482 Commits

Author SHA1 Message Date
Mark Plomer
acdf14e636 implemented wildcard includes for ipsec/strongswan 2019-03-11 10:09:03 +01:00
Ad Schellevis
2c2eca7e2f OpenVPN server, support static-challenge formatted password, closes https://github.com/opnsense/core/issues/3290 2019-03-06 10:20:02 +01:00
Ad Schellevis
139ef623dc IPSec / routed (VTI), fix previous, https://github.com/opnsense/core/issues/2332 2019-03-05 15:59:17 +01:00
Ad Schellevis
77743cfc09 IPSec / routed (VTI), create virtual terminal interfaces for https://github.com/opnsense/core/issues/2332
- ipsec_configure_vti() synchronizes local configuration with current ipsec% interfaces
- ipsec_interfaces() automatically adds these interfaces to the interfaces list, so the user can add a gateway and routes
2019-03-05 15:27:54 +01:00
Ad Schellevis
858f68d7b9 IPsec, while working on https://github.com/opnsense/core/issues/2332 found some weirdness around ipsec_get_phase1_src()
both get_interface_ipv6() and get_interface_ip() call get_failover_interface() which obscures the used parameters a lot (wan,lan,opt1 vs emX,emY,igbX)
2019-03-05 11:38:42 +01:00
Ad Schellevis
d9dbcaf052 IPSec / routed (VTI). add tunnel settings to phase2, https://github.com/opnsense/core/issues/2332 2019-03-04 19:41:44 +01:00
Ad Schellevis
a045d3e9f6 IPSec / routed (VTI), when auto_routes_disable is set, set auto = start in stead of route, for https://github.com/opnsense/core/issues/2332 2019-03-04 16:10:09 +01:00
Ad Schellevis
4c3d069ca4 IPSec / routed (VTI), make sure all connections use predefined reqid, for https://github.com/opnsense/core/issues/2332
it would be good to refactor this code at some point, maybe wrap some of its logic in a class.
There's just too much logic in ipsec_configure_do at the moment
2019-03-04 15:43:08 +01:00
Ad Schellevis
9ccabe68a6 IPsec / routed (VTI), make installpolicy optional, for https://github.com/opnsense/core/issues/2332 2019-03-04 14:10:05 +01:00
Franco Fichtner
80feeafa46 unbound: remove debug output #3260 2019-03-04 07:29:32 +01:00
Franco Fichtner
0242bac1f9 src: style sweep 2019-03-01 19:02:32 +01:00
Franco Fichtner
81438578db unbound: add alias support for #3260
Break the rules of the Dnsmasq implementation while at it:

An alias can consist of a host and/or domain and/or description.
At least a host name or a domain need to be set, the rest will be
taken from the original entry.

Missing GUI parts in the override section...
2019-03-01 08:55:50 +01:00
Ad Schellevis
21f1580348 IPsec, switch to PAM, closes https://github.com/opnsense/core/issues/3265 2019-02-28 15:32:03 +01:00
Ad Schellevis
02fd4f4c7f Web proxy, switch to PAM, closes https://github.com/opnsense/core/issues/3261 2019-02-28 09:57:54 +01:00
Franco Fichtner
63ed46dcea system: small cleanups in session file handling 2019-02-25 07:06:05 +01:00
Franco Fichtner
96683647f5 openvpn: try to "solve" get_failover_interface() issues
This seems to be a cosmetic cleanup.  get_failover_interface()
is used incorrectly but then merely seems to be used to look
up IPv4 connectivity to make a "smart" decision about resync
duties.

