,7 +498,27 @@ static bool parse_protoport(char *token, uint16_t *from_port,
|
||||||
|
*protocol = (uint8_t)p;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
- if (streq(port, "%any"))
|
||||||
|
+ if (*protocol == IPPROTO_GRE)
|
||||||
|
+ {
|
||||||
|
+ if (*port && !streq(port, "%any"))
|
||||||
|
+ {
|
||||||
|
+ p = strtol(port, &endptr, 0);
|
||||||
|
+ if (p < 0 || p > 0xffffffff)
|
||||||
|
+ {
|
||||||
|
+ return FALSE;
|
||||||
|
+ }
|
||||||
|
+ end->from_port = (p >> 16) & 0xffff;
|
||||||
|
+ end->to_port = p & 0xffff;
|
||||||
|
+ if (*endptr)
|
||||||
|
+ {
|
||||||
|
+ return FALSE;
|
||||||
|
+ }
|
||||||
|
+ } else {
|
||||||
|
+ end->from_port = 0;
|
||||||
|
+ end->to_port = 0;
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ else if (streq(port, "%any"))
|
||||||
|
{
|
||||||
|
*from_port = 0;
|
||||||
|
*to_port = 0xffff;
|
||||||
|
diff --git a/src/libcharon/plugins/stroke/stroke_config.c b/src/libcharon/plugins/stroke/stroke_config.c
|
||||||
|
index 55db379ff..b4340b8d1 100644
|
||||||
|
--- a/src/libcharon/plugins/stroke/stroke_config.c
|
||||||
|
+++ b/src/libcharon/plugins/stroke/stroke_config.c
|
||||||
|
@@ -927,7 +927,27 @@ static bool parse_protoport(char *token, uint16_t *from_port,
|
||||||
|
*protocol = (uint8_t)p;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
- if (streq(port, "%any"))
|
||||||
|
+ if (*protocol == IPPROTO_GRE)
|
||||||
|
+ {
|
||||||
|
+ if (*port && !streq(port, "%any"))
|
||||||
|
+ {
|
||||||
|
+ p = strtol(port, &endptr, 0);
|
||||||
|
+ if (p < 0 || p > 0xffffffff)
|
||||||
|
+ {
|
||||||
|
+ return FALSE;
|
||||||
|
+ }
|
||||||
|
+ *from_port = (p >> 16) & 0xffff;
|
||||||
|
+ *to_port = p & 0xffff;
|
||||||
|
+ if (*endptr)
|
||||||
|
+ return FALSE;
|
||||||
|
+ }
|
||||||
|
+ else
|
||||||
|
+ {
|
||||||
|
+ *from_port = 0;
|
||||||
|
+ *to_port = 0;
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ else if (streq(port, "%any"))
|
||||||
|
{
|
||||||
|
*from_port = 0;
|
||||||
|
*to_port = 0xffff;
|
||||||
|
diff --git a/src/libcharon/plugins/vici/vici_config.c b/src/libcharon/plugins/vici/vici_config.c
|
||||||
|
index c858e9945..c72c97f76 100644
|
||||||
|
--- a/src/libcharon/plugins/vici/vici_config.c
|
||||||
|
+++ b/src/libcharon/plugins/vici/vici_config.c
|
||||||
|
@@ -715,7 +715,31 @@ CALLBACK(parse_ts, bool,
|
||||||
|
proto = (uint8_t)p;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
- if (streq(port, "opaque"))
|
||||||
|
+ if (proto == IPPROTO_GRE)
|
||||||
|
+ {
|
||||||
|
+ if (*port && !streq(port, "any"))
|
||||||
|
+ {
|
||||||
|
+ DBG2(DBG_CFG, " GRE key %s", port);
|
||||||
|
+ p = strtol(port, &end, 0);
|
||||||
|
+ if (p < 0 || p > 0xffffffff)
|
||||||
|
+ {
|
||||||
|
+ DBG2(DBG_CFG, " Invalid GRE key %s", port);
|
||||||
|
+ return FALSE;
|
||||||
|
+ }
|
||||||
|
+ from = (p >> 16) & 0xffff;
|
||||||
|
+ to = p & 0xffff;
|
||||||
|
