]> git.ipfire.org Git - thirdparty/openvpn.git/log
thirdparty/openvpn.git
14 years agoSolved hidden merge conflicts between master and svn-branch-2.1
David Sommerseth [Tue, 26 Apr 2011 21:27:12 +0000 (23:27 +0200)] 
Solved hidden merge conflicts between master and svn-branch-2.1

ps.c - The feat_ipv6_transport patch set modifies struct openvpn_sockaddr by
       adding a union named 'addr' in commit 8335caf929f21b31.

ssl.c - A needed } and #endif had been dropped by a mistake

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoMerge branch 'svn-branch-2.1' into merge
David Sommerseth [Tue, 26 Apr 2011 21:04:18 +0000 (23:04 +0200)] 
Merge branch 'svn-branch-2.1' into merge

Pulling in changes from James' 2.1/openvpn branch in SVN.

Conflicts:
buffer.c
init.c
manage.h
multi.c
openvpn.8
options.c
ssl.c
version.m4
win/sign.py

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFixed compile issues on Windows.
James Yonan [Mon, 25 Apr 2011 06:21:57 +0000 (06:21 +0000)] 
Fixed compile issues on Windows.

Version 2.1.3w

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7219 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoAdded new "extra-certs" and "verify-hash" options (see man page for
James Yonan [Mon, 25 Apr 2011 04:58:34 +0000 (04:58 +0000)] 
Added new "extra-certs" and "verify-hash" options (see man page for
details).

Increase the timeout after SIGUSR1 restart when restart is not
due to server_poll_timeout.

Version 2.1.3v

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7215 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoAdded 'dir' flag to "crl-verify" (see man page for info).
James Yonan [Sun, 24 Apr 2011 00:59:28 +0000 (00:59 +0000)] 
Added 'dir' flag to "crl-verify" (see man page for info).

Don't call SSL_CTX_set_client_CA_list or SSL_CTX_set_client_CA_list
if not running in server mode (these functions are only useful for
TLS/SSL servers).

Modified openvpn_snprintf to return false on overflow, and true
otherwise.

When AUTH_FAILED,... is received, log the full string.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7213 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoRevert r7092 and r7151, i.e. remove --enable-osxipconfig
James Yonan [Tue, 19 Apr 2011 10:28:06 +0000 (10:28 +0000)] 
Revert r7092 and r7151, i.e. remove --enable-osxipconfig
configure option.  ipconfig on Mac has certain behavior that makes
it unsuitable for use by OpenVPN to configure tun/tap interface.

Version 2.1.3u

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7191 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoVersion 2.1.3t
James Yonan [Tue, 12 Apr 2011 05:15:15 +0000 (05:15 +0000)] 
Version 2.1.3t

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7152 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoFor Mac OSX, when DARWIN_USE_IPCONFIG is defined, retry ipconfig
James Yonan [Tue, 12 Apr 2011 05:14:34 +0000 (05:14 +0000)] 
For Mac OSX, when DARWIN_USE_IPCONFIG is defined, retry ipconfig
command on failure once every second for up to 15 seconds.  This
is necessary to work around an issue observed on OSX 10.5 where
the ipconfig command sometimes fails if executed immediately after
the tun device open.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7151 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoFixed bug in port-share that could cause port share process to
James Yonan [Sun, 3 Apr 2011 21:48:15 +0000 (21:48 +0000)] 
Fixed bug in port-share that could cause port share process to
crash with output like this:

TCP connection established with 85.190.0.3:41781
85.190.0.3:41781 SIGTERM[soft,port-share-redirect] received, client-instance exiting
MANAGEMENT: TCP recv error: Socket operation on non-socket
MANAGEMENT: Client disconnected
MANAGEMENT: Triggering management exit
Exiting due to fatal error
EVENT: epoll_ctl EPOLL_CTL_MOD failed, sd=6: Bad file descriptor (errno=9)

Then an error like this for every incoming connection that should be
proxied:

76.120.71.74:55302 PORT SHARE: sendmsg failed -- unable to communicate with background process (6,8,-1,-1): Connection refused (errno=111)

Version 2.1.3s

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7127 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoFixed bug that incorrectly placed stricter TCP packet replay rules on
James Yonan [Sat, 2 Apr 2011 08:21:28 +0000 (08:21 +0000)] 
Fixed bug that incorrectly placed stricter TCP packet replay rules on
UDP sessions when the client daemon was running in UDP/TCP adaptive
mode, and transitioned from TCP to UDP.

The bug would cause a single dropped packet in UDP mode to trigger a
barrage of packet replay errors followed by a disconnect and
reconnect.

Version 2.1.3r

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7125 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoAdded more packet ID debug info at debug level 3 for debugging
James Yonan [Thu, 31 Mar 2011 23:18:06 +0000 (23:18 +0000)] 
Added more packet ID debug info at debug level 3 for debugging
false positive packet replays.

