1. 28 9月, 2014 1 次提交
    • Michael Rash's avatar
      Use the fwknop User-Agent for wget SSL external IP resolutions · 50434c5c
      Michael Rash 创作于
      Bug fix to ensure that a User-Agent string can be specified when the
      fwknop client uses wget via SSL to resolve the external IP address. This
      closes issue #134 on github reported by Barry Allard. The fwknop now
      uses the wget '-U' option to specify the User-Agent string with a
      default of "Fwknop/<version>". In addition, a new command line argument
      "--use-wget-user-agent" to allow the default wget User-Agent string to
      apply instead.
      50434c5c
  2. 28 7月, 2014 1 次提交
  3. 25 7月, 2014 1 次提交
    • Michael Rash's avatar
      [client] Updated IP resolution mode -R to use SSL · 59718f1a
      Michael Rash 创作于
      External IP resolution via '-R' (or '--resolve-ip-http') is now done via SSL by
      default. The IP resolution URL is now 'https://www.cipherdyne.org/cgi-gin/myip',
      and a warning is generated in '-R' mode whenever a non-HTTPS URL is specified
      (it is safer just to use the default). The fwknop client leverages 'wget' for
      this operation since that is cleaner than having fwknop link against an SSL
      library.
      59718f1a
  4. 06 6月, 2014 1 次提交
    • Michael Rash's avatar
      add --fault-injection-tag support to the client/server/libfko · 6d1d66fe
      Michael Rash 创作于
      This is a significant commit to add the ability to leverage libfko fault
      injections from both the fwknop client and server command lines via a
      new option '--fault-injection-tag <tag name>'.  This option is used by
      the test suite with the tests/fault_injection.pl tests.
      6d1d66fe
  5. 25 3月, 2014 1 次提交
    • Michael Rash's avatar
      [client+server] verify GnuPG signatures by default · 73bc4735
      Michael Rash 创作于
      - [server] When GnuPG is used, the default now is to require that
      incoming SPA packets are signed by a key listed in GPG_REMOTE_ID for each
      access.conf stanza. In other words, the usage of GPG_REQUIRE_SIG
      is no longer necessary in order to authenticate SPA packets via the
      GnuPG signature. Verification of GnuPG signatures can be disabled with a
      new access.conf variable GPG_DISABLE_SIG, but this is NOT a
      recommended configuration.
      - [client+server] Add --gpg-exe command line argument and GPG_EXE
      config variable to ~/.fwknoprc and the access.conf file so that the path
      to GnuPG can be changed from the default /usr/bin/gpg path.
      73bc4735
  6. 14 3月, 2014 1 次提交
  7. 12 3月, 2014 1 次提交
  8. 04 3月, 2014 2 次提交
  9. 28 1月, 2014 1 次提交
  10. 18 1月, 2014 1 次提交
  11. 30 7月, 2013 1 次提交
  12. 18 7月, 2013 1 次提交
  13. 30 6月, 2013 1 次提交
  14. 19 6月, 2013 1 次提交
    • Michael Rash's avatar
      [client] add GPG_ALLOW_NO_SIGNING_PW and --gpg-no-signing-pw · 13173343
      Michael Rash 创作于
      This change brings similar functionality to the client as the GPG_ALLOW_NO_PW
      keyword in the server access.conf file.  Although this option is less likely
      to be used than the analogous server functionality, it stands to reason that
      the client should offer this feature.  The test suite has also been updated to
      not use the --get-key option for the 'no password' GPG tests.
      13173343
  15. 02 6月, 2013 1 次提交
  16. 18 5月, 2013 1 次提交
  17. 06 5月, 2013 1 次提交
  18. 05 5月, 2013 2 次提交
  19. 20 4月, 2013 1 次提交
  20. 08 3月, 2013 1 次提交
  21. 05 3月, 2013 1 次提交
  22. 15 2月, 2013 1 次提交
  23. 12 10月, 2012 1 次提交
  24. 03 7月, 2012 1 次提交
  25. 28 6月, 2012 1 次提交
    • Michael Rash's avatar
      Added key generation support with --key-gen · 3095f0ee
      Michael Rash 创作于
      Added --key-gen to allow KEY_BASE64 and HMAC_KEY_BASE64 keys to be created from
      reading random data from /dev/random.  These keys can be placed within server
      access.conf files and corresponding client .fwknoprc files for SPA
      communications.  The HMAC key is not used yet with this commit, but that is
      coming.
      3095f0ee
  26. 25 1月, 2012 1 次提交
    • Michael Rash's avatar
      Update to make AES encryption modes selectable · 4c3d2188
      Michael Rash 创作于
      This is a significant update to allow AES encryption modes to be selected on a
      per-key basis.  For now, only ECB and CBC (recommended) modes are supported.
      The default is ECB modes in order to maintain backwards compatibility with the
      older perl version of fwknop and the Crypt::CBC CPAN module.  This will likely
      be changed to use CBC mode by default because of its better security
      properties.
      
      In the access.conf file on the server side, there is a new configuration
      variable "ENCRYPTION_MODE" that controls the mode for the corresponding AES
      key.  On the client side, a new command line argument "--encryption-mode"
      controls how the client encrypts SPA packets.
      4c3d2188
  27. 20 8月, 2011 2 次提交
  28. 07 7月, 2011 1 次提交
  29. 19 6月, 2011 1 次提交
  30. 13 11月, 2010 1 次提交
  31. 05 7月, 2010 1 次提交
  32. 27 6月, 2010 1 次提交
  33. 16 1月, 2010 2 次提交
  34. 09 1月, 2010 1 次提交
  35. 04 1月, 2010 1 次提交
  36. 03 1月, 2010 1 次提交