+ DBG2(DBG_CFG, " Parsed GRE key %d-%d(%d)", from, to, p);
|
||||||
|
+ if (*end)
|
||||||
|
+ {
|
||||||
|
+ DBG2(DBG_CFG, " Invalid GRE key %s", port);
|
||||||
|
+ return FALSE;
|
||||||
|
+ }
|
||||||
|
+ } else {
|
||||||
|
+ from = 0;
|
||||||
|
+ to = 0;
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ else if (streq(port, "opaque"))
|
||||||
|
{
|
||||||
|
from = 0xffff;
|
||||||
|
to = 0;
|
||||||
|
@@ -752,8 +776,14 @@ CALLBACK(parse_ts, bool,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
+ else if (proto == IPPROTO_GRE)
|
||||||
|
+ {
|
||||||
|
+ from = 0;
|
||||||
|
+ to = 0;
|
||||||
|
+ }
|
||||||
|
if (streq(buf, "dynamic"))
|
||||||
|
{
|
||||||
|
+ DBG2(DBG_CFG, " Create dynamic selector GRE key proto=%d, from_port=%d, to_port=%d", proto, from, to);
|
||||||
|
ts = traffic_selector_create_dynamic(proto, from, to);
|
||||||
|
}
|
||||||
|
else if (strchr(buf, '-'))
|
||||||
|
diff --git a/src/libstrongswan/selectors/traffic_selector.c b/src/libstrongswan/selectors/traffic_selector.c
|
||||||
|
index fe61e3768..09757ec36 100644
|
||||||
|
--- a/src/libstrongswan/selectors/traffic_selector.c
|
||||||
|
+++ b/src/libstrongswan/selectors/traffic_selector.c
|
||||||
|
@@ -205,6 +205,18 @@ static int print_icmp(printf_hook_data_t *data, uint16_t port)
|
||||||
|
return print_in_hook(data, "%d", type);
|
||||||
|
}
|
||||||
|
|
||||||
|
+/**
|
||||||
|
+ * Print GRE key
|
||||||
|
+ */
|
||||||
|
+static int print_gre(printf_hook_data_t *data, uint16_t from_port, uint16_t to_port)
|
||||||
|
+{
|
||||||
|
+ uint32_t gre_key;
|
||||||
|
+
|
||||||
|
+ gre_key = traffic_selector_gre_key(from_port, to_port);
|
||||||
|
+
|
||||||
|
+ return print_in_hook(data, "%d", gre_key);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
/**
|
||||||
|
* Described in header.
|
||||||
|
*/
|
||||||
|
@@ -319,6 +331,10 @@ int traffic_selector_printf_hook(printf_hook_data_t *data,
|
||||||
|
{
|
||||||
|
written += print_icmp(data, this->from_port);
|
||||||
|
}
|
||||||
|
+ else if (this->protocol == IPPROTO_GRE)
|
||||||
|
+ {
|
||||||
|
+ written += print_gre(data, this->from_port, this->to_port);
|
||||||
|
+ }
|
||||||
|
else
|
||||||
|
{
|
||||||
|
serv = getservbyport(htons(this->from_port), serv_proto);
|
||||||
|
@@ -332,6 +348,10 @@ int traffic_selector_printf_hook(printf_hook_data_t *data,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
+ else if (this->protocol == IPPROTO_GRE)
|
||||||
|
+ {
|
||||||
|
+ written += print_gre(data, this->from_port, this->to_port);
|
||||||
|
+ }
|
||||||
|
else if (is_opaque(this))
|
||||||
|
{
|
||||||
|
written += print_in_hook(data, "OPAQUE");
|
||||||
|
diff --git a/src/libstrongswan/selectors/traffic_selector.h b/src/libstrongswan/selectors/traffic_selector.h
|
||||||
|
index 367b4fff9..b7010e4a7 100644
|
||||||
|
--- a/src/libstrongswan/selectors/traffic_selector.h
|
||||||
|