Version 2.1.3q.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7109 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoAdded ./configure --enable-osxipconfig option for Mac OS X which will
James Yonan [Sun, 27 Mar 2011 09:20:13 +0000 (09:20 +0000)] 
Added ./configure --enable-osxipconfig option for Mac OS X which will
enable the use of ipconfig (instead of ifconfig) for configuring the
IP address and netmask of the tun/tap adapter.

Version 2.1.3p

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7092 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoAdded "auth-token" client directive, which is intended to be
James Yonan [Sat, 26 Mar 2011 21:16:40 +0000 (21:16 +0000)] 
Added "auth-token" client directive, which is intended to be
pushed by server, and that is used to offer a temporary session
token to clients that can be used in place of a password on
subsequent credential challenges.

This accomplishes the security benefit of preventing caching
of the real password while offering most of the advantages
of password caching, i.e. not forcing the user to re-enter
credentials for every TLS renegotiation or network hiccup.

auth-token does two things:

1. if password caching is enabled, the token replaces the
   previous password, and

2. if the management interface is active, the token is output
   to it:

     >PASSWORD:Auth-Token:<token>

Also made a minor change to HALT/RESTART processing when password
caching is enabled.  When client receives a HALT or RESTART message,
and if the message text contains a flags block (i.e. [FFF]:message),
if flag 'P' (preserve auth) is present in flags, don't purge the Auth
password.  Otherwise do purge the Auth password.

Version 2.1.3o

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7088 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agowin/sign.py now accepts an optional tap-dir argument.
James Yonan [Fri, 25 Mar 2011 11:06:16 +0000 (11:06 +0000)] 
win/sign.py now accepts an optional tap-dir argument.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7086 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoVersion 2.1.3n
James Yonan [Mon, 21 Mar 2011 09:00:39 +0000 (09:00 +0000)] 
Version 2.1.3n

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7069 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoClient will now try to reconnect if no push reply received
James Yonan [Sun, 20 Mar 2011 19:43:06 +0000 (19:43 +0000)] 
Client will now try to reconnect if no push reply received
within handshake-window seconds.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7066 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoExtended "client-kill" management interface command (server-side)
James Yonan [Sun, 20 Mar 2011 04:12:26 +0000 (04:12 +0000)] 
Extended "client-kill" management interface command (server-side)
to accept an optional message string.  The message string format is:

  RESTART|HALT,<human-readable-message>

RESTART will tell the client to restart (i.e. SIGUSR1).

HALT will tell the client to exit (i.e. SIGTERM).

On the client, human-readable-message will be communicated via
management interface:

  >NOTIFY,<severity>,<type>,<human-readable-message>"

Version 2.1.3m

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7063 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoFixed bug introduced in r7031 that might cause this error message:
James Yonan [Sun, 20 Mar 2011 03:57:28 +0000 (03:57 +0000)] 
Fixed bug introduced in r7031 that might cause this error message:

PORT SHARE: sendmsg failed (unable to communicate with background process)

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7062 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoFixed issue where a client might receive multiple push replies from
James Yonan [Fri, 18 Mar 2011 04:51:59 +0000 (04:51 +0000)] 
Fixed issue where a client might receive multiple push replies from
a server if it sent multiple push requests due to the server being
slow to respond.  This could cause the client to process pushed
options twice, leading to duplicate pushed routes, among other issues.
The fix, implemented server-side, is to reply only once to a push
request even if multiple requests are received.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7060 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoenv_filter_match now includes the serial number of all certs
James Yonan [Thu, 17 Mar 2011 20:04:56 +0000 (20:04 +0000)] 
env_filter_match now includes the serial number of all certs
in chain (as tls_serial_n vars), rather than only tls_serial_0.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@7055 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoReduce log verbosity at level 3, with a focus on removing excessive log verbosity...
James Yonan [Tue, 15 Mar 2011 05:06:23 +0000 (05:06 +0000)] 
Reduce log verbosity at level 3, with a focus on removing excessive log verbosity generated by port-share activity.

Version 2.1.3k

git-svn-id: http://svn.openvpn.net/projects/branches/BETA21@7033 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoAdded optional journal directory argument to "port-share" directive, for reporting...
James Yonan [Sun, 13 Mar 2011 06:59:25 +0000 (06:59 +0000)] 
Added optional journal directory argument to "port-share" directive, for reporting client IP origins of proxied connections.

git-svn-id: http://svn.openvpn.net/projects/branches/BETA21@7031 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoAdded --enable-lzo-stub configure option to build an OpenVPN client without LZO,...
James Yonan [Thu, 10 Mar 2011 00:04:39 +0000 (00:04 +0000)] 
Added --enable-lzo-stub configure option to build an OpenVPN client without LZO, but that has limited interoperability with LZO-enabled servers.

Modified "push-peer-info" option to push IV_LZO_STUB=1 to server when
client was built with --enable-lzo-stub configure option.  This tells
the server that the client lacks LZO capabilities, so the server
should turn off LZO compression for this client via "lzo no".

