~mamarley/openconnect/+git/gitlab-main:pulse-esp-off

Last commit made on 2023-07-25
Get this branch:
git clone -b pulse-esp-off https://git.launchpad.net/~mamarley/openconnect/+git/gitlab-main

Branch merges

Branch information

Name:
pulse-esp-off
Repository:
lp:~mamarley/openconnect/+git/gitlab-main

Recent commits

e39e0fa... by dwmw2

ESP reconnect hackery

Signed-off-by: David Woodhouse <email address hidden>

adf2c60... by dwmw2

Fix pulse concat

Signed-off-by: David Woodhouse <email address hidden>

0dc86eb... by dwmw2

Merge branch 'pulse_concatenated_and_split_packets' of gitlab.com:openconnect/openconnect

c8345aa... by dwmw2

More tweaks to Pulse and oNCP ESP switching

I could have sworn that at some point this morning, that trick of turning
ESP off and then on again was working, and allowing reconnections. But I
can't reproduce that after correct amounts of coffee. I only ever see it
being turned *off*, and a log message 'Transport mode switched over to SSL
for user with NCIP 10.200.200.1', and staying off.

The server seems to default to ESP enabled if we've configured ESP, even
before the probes occur. The client has to explicitly turn it *off* with
the 'ncmo=0' packet, to fall back to TLS. And then can't turn ESP back
on again, AFAICT. This is kind of stupid, but it doesn't look like we
can do any better.

Signed-off-by: David Woodhouse <email address hidden>

f60364c... by dwmw2

Move ncmo=1 back to startup for pulse

Signed-off-by: David Woodhouse <email address hidden>

94fc9ba... by dwmw2

Attempt to close ESP between attempts

Signed-off-by: David Woodhouse <email address hidden>

25c3517... by dwmw2

Clean up Pulse ESP on/off packet queueing

Only send the ncmo=1 packet once ESP is *established*, like Juniper does.

However... this *might* break ESP completely, if the server isn't even
listening until we send ncmo=1. The Windows client does seem to send
it up front...

Signed-off-by: David Woodhouse <email address hidden>

3b8ba24... by dwmw2

Attempt to send ESP-off packet for Pulse (#479)

Signed-off-by: David Woodhouse <email address hidden>

116a80b... by dwmw2

Fix TPMv2 ECDSA signature ASN.1

I lifted this code to use it elsewhere and found that 'openssl dgst -verify'
didn't like the resulting signatures.

So ensure we have a definite lengh for the overall SEQUENCE and that we
don't have gratuitous zeroes at the start of each INTEGER. Even 'openssl
asn1parse' whines about the latter, calling it a :BAD INTEGER:.

I can't find any documentation which mandates DER, and I don't see the
point since there's a randomly generated salt so there's no 'canonical'
signature result anyway. But it doesn't hurt, and this matches what
GnuTLS does in 3.6.0 onwards where it *does* provide this function.

Signed-off-by: David Woodhouse <email address hidden>

9634851... by dwmw2

Merge branch 'openssl-legacy' of gitlab.com:floppym/openconnect