+++ b/src/libstrongswan/selectors/traffic_selector.h
|
||||||
|
@@ -272,6 +272,18 @@ static inline uint8_t traffic_selector_icmp_code(uint16_t port)
|
||||||
|
return port & 0xff;
|
||||||
|
}
|
||||||
|
|
||||||
|
+/**
|
||||||
|
+ * Extract the GRE key from a source and destination port in host order
|
||||||
|
+ *
|
||||||
|
+ * @param from_port port number in host order
|
||||||
|
+ * @param to_port port number in host order
|
||||||
|
+ * @return GRE key
|
||||||
|
+ */
|
||||||
|
+static inline uint8_t traffic_selector_gre_key(uint16_t from_port, uint16_t to_port)
|
||||||
|
+{
|
||||||
|
+ return (from_port & 0xffff) << 16 | (to_port & 0xffff);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
/**
|
||||||
|
* Compare two traffic selectors, usable as sort function
|
||||||
|
*
|
||||||
|
diff --git a/src/starter/confread.c b/src/starter/confread.c
|
||||||
|
index 5065bc369..039b6f402 100644
|
||||||
|
--- a/src/starter/confread.c
|
||||||
|
+++ b/src/starter/confread.c
|
||||||
|
@@ -325,7 +325,29 @@ static void kw_end(starter_conn_t *conn, starter_end_t *end, kw_token_t token,
|
||||||
|
end->protocol = (uint8_t)p;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
- if (streq(port, "%any"))
|
||||||
|
+ if (end->protocol == IPPROTO_GRE)
|
||||||
|
+ {
|
||||||
|
+ if (*port && !streq(port, "%any"))
|
||||||
|
+ {
|
||||||
|
+ p = strtol(port, &endptr, 0);
|
||||||
|
+ if (p < 0 || p > 0xffffffff)
|
||||||
|
+ {
|
||||||
|
+ DBG1(DBG_APP, "# bad GRE key: %s=%s", key, port);
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ end->from_port = (p >> 16) & 0xffff;
|
||||||
|
+ end->to_port = p & 0xffff;
|
||||||
|
+ if (*endptr)
|
||||||
|
+ {
|
||||||
|
+ DBG1(DBG_APP, "# bad GRE key: %s=%s", key, port);
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ } else {
|
||||||
|
+ end->from_port = 0;
|
||||||
|
+ end->to_port = 0;
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ else if (streq(port, "%any"))
|
||||||
|
{
|
||||||
|
end->from_port = 0;
|
||||||
|
end->to_port = 0xffff;
|
||||||
|
diff --git a/src/swanctl/swanctl.opt b/src/swanctl/swanctl.opt
|
||||||
|
index d9fd949ed..1d63dadb8 100644
|
||||||
|
--- a/src/swanctl/swanctl.opt
|
||||||
|
+++ b/src/swanctl/swanctl.opt
|
||||||
|
@@ -765,6 +765,9 @@ connections.<conn>.children.<child>.local_ts = dynamic
|
||||||
|
value _opaque_ for RFC 4301 OPAQUE selectors. Port ranges may be specified
|
||||||
|
as well, none of the kernel backends currently support port ranges, though.
|
||||||
|
|
||||||
|
+ If protocol is restricted to GRE, port restriction specifies GRE key
|
||||||
|
+ in 32 bit numeric form eg. dynamic[gre/100].
|
||||||
|
+
|
||||||
|
When IKEv1 is used only the first selector is interpreted, except if
|
||||||
|
the Cisco Unity extension plugin is used. This is due to a limitation of the
|
||||||
|
IKEv1 protocol, which only allows a single pair of selectors per CHILD_SA.