Added "setenv PUSH_PEER_INFO" option having the same effect as
"push-peer-info".

Version 2.1.3j

git-svn-id: http://svn.openvpn.net/projects/branches/BETA21@7023 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoMerge branch 'feat_ipv6_payload'
David Sommerseth [Mon, 25 Apr 2011 15:16:34 +0000 (17:16 +0200)] 
Merge branch 'feat_ipv6_payload'

Conflicts:
options.c
- feat_ipv6_payload and feat_ip6_transport both updates
      this file with presence information

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoMerge branch 'feat_ipv6_transport'
David Sommerseth [Mon, 25 Apr 2011 15:08:14 +0000 (17:08 +0200)] 
Merge branch 'feat_ipv6_transport'

14 years agorebased to 2.2RC2 (beta 2.2 branch)
Gert Doering [Sun, 24 Apr 2011 15:15:56 +0000 (17:15 +0200)] 
rebased to 2.2RC2 (beta 2.2 branch)
removed mutex locking stuff (no more threading in 2.2)
fixed rebase/merge artifacts in mroute.c
add current ChangeLog.IPv6 and TODO.IPv6 to commit
tag as ipv6-20110424-2

Signed-off-by: Gert Doering <gert@greenie.muc.de>
14 years agoImplement "ipv6 ifconfig" for TAP interfaces on Solaris
Gert Doering [Sun, 16 Jan 2011 17:24:37 +0000 (18:24 +0100)] 
Implement "ipv6 ifconfig" for TAP interfaces on Solaris
Solaris close_tun(): add explicit "unplumb'ing" of IPv6 tun/tap
interfaces, otherwise they would linger around after OpenVPN exits.

Signed-off-by: Gert Doering <gert@greenie.muc.de>
14 years agobump IPv6 version number (openvpn --version) to 20100922-1
Gert Doering [Wed, 22 Sep 2010 20:23:10 +0000 (22:23 +0200)] 
bump IPv6 version number (openvpn --version) to 20100922-1
document Linux tun fixes and test results in ChangeLog.IPv6

Signed-off-by: Gert Doering <gert@greenie.muc.de>
14 years agobugfix for linux/iproute2: IPv6 ifconfig code block was not called for
Gert Doering [Wed, 22 Sep 2010 20:18:35 +0000 (22:18 +0200)] 
bugfix for linux/iproute2: IPv6 ifconfig code block was not called for
"dev tun"+"topology subnet" - moved code out of "if (tun)" block, works.

add more debug information to help diagnose cases where IPv6 isn't working
Signed-off-by: Gert Doering <gert@greenie.muc.de>
14 years agocorrect URL for "more information about IPv6 patch is *here*"
Gert Doering [Wed, 15 Sep 2010 17:23:10 +0000 (19:23 +0200)] 
correct URL for "more information about IPv6 patch is *here*"

Signed-off-by: Gert Doering <gert@greenie.muc.de>
14 years ago2.2-beta3 has a signed TAP driver with the IPv6 code, but it's not
Gert Doering [Thu, 2 Sep 2010 19:20:30 +0000 (21:20 +0200)] 
2.2-beta3 has a signed TAP driver with the IPv6 code, but it's not
version 9.7 as anticipated (that's 2.1.3) but 9.8 - change test to
require 9.8, and change message to point to 2.2-beta3 and up.

Signed-off-by: Gert Doering <gert@greenie.muc.de>
14 years agorenamed t_client.sh to t_client.sh.in
Gert Doering [Tue, 10 Aug 2010 10:39:28 +0000 (12:39 +0200)] 
renamed t_client.sh to t_client.sh.in
build t_client.sh by configure at run-time, with proper paths to
ip/ifconfig/netstat binaries, and (most important) with proper #!SHELL

extend configure.ac to find "netstat" binary and to chmod +x "t_client.sh"

Signed-off-by: Gert Doering <gert@greenie.muc.de>
14 years agofull "VPN client connect" test framework for OpenVPN
Gert Doering [Sun, 8 Aug 2010 19:24:30 +0000 (21:24 +0200)] 
full "VPN client connect" test framework for OpenVPN
run from "make check" if "t_client.rc" is found in workdir or srcdir
(copy t_client.rc-sample, fill in specifics for your test server)

Signed-off-by: Gert Doering <gert@greenie.muc.de>
14 years agoimplement IPv6 ifconfig + route setup/deletion on OpenBSD
Gert Doering [Sun, 8 Aug 2010 10:34:00 +0000 (12:34 +0200)] 
implement IPv6 ifconfig + route setup/deletion on OpenBSD
destroy tunX interface on tun_close()
tested on OpenBSD 4.7

Signed-off-by: Gert Doering <gert@greenie.muc.de>
14 years agorevert unconditionally-enabling of setenv_es() logging (too noisy)
Gert Doering [Mon, 29 Mar 2010 15:05:02 +0000 (17:05 +0200)] 
revert unconditionally-enabling of setenv_es() logging (too noisy)
replace with #ifdef DEBUG_VERBOSE_SETENV compile-time flag

14 years agotag and release as 20100307-1
Gert Doering [Sun, 7 Mar 2010 18:44:43 +0000 (19:44 +0100)] 
tag and release as 20100307-1

14 years agoWIN32: if IPv6 requested in TUN mode, and TUN/TAP driver version is older
Gert Doering [Sun, 7 Mar 2010 18:43:01 +0000 (19:43 +0100)] 
WIN32: if IPv6 requested in TUN mode, and TUN/TAP driver version is older
       than 9.7, log warning and disable IPv6 (won't work anyway).