A few annoying and disabled line removals while here.
2019-02-25 05:42:21 +01:00
Franco Fichtner
6a4fa40e72 interfaces: small audit of get_failover_interface() 2019-02-24 20:58:36 +01:00
Ad Schellevis
a22e5a7690 php session, fix previous 2019-02-18 14:46:47 +01:00
Ad Schellevis
426b0e1ea6 Revert "php session path, 3eba9a739e"
This reverts commit 545f29a7d2a883696f4923286bbb21dd9e5618d6.
2019-02-18 14:43:42 +01:00
Ad Schellevis
545f29a7d2 php session path, 3eba9a739e 2019-02-18 14:03:55 +01:00
Ad Schellevis
3eba9a739e php, move session files into it's own directory 2019-02-17 18:37:51 +01:00
Franco Fichtner
156d6f7287 openvpn: daemon is already in the config #3223 2019-02-14 18:58:59 +01:00
Franco Fichtner
c217bee6f2 openvpn: proper daemonize instead of background job #3223 2019-02-14 18:37:36 +01:00
Franco Fichtner
f10b710a58 openvpn: remove stale PID file as well
PR: https://github.com/opnsense/core/issues/3223
Suggested by: @marjohn56
2019-02-14 18:22:18 +01:00
Franco Fichtner
5bc3ed8ccf src: style sweep 2019-02-14 18:08:59 +01:00
Ad Schellevis
67f4948670 OpenVPN, extract ca chain for https://github.com/opnsense/core/issues/1487 2019-02-13 11:19:13 +01:00
Franco Fichtner
e4393e0dec openssh: no hay /var/log/lastlog 2019-02-06 16:20:45 +01:00
Ad Schellevis
8f45e0d862 ipsec, nat before ipsec. if peer identifier isn't an address, spdadd can't add a tunnel. switch to remote-gateway if that is a valid ip address.
It's not a complete fix, for https://github.com/opnsense/core/issues/1773 but improves error logging and adds functionality when peer identifier is currently broken.
2019-02-05 11:23:14 +01:00
Ad Schellevis
f201d02b6c missed a spot in previous 2019-01-16 13:36:23 +01:00
Ad Schellevis
ac99876358 IPsec, add interface when phase1 is enabled, simplify logic. (from irc) 2019-01-16 13:21:54 +01:00
Max Weller
8464cfc31e Generate correct config for "Hybrid-RSA + XAuth" IPSec (#3117) 2019-01-10 14:44:17 +00:00
Franco Fichtner
53024b5c15 unbound: prefer-ip6 is defaulting to 'no' for unbound
which makes this precaution a complication as unbound disables
IPv6 responses with it as well and we shouldn't set prefer-ip6
to 'yes' to avoid further breakage.

PR: https://forum.opnsense.org/index.php?topic=10810.0
2019-01-06 20:48:17 +01:00
Michael Steenbeek
2c61e068a2 Small fixes (#3096) 2019-01-04 09:26:16 +01:00
Franco Fichtner
fada24d7c3 unbound: don't stop unbound_dhcpd twice, small refactor
Also see: https://www.reddit.com/r/OPNsenseFirewall/comments/aac7xj/does_this_pfsense_dns_bug_with_dhcp_and_multiple/
2019-01-04 07:43:50 +01:00
Franco Fichtner
0c751d732a unbound: calculation is still suboptimal #3092
On the far side of the interval up to the next power of two
the lock contention increases drastically, meaning 31 threads
will only get 32 slabs etc.
2019-01-03 13:06:48 +00:00
Franco Fichtner
c6de22b584 unbound: optimize optimization calculation #3092 2019-01-03 13:52:08 +01:00
Franco Fichtner
2bcc8f8a91 unbound: whitespace nit 2018-12-29 10:41:47 +01:00
Franco Fichtner
2c83768395 unbound: small error in previous #3051 2018-12-29 10:36:26 +01:00
Franco Fichtner
6cbae54033 unbound: since we support OpenVPN officially now...
fix the subnet of the tunnel network given via OpenVPN.

PR: https://github.com/opnsense/core/issues/3051
2018-12-29 10:32:45 +01:00
Franco Fichtner
333dc0fce8 unbound: exclude OpenVPN from IP registration for #2828 2018-12-28 17:46:16 +01:00
Michael Steenbeek
d27cc83642 Change foreach loops that don't use values to use array_keys() 2018-12-18 14:37:11 +01:00
Franco Fichtner
60f9ffea93 openvpn: make remote network optional
PR: https://twitter.com/simonszu/status/1074927719006306304
2018-12-18 12:30:41 +01:00
Franco Fichtner
d9f7574147 ipsec: mark descriptions "$unused" where appropriate 2018-12-16 21:17:43 +01:00
Michael Steenbeek
b36c30825c Clean up IPsec log levels 2018-12-12 15:23:21 +01:00
Franco Fichtner
0023784905 ipsec: avoid if return, else return 2018-12-08 16:20:46 +01:00
Franco Fichtner
3d8fd0088a unbound: restart if already down for #2894 2018-12-08 11:07:35 +01:00
Franco Fichtner
f72797d269 unbound: cleanup 2018-12-07 17:36:04 +01:00
Franco Fichtner
5cf8b4f2e2 unbound: probable fix for #3020 2018-12-07 12:29:58 +00:00
Michael Steenbeek
aed23a9ecb Clean up ipsec_convert_to_modp() 2018-12-05 16:14:22 +01:00
Franco Fichtner
536543be11 ipsec: already changed vs. stable/18.7, might as well do this 2018-12-05 08:25:42 +01:00