|
||||||
|
--
|
||||||
|
2.45.2
|
||||||
|
|
||||||
4
sources
4
sources
@@ -1,2 +1,2 @@
|
|||||||
SHA512 (strongswan-5.9.8.tar.bz2.sig) = bf5c5fbcb6d14381260d1e79f6164170c3d568fbe2f623afb42b59bfa7e085551e26c43e4a41f4d8271d5f46601366f34fb52067bdd4c25a7633fa2fda83d5ae
|
SHA512 (strongswan-5.9.14.tar.bz2) = e48bc9d215f9de6b54e24f7b4765d59aec4c615291d5c1f24f6a6d7da45dc8b17b2e0e150faf5fabb35e5d465abc5e6f6efa06cd002467067c5d7844ead359f6
|
||||||
SHA512 (strongswan-5.9.8.tar.bz2) = 16d3afc80704f896f3f97addf452b4bb29fc1911c54e980f76ac48bdbe2340ce3bd4e79024848cb7961bbe9ad5458d93389343878ca042af658d51b11219666b
|
SHA512 (strongswan-5.9.14.tar.bz2.sig) = 1b3d57448caab91060fe3d209d90708c57dbf35ae62c97574107b32677cff73f13f7545dc91682ef84400bb8a2f105a1761aba8334763dc8c35d97be7921c242
|
||||||
|
|||||||
@@ -1,5 +1,6 @@
|
|||||||
%global _hardened_build 1
|
%global _hardened_build 1
|
||||||
#%%define prerelease dr1
|
#%%define prerelease dr1
|
||||||
|
%global dist .nhrp.11%{?dist}
|
||||||
|
|
||||||
%bcond_without python3
|
%bcond_without python3
|
||||||
%bcond_without perl
|
%bcond_without perl
|
||||||
@@ -12,20 +13,28 @@
|
|||||||
%bcond_with tss_trousers
|
%bcond_with tss_trousers
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
|
%global forgeurl0 https://github.com/strongswan/strongswan
|
||||||
|
|
||||||
Name: strongswan
|
Name: strongswan
|
||||||
Version: 5.9.8
|
Version: 5.9.14
|
||||||
Release: 1%{?dist}
|
Release: 1%{?dist}
|
||||||
Summary: An OpenSource IPsec-based VPN and TNC solution
|
Summary: An OpenSource IPsec-based VPN and TNC solution
|
||||||
License: GPLv2+
|
License: GPLv2+
|
||||||
URL: http://www.strongswan.org/
|
URL: https://www.strongswan.org/
|
||||||
Source0: http://download.strongswan.org/strongswan-%{version}%{?prerelease}.tar.bz2
|
VCS: git:%{forgeurl0}
|
||||||
Source1: http://download.strongswan.org/strongswan-%{version}%{?prerelease}.tar.bz2.sig
|
Source0: https://download.strongswan.org/strongswan-%{version}%{?prerelease}.tar.bz2
|
||||||
|
Source1: https://download.strongswan.org/strongswan-%{version}%{?prerelease}.tar.bz2.sig
|
||||||
Source2: https://download.strongswan.org/STRONGSWAN-RELEASE-PGP-KEY
|
Source2: https://download.strongswan.org/STRONGSWAN-RELEASE-PGP-KEY
|
||||||
Source3: tmpfiles-strongswan.conf
|
Source3: tmpfiles-strongswan.conf
|
||||||
Patch0: strongswan-5.6.0-uintptr_t.patch
|
Patch0: strongswan-5.6.0-uintptr_t.patch
|
||||||
# https://github.com/strongswan/strongswan/issues/1198
|
# https://github.com/strongswan/strongswan/issues/1198
|
||||||
Patch1: strongswan-5.9.7-error-no-format.patch
|
Patch1: strongswan-5.9.7-error-no-format.patch
|
||||||
|
|
||||||
|
Patch10: 0001-charon-add-optional-source-and-remote-overrides-for-.patch
|
||||||
|
Patch11: 0002-vici-send-certificates-for-ike-sa-events.patch
|
||||||
|
Patch12: 0003-vici-add-support-for-individual-sa-state-changes.patch
|
||||||
|
Patch13: 0004-Support-GRE-key-in-selectors.patch
|
||||||
|
|
||||||
BuildRequires: autoconf
|
BuildRequires: autoconf
|
||||||
BuildRequires: automake
|
BuildRequires: automake
|
||||||
BuildRequires: gnupg2
|
BuildRequires: gnupg2
|
||||||
@@ -56,7 +65,7 @@ BuildRequires: python3-pytest