14 years agowhen deleting a route on win32, also add gateway address
Gert Doering [Sun, 7 Mar 2010 18:30:56 +0000 (19:30 +0100)] 
when deleting a route on win32, also add gateway address
(otherwise netsh.exe will succeed, but silently ignore request)

14 years agoWin32: set next-hop for IPv6 routes according to TUN/TAP mode - in TUN mode,
Gert Doering [Fri, 5 Mar 2010 08:42:11 +0000 (09:42 +0100)] 
Win32: set next-hop for IPv6 routes according to TUN/TAP mode - in TUN mode,
       use special next-hop address (fe80::8) that tapdrv will handle ND for

14 years agodocument recent changes and open TODOs, adapt --version info, tag release
Gert Doering [Sun, 28 Feb 2010 22:04:56 +0000 (23:04 +0100)] 
document recent changes and open TODOs, adapt --version info, tag release

14 years agodrop "book ipv6" from open_tun() and tuncfg() prototypes
Gert Doering [Sun, 28 Feb 2010 22:04:04 +0000 (23:04 +0100)] 
drop "book ipv6" from open_tun() and tuncfg() prototypes

14 years ago- Win32 IPv6 ifconfig support, using "netsh" calls
Gert Doering [Sun, 28 Feb 2010 21:57:28 +0000 (22:57 +0100)] 
- Win32 IPv6 ifconfig support, using "netsh" calls

- initialize tuntap->ipv6 in init.c::do_init_tun(), to make sure it's
  setup "early enough", no matter what ifconfig_order() wants

- change call convention for open_tun(): drop "ipv6" flag, because it's
  incompatible with windows/openbsd calling sequence (ifconfig first,
  open_tun later) - also affects open_tun_generic() and tuncfg().

- drop ipv6_support() helper function - has no useful purpose anymore

- introduce add_route_connected_v6_net() helper for Win32, Darwin, Netbsd
  (cleanup code)

- fix NetBSD tunnel setup - destroy/recreate before ifconfig'ing, to make
  sure no leftover configuration lingers on tunnel from previous call
  (NetBSD tunnels are always persistent unless explicitely destroyed)

- DARWIN (MacOS X) gets its own #ifdef section for open_tun()/close_tun()
  now, because close_tun() needs to cleanup IPv6 ifconfig

14 years agoadd IPv6 route add / route delete code for windows (using "netsh")
Gert Doering [Sun, 28 Feb 2010 21:50:41 +0000 (22:50 +0100)] 
add IPv6 route add / route delete code for windows (using "netsh")
 - somewhat preliminary, as the next-hop setting requirements of tun/tap
   driver are not decided yet, and "route add" might need to be adapted

14 years agoenv_block(): if PATH is not set, add standard PATH setting to env so that
Gert Doering [Sun, 28 Feb 2010 21:48:48 +0000 (22:48 +0100)] 
env_block(): if PATH is not set, add standard PATH setting to env so that
             "netsh.exe" can find "framedyn.dll" (needs work)

14 years ago* make ipv6_payload compile under windowze
JuanJo Ciarlante [Sun, 21 Feb 2010 17:46:59 +0000 (18:46 +0100)] 
* make ipv6_payload compile under windowze
- create inet_ntop() and inet_pton() wrap-implementations using
  WSAAddressToString() and WSAStringToAddress() functions
- add relevant win32-only headers to syshead.h
  NOTE: syshead.h changes are already included in ipv6_transport

14 years agoadd some TODOs to TODO.IPv6
Gert Doering [Tue, 16 Feb 2010 14:40:31 +0000 (15:40 +0100)] 
add some TODOs to TODO.IPv6
--version: change printing of IPv6 payload patch version to [...] style
fix "make check" regression in tun.c (unnecessary change reverted)

14 years agoNetBSD fixes - on 4.0 and up, use multi-af mode. On earlier systems that
Gert Doering [Thu, 14 Jan 2010 14:21:05 +0000 (15:21 +0100)] 
NetBSD fixes - on 4.0 and up, use multi-af mode.  On earlier systems that
do not have TUNSIFHEAD (and do not have IPv6 capable tunnels), fall back
to old IPv4-only code without address-family prepending.
(cherry picked from commit 2a57c58b185deb11b0a62c584489fff59258146c)

