Skip to content


Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
100644 222 lines (190 sloc) 10.8 kb
bcba9d6 @mrash added CREDITS file, bumped software version, added ChangeLog files
1 Jonathan Bennett
2 - Contributed OpenWRT support - see the extras/openwrt/ directory.
4 Sebastien Jeanquier
5 - Assisted with getting fwknop included in BackTrack Linux - the choice
bfdbb8f @mrash Updated authorship and copyright information
6 distro for pentration testers.
bcba9d6 @mrash added CREDITS file, bumped software version, added ChangeLog files
8 Ozmart
9 - Suggested the idea for setting an access stanza expiration time.
10 - Suggested the abiliy to have certain incoming connections automatically
11 NAT'd through to specific internal systems. The result was the FORCE_NAT
12 mode.
13 - Assisted with getting fwknop running under the Pentoo Linux distro.
15 Max Kastanas
16 - Contributed both an Android and an iPhone fwknop client port - see the
17 top level android/ and iphone/ directories.
5c26c0a @mrash added Ted Wynnychenko for OpenBSD PF testing
19 Ted Wynnychenko
20 - Helped test fwknop PF support on OpenBSD.
ba3b7d1 @mrash Bug fix for multi-stanza key use and replay attack detection
22 Andy Rowland
23 - Reported a bug where the same encryption key used for two stanzas in the
24 access.conf file would result in access requests that matched the second
25 stanza to always be treated as a replay attack. This has been fixed for
26 the fwknop-2.0.1 release.
5387242 @mrash PCAP_LOOP_SLEEP bug fix to 1/10th of a second
28 C Anthony Risinger
29 - Caught a bug where the default PCAP_LOOP_SLEEP value was 1/100th of a
30 second instead of the intended default of 1/10th of a second.
3c533de @mrash updated Debian init script (contributed by Franck Joncourt)
32 Franck Joncourt
33 - fwknop Debian package maintainer.
34 - Contributed a new Debian init script.
67f5d1f @mrash Applied perl FKO module libfko path patch from Franck Joncourt
35 - Contributed a patch to have the perl FKO module link against libfko in
36 the local directory (if it exists) so that it doesn't have to have libfko
37 completely installed in /usr/lib/. This allows the test suite to run FKO
38 tests without installing libfko.
627035f @mrash Patch from Franck Joncourt for setting permissions via open()
39 - Contributed a patch to remove unnecessary chmod() call when creating
40 client rc file and server replay cache file. The permissions are now set
41 appropriately via open(), and at the same time this patch fixes a
42 potential race condition since the previous code used fopen() followed by
43 chmod().
03b222d @mrash [client] (Franck Joncourt) Fixed Ctrl-C problem where SPA packets were s...
44 - Contributed a patch to allow the fwknop client to be stopped with Ctrl-C
45 before sending an SPA packet on the wire.
fd41308 @mrash added info for Franck's latest contribution
46 - Contributed a patch to ensure that duplicate iptables rules are not
47 created even for different SPA packets that arrive at the same time and
48 request the same access.
77c876c @mrash credits and changelog updates
49 - Added support for resolving hostnames in various NAT modes (fixes issue
50 #43 in github).
892ee15 @mrash ChangeLog and credits updates for Franck
51 - Bug fix in the client for resolving hostnames in '-P icmp' mode (fixes
52 issue #64).
77c876c @mrash credits and changelog updates
53 - Added support for saving fwknop client command line arguments via a new
66399fe @mrash Merge remote-tracking branch 'fjoncourt/master'
54 option --save-rc-stanza.
892ee15 @mrash ChangeLog and credits updates for Franck
55 - Added log module support for the client.
66399fe @mrash Merge remote-tracking branch 'fjoncourt/master'
56 - Added the ability to read a passphrase from STDIN and also from a file
57 descriptor via --fd (closes #74).
0ecc2d2 @mrash minor docs update
58 - Added libfko unit tests via the CUnit framework.
7061b7b @mrash added Jonathan Schulz
60 Jonathan Schulz
61 - Submitted patches to change HTTP connection type to 'close' for -R mode
62 in the client and fix a bug for recv() calls against returned HTTP data.
fd30440 @mrash added Aldan Beaubien for reporting the Morpheus NULL IP problem
64 Aldan Beaubien
65 - Reported an issue with the Morpheus client sending SPA packets with NULL
66 IP addresses, and code was added to fwknopd to better validate incoming
67 SPA data as a result of this report.
fbdae50 @mrash added Geoff Carstairs for the FORCE_NAT idea
69 Geoff Carstairs
70 - Suggested a way to redirect valid connection requests to a specific
71 internal service via NAT, configurable by each stanza in access.conf.
