123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409 |
- 'use strict';
- 'require view';
- 'require form';
- 'require uci';
- 'require tools.widgets as widgets';
- 'require strongswan_algorithms';
- function validateTimeFormat(section_id, value) {
- if (value && !value.match(/^\d+[smhd]$/)) {
- return _('Number must have suffix s, m, h or d');
- }
- return true;
- }
- function addAlgorithms(o, algorithms) {
- algorithms.forEach(function (algorithm) {
- if (strongswan_algorithms.isInsecure(algorithm)) {
- o.value(algorithm, '%s*'.format(algorithm));
- } else {
- o.value(algorithm);
- }
- });
- }
- return view.extend({
- load: function () {
- return uci.load('network');
- },
- render: function () {
- let m, s, o;
- m = new form.Map('ipsec', _('strongSwan Configuration'),
- _('Configure strongSwan for secure VPN connections.'));
- m.tabbed = true;
- // strongSwan General Settings
- s = m.section(form.TypedSection, 'ipsec', _('General Settings'));
- s.anonymous = true;
- o = s.option(widgets.ZoneSelect, 'zone', _('Zone'),
- _('Firewall zone that has to match the defined firewall zone'));
- o.default = 'lan';
- o.multiple = true;
- o = s.option(widgets.NetworkSelect, 'listen', _('Listening Interfaces'),
- _('Interfaces that accept VPN traffic'));
- o.datatype = 'interface';
- o.placeholder = _('Select an interface or leave empty for all interfaces');
- o.default = 'wan';
- o.multiple = true;
- o.rmempty = false;
- o = s.option(form.Value, 'debug', _('Debug Level'),
- _('Trace level: 0 is least verbose, 4 is most'));
- o.default = '0';
- o.datatype = 'range(0,4)';
- // Remote Configuration
- s = m.section(form.GridSection, 'remote', _('Remote Configuration'),
- _('Define Remote IKE Configurations.'));
- s.addremove = true;
- s.nodescriptions = true;
- o = s.tab('general', _('General'));
- o = s.tab('authentication', _('Authentication'));
- o = s.tab('advanced', _('Advanced'));
- o = s.taboption('general', form.Flag, 'enabled', _('Enabled'),
- _('Configuration is enabled or not'));
- o.rmempty = false;
- o = s.taboption('general', form.Value, 'gateway', _('Gateway (Remote Endpoint)'),
- _('IP address or FQDN name of the tunnel remote endpoint'));
- o.datatype = 'or(hostname,ipaddr)';
- o.rmempty = false;
- o = s.taboption('general', form.Value, 'local_gateway', _('Local Gateway'),
- _('IP address or FQDN of the tunnel local endpoint'));
- o.datatype = 'or(hostname,ipaddr)';
- o.modalonly = true;
- o = s.taboption('general', form.Value, 'local_sourceip', _('Local Source IP'),
- _('Virtual IP(s) to request in IKEv2 configuration payloads requests'));
- o.datatype = 'ipaddr';
- o.modalonly = true;
- o = s.taboption('general', form.Value, 'local_ip', _('Local IP'),
- _('Local address(es) to use in IKE negotiation'));
- o.datatype = 'ipaddr';
- o.modalonly = true;
- o = s.taboption('general', form.MultiValue, 'crypto_proposal', _('Crypto Proposal'),
- _('List of IKE (phase 1) proposals to use for authentication'));
- o.load = function (section_id) {
- this.keylist = [];
- this.vallist = [];
- var sections = uci.sections('ipsec', 'crypto_proposal');
- if (sections.length == 0) {
- this.value('', _('Please create a Proposal first'));
- } else {
- sections.forEach(L.bind(function (section) {
- if (section.is_esp != '1') {
- this.value(section['.name']);
- }
- }, this));
- }
- return this.super('load', [section_id]);
- };
- o.rmempty = false;
- o = s.taboption('general', form.MultiValue, 'tunnel', _('Tunnel'),
- _('Name of ESP (phase 2) section'));
- o.load = function (section_id) {
- this.keylist = [];
- this.vallist = [];
- var sections = uci.sections('ipsec', 'tunnel');
- if (sections.length == 0) {
- this.value('', _('Please create a Tunnel first'));
- } else {
- sections.forEach(L.bind(function (section) {
- this.value(section['.name']);
- }, this));
- }
- return this.super('load', [section_id]);
- };
- o.rmempty = false;
- o = s.taboption('authentication', form.ListValue, 'authentication_method',
- _('Authentication Method'), _('IKE authentication (phase 1)'));
- o.modalonly = true;
- o.value('psk', 'Pre-shared Key');
- o.value('pubkey', 'Public Key');
- o = s.taboption('authentication', form.Value, 'local_identifier', _('Local Identifier'),
- _('Local identifier for IKE (phase 1)'));
- o.datatype = 'string';
- o.placeholder = 'C=US, O=Acme Corporation, CN=headquarters';
- o.modalonly = true;