14 years agoremove NOTES file from commit - private scribbling
Gert Doering [Thu, 7 Jan 2010 13:59:51 +0000 (14:59 +0100)] 
remove NOTES file from commit - private scribbling
(cherry picked from commit 5df8fe6b0eb3c0f351f322b4690e4d9388980aba)

14 years agoEnable IPv6 Payload in OpenVPN p2mp tun server mode. 20100104-1 release.
Gert Doering [Thu, 7 Jan 2010 13:51:40 +0000 (14:51 +0100)] 
Enable IPv6 Payload in OpenVPN p2mp tun server mode.  20100104-1 release.
(cherry picked from commit ec9dce6387afd198881493bfebf13bb121e8a56b)

14 years agobasic documentation of IPv6 related options and their syntax
Gert Doering [Tue, 16 Feb 2010 15:36:08 +0000 (16:36 +0100)] 
basic documentation of IPv6 related options and their syntax

14 years agoundo accidential duplication of existing "--iroute" line in the help text
Gert Doering [Tue, 16 Feb 2010 15:34:40 +0000 (16:34 +0100)] 
undo accidential duplication of existing "--iroute" line in the help text

14 years agoadd some TODOs to TODO.IPv6
Gert Doering [Tue, 16 Feb 2010 14:40:31 +0000 (15:40 +0100)] 
add some TODOs to TODO.IPv6
--version: change printing of IPv6 payload patch version to [...] style
fix "make check" regression in tun.c (unnecessary change reverted)

14 years agonew feature: "ifconfig-ipv6-push" (from ccd/ config)
Gert Doering [Thu, 14 Jan 2010 14:53:40 +0000 (15:53 +0100)] 
new feature: "ifconfig-ipv6-push" (from ccd/ config)
  affects options.h, options.c, multi.c
  benefit: static IPv6 address assignment from radiusplugin (etc)
rewritten get_ipv6_addr() to handle IPv6 addresses with and without "/bits"
  affects route.c and mainly options.c
  benefit: ifconfig-ipv6, ifconfig-ipv6-pool can now be accept
  configurations with networks != /64 (the rest of the implementation
  is not yet completely there, but this is imporant preparation work to
  be able to add /bits to "push 'ifconfig-ipv6 ...'" later on without
  breaking clients
do not try to add/delete IPv6 routes if no IPv6 on tunnel
  affects: route.c
  benefit: avoid error messages, and make IPv6 troubleshooting easier
flag as "config error" if --ifconfig-ipv6-pool used without --ifconfig-ipv6
flag as "config error" if --ifconfig-ipv6-pool used without --server
print warning if --ifconfig-ipv6 is used without --tun-ipv6
changes documented in more detail in ChangeLog.IPv6

* release patch set 20100114-1
(cherry picked from commit c04f774c7e9bed602818b1fe2ff4e83cf913d471)

14 years ago4a, 9, 10, 11, 12 added - and 11. done right away :-)
Gert Doering [Thu, 14 Jan 2010 14:52:06 +0000 (15:52 +0100)] 
4a, 9, 10, 11, 12 added - and 11. done right away :-)
(cherry picked from commit ea382a1d550ac100d27c8118777e3160c85d06d2)

14 years agoNetBSD fixes - on 4.0 and up, use multi-af mode. On earlier systems that
Gert Doering [Thu, 14 Jan 2010 14:21:05 +0000 (15:21 +0100)] 
NetBSD fixes - on 4.0 and up, use multi-af mode.  On earlier systems that
do not have TUNSIFHEAD (and do not have IPv6 capable tunnels), fall back
to old IPv4-only code without address-family prepending.
(cherry picked from commit 2a57c58b185deb11b0a62c584489fff59258146c)

14 years agoremove NOTES file from commit - private scribbling
Gert Doering [Thu, 7 Jan 2010 13:59:51 +0000 (14:59 +0100)] 
remove NOTES file from commit - private scribbling
(cherry picked from commit 5df8fe6b0eb3c0f351f322b4690e4d9388980aba)

14 years agoEnable IPv6 Payload in OpenVPN p2mp tun server mode. 20100104-1 release.
Gert Doering [Thu, 7 Jan 2010 13:51:40 +0000 (14:51 +0100)] 
Enable IPv6 Payload in OpenVPN p2mp tun server mode.  20100104-1 release.
(cherry picked from commit ec9dce6387afd198881493bfebf13bb121e8a56b)

14 years agoUpdate man page with info about --connect-timeout
Robert Fischer [Sun, 17 Apr 2011 21:25:34 +0000 (23:25 +0200)] 
Update man page with info about --connect-timeout

Signed-off-by: Robert Fischer <ml-openvpn@trispace.org>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoUpdate man page with info about --capath
Robert Fischer [Sun, 17 Apr 2011 21:03:49 +0000 (23:03 +0200)] 
Update man page with info about --capath