72 This allows for better access control for multple users requiring access
73 to multiple internal systems, in a manner that is transparent to the
74 user. The result was the FORCE_NAT mode.
543de16 @mrash [server] iptables 'comment' match check
76 Hank Leininger
45e29f6 @mrash minor edit to credits file for Hank Leininger
77 - Contributed a patch to greatly extend libfko error code descriptions at
78 various places in order to give much better information on what certain
79 error conditions mean. Closes #98.
80 - Suggested the ability to read a passphrase from STDIN and via a new --fd
81 command line argument (github #74) to allow things like:
82 $ gpg -d passphrasefile.pgp | fwknop -R -n myserver
543de16 @mrash [server] iptables 'comment' match check
83 - For iptables firewalls, suggested a check for the 'comment' match to
84 ensure the local environment will properly support fwknopd operations.
85 The result is the new ENABLE_IPT_COMMENT_CHECK functionality.
d46ba1c @mrash (Fernando Arnaboldi, IOActive) Found and fixed several DoS/code executio...
87 Fernando Arnaboldi (IOActive)
88 - Found important buffer overflow conditions for authenticated SPA clients
89 in the fwknopd server (pre-2.0.3). These findings enabled fixes to be
90 developed along with a new fuzzing capability in the test suite.
f4c16bc @mrash [server] Stronger IP validation based on a bug found by Fernando Arnabol...
91 - Found a condition in which an overly long IP from malicious authenticated
92 clients is not properly validated by the fwknopd server (pre-2.0.3).
e2c0ac4 @mrash [server] Strong access.conf validation
93 - Found a local buffer overflow in --last processing with a maliciously
94 constructed ~/ file. This has been fixed with proper
95 validation of arguments.
96 - Found several conditions in which the server did not properly throw out
97 maliciously constructed variables in the access.conf file. This has been
98 fixed along with new fuzzing tests in the test suite.
591416e @mrash [server] bug fix in --disable-file-cache mode
100 Vlad Glagolev
101 - Submitted a patch to fix ndbm/gdbm usage when --disable-file-cache is
102 used for the autoconf configure script. This functionality was broken in
103 be4193d734850fe60f14a26b547525ea0b9ce1e9 through improper handling of
104 #define macros from --disable-file-cache.
f8374c8 @mrash [server] (Vlad Glagolev) Submitted a patch to fix command exec mode
105 - Submitted a patch to fix command exec mode under SPA message type
106 validity test. Support for command exec mode was also added to the test
107 suite.
05eb197 @mrash added the OpenBSD port from Vlad
108 - Submitted an OpenBSD port for fwknop-2.0.3, and this has been checked in
109 under extras/openbsd/.
6f356a9 @mrash Added Sean Greven for his FreeBSD port
111 Sean Greven
112 - Created a port of fwknop for FreeBSD:
2f1768f @mrash minor CREDITS file formatting update
fbbcae3 @mrash [libfko] Don't trundate > 16 byte Rijndael keys
115 Michael T. Dean
116 - Reported the Rijndael key truncation issue for user-supplied keys
117 (passphrases) greater than 16 bytes long.
77c876c @mrash credits and changelog updates
119 George Herlin
120 - Proposed a verification approach to test suite operations, and the result
121 was implemented in a61939c005e2b09d6800e2171f607c9d1948f022. This makes
122 test suite operate equivalently regardless of whether valgrind is used or
123 whether fwknop is being tested on an embedded system with very limited
124 resources.
39115c6 @mrash added Ruhsam Bernhard to the credits file
126 Ruhsam Bernhard
127 - Reported an issue where the message size test would result in long
128 command mode SPA packets not decrypting properly because only GPG decrypt
129 attempts were made. This issue was fixed in
130 7e784df3870373f055a2f0f8d818829501bcb1c0.
5804e15 @mrash Merge remote-tracking branch 'ag4ve/master'
132 Shawn Wilson
133 - Added better SPA source IP logging for various fwknopd logging messages.
134 This helps to make it more clear why certain SPA packets are rejected
135 from some systems.
7cb23c7 @mrash [server] added check to ensure any existing fwknop jump rule is not dupl...
137 Dan Lauber
138 - Suggested a check for fwknopd to ensure that the jump rule on systems
139 running iptables is not duplicated if it already exists.
6706c53 @mrash [libfko] HMAC comparison timing bug fix
141 Ryman
142 - Reported a timing attack bug in the HMAC comparison operation (#85) and
1c8d247 @mrash ChangeLog update to mention the constant_runtime_cmp() change
143 suggested a fix derived from yaSSL:
6706c53 @mrash [libfko] HMAC comparison timing bug fix
66399fe @mrash Merge remote-tracking branch 'fjoncourt/master'
ffeb285 @mrash [libfko] handle endian detection on PPC (and other) systems
146 Blair Zajac
4d167cd @mrash credit Blair and Tim with MacPorts and Homebrew maintainer status
147 - MacPorts fwknop package maintainer for Mac OS X systems.
ffeb285 @mrash [libfko] handle endian detection on PPC (and other) systems
148 - Contributed patches to handle endian issues on PPC systems.