- o = s.taboption('authentication', form.Value, 'remote_identifier', _('Remote Identifier'),
- _('Remote identifier for IKE (phase 1)'));
- o.datatype = 'string';
- o.placeholder = 'C=US, O=Acme Corporation, CN=soho';
- o.modalonly = true;
- o = s.taboption('authentication', form.Value, 'pre_shared_key', _('Pre-Shared Key'),
- _('The pre-shared key for the tunnel'));
- o.datatype = 'string';
- o.password = true;
- o.modalonly = true;
- o.rmempty = false;
- o.depends('authentication_method', 'psk');
- o = s.taboption('authentication', form.Value, 'local_cert', _('Local Certificate'),
- _('Certificate pathname to use for authentication'));
- o.datatype = 'file';
- o.depends('authentication_method', 'pubkey');
- o.modalonly = true;
- o = s.taboption('authentication', form.Value, 'local_key', _('Local Key'),
- _('Private key pathname to use with above certificate'));
- o.datatype = 'file';
- o.modalonly = true;
- o = s.taboption('authentication', form.Value, 'ca_cert', _('CA Certificate'),
- _("CA certificate that need to lie in remote peer's certificate's path of trust"));
- o.datatype = 'file';
- o.depends('authentication_method', 'pubkey');
- o.modalonly = true;
- o = s.taboption('advanced', form.Flag, 'mobike', _('MOBIKE'),
- _('MOBIKE (IKEv2 Mobility and Multihoming Protocol)'));
- o.default = '1';
- o.modalonly = true;
- o = s.taboption('advanced', form.ListValue, 'fragmentation', _('IKE Fragmentation'),
- _('Use IKE fragmentation'));
- o.value('yes');
- o.value('no');
- o.value('force');
- o.value('accept');
- o.default = 'yes';
- o.modalonly = true;
- o = s.taboption('advanced', form.Value, 'keyingretries', _('Keying Retries'),
- _('Number of retransmissions attempts during initial negotiation'));
- o.datatype = 'uinteger';
- o.default = '3';
- o.modalonly = true;
- o = s.taboption('advanced', form.Value, 'dpddelay', _('DPD Delay'),
- _('Interval to check liveness of a peer'));
- o.validate = validateTimeFormat;
- o.default = '30s';
- o.modalonly = true;
- o = s.taboption('advanced', form.Value, 'inactivity', _('Inactivity'),
- _('Interval before closing an inactive CHILD_SA'));
- o.validate = validateTimeFormat;
- o.modalonly = true;
- o = s.taboption('advanced', form.Value, 'rekeytime', _('Rekey Time'),
- _('IKEv2 interval to refresh keying material; also used to compute lifetime'));
- o.validate = validateTimeFormat;
- o.modalonly = true;
- o = s.taboption('advanced', form.Value, 'overtime', _('Overtime'),
- _('Limit on time to complete rekeying/reauthentication'));
- o.validate = validateTimeFormat;
- o.modalonly = true;
- o = s.taboption('advanced', form.ListValue, 'keyexchange', _('Keyexchange'),
- _('Version of IKE for negotiation'));
- o.value('ikev1', 'IKEv1 (%s)', _('deprecated'));
- o.value('ikev2', 'IKEv2');
- o.value('ike', 'IKE (%s, %s)'.format(_('both'), _('deprecated')));
- o.default = 'ikev2';
- o.modalonly = true;
- // Tunnel Configuration
- s = m.section(form.GridSection, 'tunnel', _('Tunnel Configuration'),
- _('Define Connection Children to be used as Tunnels in Remote Configurations.'));
- s.addremove = true;
- s.nodescriptions = true;
- o = s.tab('general', _('General'));
- o = s.tab('advanced', _('Advanced'));
- o = s.taboption('general', form.DynamicList, 'local_subnet', _('Local Subnet'),
- _('Local network(s)'));
- o.datatype = 'subnet';
- o.placeholder = '192.168.1.1/24';
- o.rmempty = false;
- o = s.taboption('general', form.DynamicList, 'remote_subnet', _('Remote Subnet'),
- _('Remote network(s)'));
- o.datatype = 'subnet';
- o.placeholder = '192.168.2.1/24';
- o.rmempty = false;
- o = s.taboption('general', form.Value, 'local_nat', _('Local NAT'),
- _('NAT range for tunnels with overlapping IP addresses'));
- o.datatype = 'subnet';
- o.modalonly = true;
- o = s.taboption('general', form.ListValue, 'if_id', ('XFRM Interface ID'),
- _('XFRM interface ID set on input and output interfaces'));
- o.load = function (section_id) {
- this.keylist = [];
- this.vallist = [];
- var xfrmSections = uci.sections('network').filter(function (section) {
- return section.proto == 'xfrm';
- });
- xfrmSections.forEach(L.bind(function (section) {
- this.value(section.ifid,
- '%s (%s)'.format(section.ifid, section['.name']));
- }, this));
- return this.super('load', [section_id]);
- }
- o.optional = true;
- o.modalonly = true;
- o = s.taboption('general', form.ListValue, 'startaction', _('Start Action'),
- _('Action on initial configuration load'));