Signed-off-by: Robert Fischer <ml-openvpn@trispace.org>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoAdd a simple comment regarding openvpn_snprintf() is duplicated
David Sommerseth [Thu, 21 Apr 2011 19:03:25 +0000 (21:03 +0200)] 
Add a simple comment regarding openvpn_snprintf() is duplicated

Commit df5a4380c3931520d5fae2b18f0fc2e67a883aae copies this function
from buffer.c to service-win32/openvpnserv.c.  Any changes on either
places should be done in both implementations.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoImprove the mysprintf() issue in openvpnserv.c
David Sommerseth [Thu, 21 Apr 2011 18:32:26 +0000 (20:32 +0200)] 
Improve the mysprintf() issue in openvpnserv.c

A quick and dirty compile fix was introduced in commit 77d244050964525417,
and was accepted under the condition that it would be a temporary fix.

As the usage of _snprintf() is realy not ideal on Windows, this patch
uses the same well tested openvpn_snprintf() function from buffer.c.
It was a longer discussion of several possibilities to re-use that code,
but in the end it seemed easier to just copy-paste this function to
openvpnserv.c for now.

The reason for this conclusion was that the function is really simple,
well defined and will most likely not be changed much in the future.
It is also added a comment in openvpnserv.c where this function
has its origins.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: James Yonan <james@openvpn.net>
14 years agoFixed a bug with GUI icon deletion on upgrade from 2.2-RC or earlier
Samuli Seppänen [Fri, 15 Apr 2011 13:25:17 +0000 (16:25 +0300)] 
Fixed a bug with GUI icon deletion on upgrade from 2.2-RC or earlier

This bug was introduced in commit 110e42d199e735ab1a31388c5678f59d0fa9510c.

Trac-ticket: 120
Signed-off-by: Samuli Seppänen <samuli@openvpn.net>
Acked-by: David Sommerseth <davids@redhat.com>
Signed-off-by: David Sommerseth <davids@redhat.com>
14 years agoAvoid re-defining uint32_t when using mingw compiler
Gisle Vanem [Sat, 9 Apr 2011 12:56:52 +0000 (12:56 +0000)] 
Avoid re-defining uint32_t when using mingw compiler

Since MingW for quite a long time (since 3.2 in 2008?) has defined
'uint32_t' etc. in it's <stdint.h>, we need to guard against defining
them again. Ideally we should figure out in what version of MingW
this happened. But for now:

Signed-off-by: Gisle Vanem <gvanem@broadpark.no>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoAdded man page entry for --management-client
rf [Fri, 8 Apr 2011 18:49:49 +0000 (20:49 +0200)] 
Added man page entry for --management-client

Track-ticket: 114
Signed-off-by: rf <ml-openvpn@trispace.org>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoUpdate man page with info about --remote-random-hostname
rf [Fri, 8 Apr 2011 20:15:23 +0000 (13:15 -0700)] 
Update man page with info about --remote-random-hostname

Trac-ticket: 115
Signed-off-by: rf <ml-openvpn@trispace.org>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFixed copying of tapinstall.exe to dist/bin when using prebuilt TAP-drivers
Samuli Seppänen [Thu, 14 Apr 2011 14:43:40 +0000 (17:43 +0300)] 
Fixed copying of tapinstall.exe to dist/bin when using prebuilt TAP-drivers

Signed-off-by: Samuli Seppänen <samuli@openvpn.net>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoRemoved Win2k from supported platforms list in INSTALL and win/openvpn.nsi
Samuli Seppänen [Thu, 14 Apr 2011 14:41:23 +0000 (17:41 +0300)] 
Removed Win2k from supported platforms list in INSTALL and win/openvpn.nsi

Signed-off-by: Samuli Seppänen <samuli@openvpn.net>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFix a bug in devcon source code handling
Samuli Seppänen [Thu, 14 Apr 2011 14:40:33 +0000 (17:40 +0300)] 
Fix a bug in devcon source code handling

The win/config_ti.py build script assumes to find ../tapinstall/7600/sources.in
which does not exists in devcon.exe source code directory. This makes
config_ti.py look for ../tapinstall/7600/sources instead.

Signed-off-by: Samuli Seppänen <samuli@openvpn.net>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoChange the default --tmp-dir path to a more suitable path
David Sommerseth [Thu, 14 Apr 2011 14:21:16 +0000 (16:21 +0200)] 
Change the default --tmp-dir path to a more suitable path

In commit 4e1cc5f6dda22e9 the create_temp_filename() function was
reviewed and hardened, which in the end renamed this function to
create_temp_file() in commit 495e3cec5d156.

With these changes it became more evident that OpenVPN needs a directory
where it can create temporary files.  The create_temp_file() will create
such files f.ex. if --client-connect or --plugin which makes use of
the OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY hook, such as openvpn-auth-pam.so.