149 - Reported an issue where strndup() is not available on some PPC systems
150 and the fix is to use the local lib/fko_util.c implementation similarly
151 to Windows builds.
5e3ec3b @mrash [client] in '-M legacy' mode truncate the key to 16 bytes
152 - Suggested throwing an error in '-M legacy' mode to warn users about the
153 inability of older fwknopd daemons to handle Rijndael keys > 16 bytes.
154 Any release after and including 2.5 does not have this limitation.
83952fc @mrash added Radostan Riedel's AppArmor policy note
156 Radostan Riedel
157 - Contributed an AppArmor policy that is known to work on Debian and Ubuntu
158 systems. The policy file is available in extras/apparmor.
3a2c33c @mrash Added Les Aker to credits file
160 Les Aker
161 - Reported an issue with Arch Linux that resulted in fwknopd hanging for a
162 pcap_dispatch() packet count of zero when using libpcap-1.5.1. This
163 issue was tracked on github as issue #110, and the default packet count
164 is now set at 100 as a result.
551b243 @mrash (Marek Wrzosek) Update docs to reflect random 'digits' use instead of 'b...
166 Marek Wrzosek
167 - Suggested doc update to fwknop man pages to accurately describe the usage
168 of digits instead of bytes for SPA random data. About 53 bits of entropy
169 are actually used, although this is in addition to the 64-bit random salt
170 in for key derivation used by PBKDF1 in Rjindael CBC mode.
171 - Various excellent feedback on crypto design, including the need to remove
a347be3 @mrash merged android4.4_support branch
8dfd576 @mrash added Gerry Reno
174 Gerry Reno
175 - Updated the Android client to be compatible with Android-4.4.
176 - Provided guidance on Android client issues along with testing candidate
177 patches to update various things - this work is being tracked in the
178 android4.4_support branch.
aae72a9 @mrash firewalld support from Gerry Reno
179 - Implemented support for firewalld in the fwknopd daemon running on RHEL 7
180 and CentOS 7 systems. This is a major addition to handle yet another
181 firewall architecture.
4d167cd @mrash credit Blair and Tim with MacPorts and Homebrew maintainer status
183 Tim Heckman
184 - Homebrew fwknop package maintainer for Mac OS X systems.
185 - Suggested that fwknop support nftables when it is integrated into the
186 mainline Linux kernel.
74428ad @mrash [server] Bug fix for PF firewalls without ALTQ support on FreeBSD.
188 Barry Allard
189 - Reported bug in PF support on FreeBSD systems where ALTQ is not available
190 would cause new PF rules to not be added (github issue #121).
50434c5 @mrash Use the fwknop User-Agent for wget SSL external IP resolutions
191 - Suggested the abiliy to specify the HTTP User-Agent when wget is used to
192 resolve the external IP via SSL (github issue #134).
00a057a @mrash ChangeLog update for FCS bug fix
194 Bill Stubbs
195 - Submitted a patch to fix a bug where fwknopd could not handle Ethernet
196 frames that include the Frame Check Sequence (FCS) header. This header is
197 four bytes long, and is placed at the end of each Ethernet frame.
198 Normally the FCS header is not visible to libpcap, but some card/driver
199 combinations result in it being included. Bill noticed this on the
200 following platform:
201 BeagleBone Black rev C running 3.8.13-bone50 #1 SMP Tue May 13
202 13:24:52 UTC 2014 armv7l GNU/Linux
c5c263c @mrash add Grant Pannell
204 Grant Pannell
205 - Submitted a patch to add a new access.conf variable "DESTINATION" in
206 order to define the destination address for which an SPA packet will be
207 accepted. The string "ANY" is also accepted if a valid SPA packet should
208 be honored to any destination IP. Similarly to the "SOURCE" variable,
209 networks should be specified in CIDR notation (e.g. ""),
210 and individual IP addresses can be specified as well. Also, multiple IP's
211 and/or networks can be defined as a comma separated list (e.g.
212 ",").
1ce8004 @mrash [server] Bug fix to not include pcap.h in --enable-udp-server mode
214 Alexander Kozhevnikov
215 - Reported a bug when fwknop is compiled with --enable-udp-server where
216 the server was including pcap.h
0ecc2d2 @mrash minor docs update
218 Dan Brooks
219 - Contributed a patch for the Android client app to add the definition of
220 custom server udp port. This is similiar to the --server-port argument
221 offered by the main fwknop client.
Something went wrong with that request. Please try again.