- o.value('none');
- o.value('trap');
- o.value('start');
- o.default = 'trap';
- o.modalonly = true;
- o = s.taboption('general', form.ListValue, 'closeaction', _('Close Action'),
- _('Action when CHILD_SA is closed'));
- o.value('none');
- o.value('trap');
- o.value('start');
- o.optional = true;
- o.modalonly = true;
- o = s.taboption('general', form.MultiValue, 'crypto_proposal',
- _('Crypto Proposal (Phase 2)'),
- _('List of ESP (phase two) proposals. Only Proposals with checked ESP flag are selectable'));
- o.load = function (section_id) {
- this.keylist = [];
- this.vallist = [];
- var sections = uci.sections('ipsec', 'crypto_proposal');
- if (sections.length == 0) {
- this.value('', _('Please create an ESP Proposal first'));
- } else {
- sections.forEach(L.bind(function (section) {
- if (section.is_esp == '1') {
- this.value(section['.name']);
- }
- }, this));
- }
- return this.super('load', [section_id]);
- };
- o.rmempty = false;
- o = s.taboption('advanced', form.Value, 'updown', _('Up/Down Script Path'),
- _('Path to script to run on CHILD_SA up/down events'));
- o.datatype = 'file';
- o.modalonly = true;
- o = s.taboption('advanced', form.Value, 'lifetime', _('Lifetime'),
- _('Maximum duration of the CHILD_SA before closing'));
- o.validate = validateTimeFormat;
- o.modalonly = true;
- o = s.taboption('advanced', form.ListValue, 'dpdaction', _('DPD Action'),
- _('Action when DPD timeout occurs'));
- o.value('none');
- o.value('clear');
- o.value('trap');
- o.value('start');
- o.optional = true;
- o.modalonly = true;
- o = s.taboption('advanced', form.Value, 'rekeytime', _('Rekey Time'),
- _('Duration of the CHILD_SA before rekeying'));
- o.validate = validateTimeFormat;
- o.modalonly = true;
- o = s.taboption('advanced', form.Flag, 'ipcomp', _('IPComp'),
- _('Enable ipcomp compression'));
- o.default = '0';
- o.modalonly = true;
- o = s.taboption('advanced', form.ListValue, 'hw_offload', _('H/W Offload'),
- _('Enable Hardware offload'));
- o.value('yes');
- o.value('no');
- o.value('auto');
- o.optional = true;
- o.modalonly = true;
- o = s.taboption('advanced', form.Value, 'priority', _('Priority'),
- _('Priority of the CHILD_SA'));
- o.datatype = 'uinteger';
- o.modalonly = true;
- o = s.taboption('advanced', form.Value, 'replay_window', _('Replay Window'),
- '%s; %s'.format(_('Replay Window of the CHILD_SA'),
- _('Values larger than 32 are supported by the Netlink backend only')));
- o.datatype = 'uinteger';
- o.modalonly = true;
- // Crypto Proposals
- s = m.section(form.GridSection, 'crypto_proposal',
- _('Encryption Proposals'),
- _('Configure Cipher Suites to define IKE (Phase 1) or ESP (Phase 2) Proposals.'));
- s.addremove = true;
- s.nodescriptions = true;
- o = s.option(form.Flag, 'is_esp', _('ESP Proposal'),
- _('Whether this is an ESP (phase 2) proposal or not'));
- o = s.option(form.ListValue, 'encryption_algorithm',
- _('Encryption Algorithm'),
- _('Algorithms marked with * are considered insecure'));
- o.default = 'aes256gcm128';
- addAlgorithms(o, strongswan_algorithms.getEncryptionAlgorithms());
- addAlgorithms(o, strongswan_algorithms.getAuthenticatedEncryptionAlgorithms());
- o = s.option(form.ListValue, 'hash_algorithm', _('Hash Algorithm'),
- _('Algorithms marked with * are considered insecure'));
- strongswan_algorithms.getEncryptionAlgorithms().forEach(function (algorithm) {
- o.depends('encryption_algorithm', algorithm);
- });
- o.default = 'sha512';
- o.rmempty = false;
- addAlgorithms(o, strongswan_algorithms.getHashAlgorithms());
- o = s.option(form.ListValue, 'dh_group', _('Diffie-Hellman Group'),
- _('Algorithms marked with * are considered insecure'));
- o.default = 'modp3072';
- addAlgorithms(o, strongswan_algorithms.getDiffieHellmanAlgorithms());
- o = s.option(form.ListValue, 'prf_algorithm', _('PRF Algorithm'),
- _('Algorithms marked with * are considered insecure'));
- o.validate = function (section_id, value) {
- var encryptionAlgorithm = this.section.formvalue(section_id, 'encryption_algorithm');
- if (strongswan_algorithms.getAuthenticatedEncryptionAlgorithms().includes(
- encryptionAlgorithm) && !value) {
- return _('PRF Algorithm must be configured when using an Authenticated Encryption Algorithm');
- }
- return true;
- };
- o.optional = true;
- o.depends('is_esp', '0');
- addAlgorithms(o, strongswan_algorithms.getPrfAlgorithms());
- return m.render();
- }
- });
|