When this happens, OpenVPN will normally create these files in the directory
OpenVPN was started.  In many cases, this will fail due to restricted access.
By using --tmp-dir and pointing it to a directory writeable to the user
running OpenVPN, it works again.

This patch makes OpenVPN use a more suitable temproary directory by default,
instead of the current working directory.  On non-Windows platforms this
default value is set to '/tmp', but can be modified at compile-time by
running ./configure --with-tmp-dir-path=<TEMP DIR PATH>.  On Windows, it
will use GetTempPath() to find temporary paths recommended by the OS.  If
this fails, it will fallback to the old behaviour, using the directory
where OpenVPN was started.

In any cases, this default value can be overridden in the configuration
file by using the --tmp-dir option, as before.

To check what the default is at runime, you can see this easily by doing
this:

      $ ./openvpn --verb 4 --dev tun | grep tmp_dir

Signed-off-by: David Sommerseth <davids@redhat.com>
Tested-by: Jan Just Keijser <janjust@nikhef.nl>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoFixed bug in port-share that could cause port share process to crash
James Yonan [Sun, 3 Apr 2011 21:48:15 +0000 (23:48 +0200)] 
Fixed bug in port-share that could cause port share process to crash
with output like this:

TCP connection established with 85.190.0.3:41781
85.190.0.3:41781 SIGTERM[soft,port-share-redirect] received, client-instance exiting
MANAGEMENT: TCP recv error: Socket operation on non-socket
MANAGEMENT: Client disconnected
MANAGEMENT: Triggering management exit
Exiting due to fatal error
EVENT: epoll_ctl EPOLL_CTL_MOD failed, sd=6: Bad file descriptor (errno=9)

Then an error like this for every incoming connection that should be
proxied:

76.120.71.74:55302 PORT SHARE: sendmsg failed -- unable to communicate with background process (6,8,-1,-1): Connection refused (errno=111)

Version 2.1.3s

14 years agoAdd more detailed explanation regarding the function of "--rdns-internal"
Gert Doering [Sat, 9 Apr 2011 16:16:21 +0000 (18:16 +0200)] 
Add more detailed explanation regarding the function of "--rdns-internal"

As agreed in last thursday's IRC meeting [1], I've added a comment to the
code explaining "--rdns-internal".  It's really very much an internal
option, so it does not need to go to the man page.

[1] http://thread.gmane.org/gmane.network.openvpn.devel/4573

Signed-off-by: Gert Doering <gert@greenie.muc.de>
Acked-by: David Sommerseth <davids@redhat.com>
Signed-off-by: David Sommerseth <davids@redhat.com>
14 years agoChange all CRLF linefeeds to LF linefeeds
Samuli Seppänen [Thu, 14 Apr 2011 14:18:47 +0000 (17:18 +0300)] 
Change all CRLF linefeeds to LF linefeeds

Signed-off-by: Samuli Seppänen <samuli@openvpn.net>
Acked-by: David Sommerseth <davids@redhat.com>
Signed-off-by: David Sommerseth <davids@redhat.com>
14 years agoAdd man page entry for --redirect-private
Samuli Seppänen [Tue, 29 Mar 2011 11:19:00 +0000 (11:19 +0000)] 
Add man page entry for --redirect-private

Trac-ticket: 107
Signed-off-by: Samuli Seppänen <samuli@openvpn.net>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFix the --client-cert-not-required feature
David Sommerseth [Wed, 30 Mar 2011 12:14:21 +0000 (14:14 +0200)] 
Fix the --client-cert-not-required feature

Commit 2e8337de248ef0b5b48cbb2964da0d5c3f28b15b introduced a new
feature for using other SSL certificate fields for authentication
than the CN field.

This commit introduced a bug, which made the verify_callback()
function getting called even if --client-cert-not-required was
enabled in the config.

The reason for this was that an 'else' statement was lacking a
couple of curly braces.  The offending commit in reality moved
the setup of the verify_callback() function out of the 'else'
statement.

Report-URL: https://community.openvpn.net/openvpn/ticket/108
Report-URL: https://forums.openvpn.net/topic7751.html
Signed-off-by: David Sommerseth <davids@redhat.com>
Acked-by: Jan Just Keijser <janjust@nikhef.nl>
14 years ago* ipv6-0.4.16: fix mingw32 build
JuanJo Ciarlante [Sun, 27 Mar 2011 21:41:22 +0000 (23:41 +0200)] 
* ipv6-0.4.16: fix mingw32 build

14 years ago* ipv6-0.4.15b: rebase over openvpn-testing-master
JuanJo Ciarlante [Fri, 25 Mar 2011 13:51:33 +0000 (14:51 +0100)] 
* ipv6-0.4.15b: rebase over openvpn-testing-master

14 years ago* ipv6-0.4.15: add --multihome support to xBSD
JuanJo Ciarlante [Tue, 22 Mar 2011 20:59:23 +0000 (21:59 +0100)] 
* ipv6-0.4.15: add --multihome support to xBSD
  - _both_ for IPv4 (which was missing) and for IPv6
  - tested on OpenBSD 4.7, FreeBSD 8.1