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%if %{with perl}
|
%if %{with perl}
|
||||||
BuildRequires: perl-devel perl-macros
|
BuildRequires: perl-devel perl-generators
|
||||||
BuildRequires: perl(ExtUtils::MakeMaker)
|
BuildRequires: perl(ExtUtils::MakeMaker)
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
@@ -252,6 +261,9 @@ for p in bypass-lan; do
|
|||||||
echo -e "\ncharon.plugins.${p}.load := no" >> conf/plugins/${p}.opt
|
echo -e "\ncharon.plugins.${p}.load := no" >> conf/plugins/${p}.opt
|
||||||
done
|
done
|
||||||
|
|
||||||
|
# ensure manual page is regenerated with local configuration
|
||||||
|
rm -f src/ipsec/_ipsec.8
|
||||||
|
|
||||||
%make_build
|
%make_build
|
||||||
|
|
||||||
pushd src/libcharon/plugins/vici
|
pushd src/libcharon/plugins/vici
|
||||||
@@ -410,6 +422,40 @@ install -D -m 0644 %{SOURCE3} %{buildroot}/%{_tmpfilesdir}/strongswan-starter.co
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri May 31 2024 Paul Wouters <paul.wouters@aiven.io> - 5.9.14-1
|
||||||
|
- Resolves: rhbz#2254560 CVE-2023-41913 buffer overflow and possible RCE
|
||||||
|
- Resolved: rhbz#2250666 Update to 5.9.14 (IKEv2 OCSP extensions, seqno/regno overflow handling
|
||||||
|
- Update to 5.9.13 (OCSP nonce set regression configuration option charon.ocsp_nonce_len)
|
||||||
|
- Update to 5.9.12 (CVE-2023-41913 fix, various IKEv2 fixes)
|
||||||
|
|
||||||
|
* Sat Jan 27 2024 Fedora Release Engineering <releng@fedoraproject.org> - 5.9.11-3
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
|
||||||
|
|
||||||
|
* Sat Jul 22 2023 Fedora Release Engineering <releng@fedoraproject.org> - 5.9.11-2
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
|
||||||
|
|
||||||
|
* Fri Jul 14 2023 Paul Wouters <paul.wouters@aiven.io - 5.9.11-1
|
||||||
|
- Resolves: rhbz#2214186 strongswan-5.9.11 is available
|
||||||
|
|
||||||
|
* Tue Jun 13 2023 Python Maint <python-maint@redhat.com> - 5.9.10-2
|
||||||
|
- Rebuilt for Python 3.12
|
||||||
|
|
||||||
|
* Thu Mar 02 2023 Paul Wouters <paul.wouters@aiven.io - 5.9.10-1
|
||||||
|
- Update to 5.9.10
|
||||||
|
|
||||||
|
* Tue Feb 28 2023 Paul Wouters <paul.wouters@aiven.io - 5.9.9-3
|
||||||
|
- Resolves: CVE-2023-26463 authorization bypass in TLS-based EAP methods
|
||||||
|
|
||||||
|
* Mon Jan 16 2023 Petr Menšík <pemensik@redhat.com> - 5.9.9-2
|
||||||
|
- Use configure paths in manual pages (#2106120)
|
||||||
|
|
||||||
|
* Sun Jan 15 2023 Petr Menšík <pemensik@redhat.com> - 5.9.9-1
|
||||||
|
- Update to 5.9.9 (#2157850)
|
||||||
|
|
||||||
|
* Thu Dec 08 2022 Jitka Plesnikova <jplesnik@redhat.com> - 5.9.8-2
|
||||||
|
- Add BR perl-generators to automatically generates run-time dependencies
|
||||||
|
for installed Perl files
|
||||||
|
|
||||||
* Sun Oct 16 2022 Arne Reiter <redhat@arnereiter.de> - 5.9.8-1
|
* Sun Oct 16 2022 Arne Reiter <redhat@arnereiter.de> - 5.9.8-1
|
||||||
- Resolves rhbz#2112274 strongswan-5.9.8 is available
|
- Resolves rhbz#2112274 strongswan-5.9.8 is available
|
||||||
- Patch1 removes CFLAGS -Wno-format which interferes with -Werror=format-security
|
- Patch1 removes CFLAGS -Wno-format which interferes with -Werror=format-security
|
||||||
|
|||||||
Reference in New Issue
Block a user