summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authortobhe <tobhe@openbsd.org>2020-09-16 21:21:23 +0000
committertobhe <tobhe@openbsd.org>2020-09-16 21:21:23 +0000
commit5d0e41c134ff7ea148218fab7bf66d99207018dd (patch)
tree036aac7628c39a0c8910b4bf998925d8808e9d8d
parentStop removing the control socket on exit and tighten the unveil even (diff)
downloadwireguard-openbsd-5d0e41c134ff7ea148218fab7bf66d99207018dd.tar.xz
wireguard-openbsd-5d0e41c134ff7ea148218fab7bf66d99207018dd.zip
Fix EAP authentication if the initiator sends no certificate
request. The locally configured request is used as fallback to find a certificate or key to send. The local auth method for MSCHAP-V2 should be IKEV2_AUTH_SIG_ANY, which defaults to X509 certificates, instead of raw rsa keys. Tested with Strongswan, iPhone and Windows Found by and ok sthen@ ok patrick@
-rw-r--r--sbin/iked/parse.y4
1 files changed, 2 insertions, 2 deletions
diff --git a/sbin/iked/parse.y b/sbin/iked/parse.y
index cd236e09e29..bc68823e750 100644
--- a/sbin/iked/parse.y
+++ b/sbin/iked/parse.y
@@ -1,4 +1,4 @@
-/* $OpenBSD: parse.y,v 1.110 2020/09/05 19:14:32 tobhe Exp $ */
+/* $OpenBSD: parse.y,v 1.111 2020/09/16 21:21:23 tobhe Exp $ */
/*
* Copyright (c) 2019 Tobias Heider <tobias.heider@stusta.de>
@@ -1016,7 +1016,7 @@ ikeauth : /* empty */ {
}
free($2);
- $$.auth_method = IKEV2_AUTH_RSA_SIG;
+ $$.auth_method = IKEV2_AUTH_SIG_ANY;
$$.auth_eap = EAP_TYPE_MSCHAP_V2;
$$.auth_length = 0;
}