Nikos Mavrogiannopoulos
53c7bbeb1d
ocserv: corrected debug message
2014-06-26 13:47:54 +02:00
Nikos Mavrogiannopoulos
309ad41475
ocserv: print the correct message when only selecting a group.
2014-06-26 13:46:31 +02:00
Nikos Mavrogiannopoulos
3de707b0fe
introduced str_append_printf()
2014-06-26 13:46:31 +02:00
Nikos Mavrogiannopoulos
5ef450086d
tests: Increased the server start wait time
2014-06-26 13:46:31 +02:00
Nikos Mavrogiannopoulos
e5434ea89e
tests: Added check for certificate-only client with groups
2014-06-26 13:46:31 +02:00
Nikos Mavrogiannopoulos
4fa0053d54
ocserv: prompt the user for group selection even if only certificate authentication is used.
2014-06-26 13:46:31 +02:00
Nikos Mavrogiannopoulos
caa98a05fd
document how to convert key to pkcs12 file
2014-06-26 08:29:54 +02:00
Nikos Mavrogiannopoulos
29a0604eb0
doc update
2014-06-25 22:00:58 +02:00
Nikos Mavrogiannopoulos
3fac1c4e0c
search for group_list in addition to group%5flist
...
That allows to read the group from AnyConnect clients.
2014-06-25 21:58:00 +02:00
Nikos Mavrogiannopoulos
e48ad13e82
Set the applicable DNS and NBNS servers in complete_vpn_info().
2014-06-25 10:11:00 +02:00
Nikos Mavrogiannopoulos
a144fde0e4
Eliminated the MAX_ROUTES requirement.
2014-06-25 10:05:34 +02:00
Nikos Mavrogiannopoulos
3e3e05f30a
doc update
2014-06-25 10:04:10 +02:00
Nikos Mavrogiannopoulos
4a0b16fb98
Forward the appropriate DNS and NBNS values when using a per-user/group config.
2014-06-25 10:02:16 +02:00
Nikos Mavrogiannopoulos
6ebaac8839
tests: Added check for the basic commands of ocpasswd.
2014-06-24 14:00:40 +02:00
Nikos Mavrogiannopoulos
4117bf2661
Use a more terse, but with more dynamic information version string.
2014-06-23 21:09:43 +02:00
Nikos Mavrogiannopoulos
0629345022
Avoid using snprintf() and simply use strcpy().
2014-06-23 17:30:15 +02:00
Nikos Mavrogiannopoulos
85288fd96f
Ignore the return code of snprintf(); it is useless.
2014-06-23 17:26:01 +02:00
Nikos Mavrogiannopoulos
1d2f36f9bf
When renegotiating, verify that any certificate received from the client contains the same username.
2014-06-13 15:08:40 +02:00
Nikos Mavrogiannopoulos
18cef50ebe
doc update
2014-06-12 15:36:39 +02:00
Nikos Mavrogiannopoulos
70623591d5
Seccomp is now compiled in by default, and can be enabled at run-time.
2014-06-12 15:35:45 +02:00
Nikos Mavrogiannopoulos
ae3b9e5111
doc update
2014-06-12 10:20:10 +02:00
Hexchain Tong
41ff067641
Fix array subscription in unescape_url
...
Passwords with url escaped characters were parsed incorrectly. The
variable used for iterating over `url` should be `i`, not `pos`. This
patch fixes the problem.
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com >
2014-06-12 10:19:03 +02:00
Nikos Mavrogiannopoulos
11bc2819da
doc update
2014-06-12 10:19:03 +02:00
Nikos Mavrogiannopoulos
4a91581d92
doc update
2014-06-10 20:49:34 +02:00
Nikos Mavrogiannopoulos
23f6e8e187
removed debugging message
2014-06-10 15:58:53 +02:00
Nikos Mavrogiannopoulos
c49128f1bb
doc update
2014-06-10 15:50:55 +02:00
Nikos Mavrogiannopoulos
cfa74a4e29
Reload the configuration of the security module as well, on main process reload.
2014-06-10 15:47:58 +02:00
Nikos Mavrogiannopoulos
9e4be33533
Added sequence diagram describing the session control operation.
2014-06-10 15:39:10 +02:00
Nikos Mavrogiannopoulos
021febe5d8
doc update
2014-06-10 15:16:54 +02:00
Nikos Mavrogiannopoulos
28dca2aa0c
Added support for session control (relevant for PAM for now)
...
That in effect will utilize the pam_open_session() and pam_close_session().
It is disabled by default as it requires more resources from the security module.
2014-06-10 15:16:40 +02:00
Nikos Mavrogiannopoulos
01db3e5817
Include the SID into the cookie and store it in proc_st.
2014-06-10 10:41:10 +02:00
Nikos Mavrogiannopoulos
089463840e
doc update
2014-06-10 10:09:48 +02:00
Nikos Mavrogiannopoulos
0a0b51ab37
Added work-around for openconnect v3.20
...
That version of openconnect requires some strict format on the
XML messages. Thus we send it, what it expects.
2014-06-10 10:08:46 +02:00
Nikos Mavrogiannopoulos
46f9327684
removed unused protobuf variable
2014-06-09 16:55:49 +02:00
Nikos Mavrogiannopoulos
a3b8745f44
tests: check for special characters into username in addition to password
2014-06-09 15:18:50 +02:00
Nikos Mavrogiannopoulos
b4544a9582
Send the server version string to client.
2014-06-03 17:42:32 +02:00
Nikos Mavrogiannopoulos
74855461bf
TODO: removed completed item
2014-06-02 23:40:16 +02:00
Nikos Mavrogiannopoulos
4489ff3cc6
removed dbus from the dependencies
2014-06-02 23:35:57 +02:00
Nikos Mavrogiannopoulos
3bbfc46280
doc update
2014-06-02 23:32:02 +02:00
Nikos Mavrogiannopoulos
3248651120
ocpasswd: added parameter to delete a user.
2014-06-02 23:31:40 +02:00
Nikos Mavrogiannopoulos
f69353fedc
bumped version
2014-06-02 15:23:10 +02:00
Nikos Mavrogiannopoulos
961171e73b
doc update
2014-06-02 14:52:23 +02:00
Nikos Mavrogiannopoulos
cbe4d80b1e
No longer install d-bus or systemd files.
2014-06-02 14:52:13 +02:00
Nikos Mavrogiannopoulos
fb2b1e5504
doc update
2014-06-02 14:39:37 +02:00
Brian Chu
2a6111eef8
Fix tun IPv6 on platforms that use SIOCAIFADDR_IN6.
...
Also remove a redundant call to SIOCDIFADDR. A freshly
cloned tun interface should not have existing aliases.
2014-06-02 14:37:46 +02:00
Nikos Mavrogiannopoulos
2e5bd4bbf8
removed double header inclusion
2014-06-02 11:54:40 +02:00
Brian Chu
4001719560
Fix insufficient arguments in an error message.
...
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com >
2014-06-02 11:52:41 +02:00
Nikos Mavrogiannopoulos
8c55420a12
Avoid warning due to unused variables.
2014-06-02 11:49:58 +02:00
Brian Chu
de0388a3f7
Fix tun device usage on *BSD.
...
SIOCSIFADDR is deprecated on *BSD. Instead, use SIOCAIFADDR to
add an alias. Also destroy the tun device with SIOCIFDESTROY when
the client disconnects.
2014-06-02 11:49:08 +02:00
Nikos Mavrogiannopoulos
264114e799
doc update
2014-06-02 09:33:26 +02:00