14 years ago* ipv6-0.4.14: fix xinetd usage:
JuanJo Ciarlante [Mon, 21 Mar 2011 08:21:39 +0000 (09:21 +0100)] 
* ipv6-0.4.14: fix xinetd usage:
 - closes http://bugs.debian.org/574164
 - also needed for --disable-ipv6 builds
 - supports IPv6 from xinetd

14 years ago* fix --multihome for ipv6: IPV6_RECVPKTINFO
JuanJo Ciarlante [Sun, 6 Feb 2011 08:52:46 +0000 (09:52 +0100)] 
* fix --multihome for ipv6: IPV6_RECVPKTINFO
  - setsockopt IPV6_RECVPKTINFO (not IPV6_PKTINFO!)
  - do check for setsockopt() failures
  - append %<iface> in INFO msg

14 years ago* fix --multihome for ipv4: cmsg_len must compare against in_pktinfo
JuanJo Ciarlante [Wed, 22 Sep 2010 23:15:35 +0000 (01:15 +0200)] 
* fix --multihome for ipv4: cmsg_len must compare against in_pktinfo
  size, not the full 4+6 union, also use saner variable names.

14 years ago* undo mroute.c changes related to ipv6 payload,
JuanJo Ciarlante [Sat, 20 Feb 2010 19:28:40 +0000 (20:28 +0100)] 
* undo mroute.c changes related to ipv6 payload,
  nothing to do w/ipv6 transport afterall.

14 years ago* rebased to v2.1.1 release
JuanJo Ciarlante [Sat, 28 Nov 2009 17:19:14 +0000 (09:19 -0800)] 
* rebased to v2.1.1 release
* document {un,}trusted_ip6 in manpage

14 years ago* doc updates
JuanJo Ciarlante [Tue, 17 Nov 2009 19:00:05 +0000 (20:00 +0100)] 
* doc updates

14 years ago* fix --disable-ipv6 build
JuanJo Ciarlante [Thu, 12 Nov 2009 10:54:13 +0000 (11:54 +0100)] 
* fix --disable-ipv6 build

14 years ago* updated doc
JuanJo Ciarlante [Wed, 11 Nov 2009 16:25:09 +0000 (17:25 +0100)] 
* updated doc

14 years ago* polished redirect-gateway (ipv4 on ipv6 endpoints) support
JuanJo Ciarlante [Wed, 11 Nov 2009 14:35:31 +0000 (15:35 +0100)] 
* polished redirect-gateway (ipv4 on ipv6 endpoints) support

14 years ago* (prototype) fix for supporting "redirect-gateway" for tunneled ipv4 over ipv6 endpoints
JuanJo Ciarlante [Tue, 10 Nov 2009 22:46:46 +0000 (23:46 +0100)] 
* (prototype) fix for supporting "redirect-gateway" for tunneled ipv4 over ipv6 endpoints

14 years ago* no new funcionality, just small cleanups:
JuanJo Ciarlante [Tue, 20 Oct 2009 20:38:50 +0000 (22:38 +0200)] 
* no new funcionality, just small cleanups:
- cmdline options help: add tcp6/udp6 missing messages
- win32: expand usage of proto_is_udp(), proto_is_tcp()
- replace some memset(&obj, 0, sizeof obj) by openvpn's CLEAR(obj)

14 years ago* openbsd: no IFF_MULTICAST, #ifdef around it
JuanJo Ciarlante [Tue, 20 Oct 2009 20:38:26 +0000 (22:38 +0200)] 
* openbsd: no IFF_MULTICAST, #ifdef around it

14 years ago* doc updates
JuanJo Ciarlante [Mon, 12 Oct 2009 09:31:33 +0000 (11:31 +0200)] 
* doc updates

14 years ago* fixed segfault for undef address family in print_sockaddr_ex (thanks Marcel!)
JuanJo Ciarlante [Mon, 5 Oct 2009 12:44:20 +0000 (14:44 +0200)] 
* fixed segfault for undef address family in print_sockaddr_ex (thanks Marcel!)

14 years ago* socket.c: better buf logic in print_sockaddr_ex
JuanJo Ciarlante [Mon, 5 Oct 2009 10:24:20 +0000 (12:24 +0200)] 
* socket.c: better buf logic in print_sockaddr_ex

14 years ago* TODO.ipv6 update
JuanJo Ciarlante [Sun, 4 Oct 2009 22:18:34 +0000 (00:18 +0200)] 
* TODO.ipv6 update

14 years ago* fix multi-tcp crash (corrected assertion)
JuanJo Ciarlante [Wed, 30 Sep 2009 22:15:12 +0000 (00:15 +0200)] 
* fix multi-tcp crash (corrected assertion)

14 years ago* init.c: small in-doc tweaks
JuanJo Ciarlante [Mon, 28 Sep 2009 17:51:54 +0000 (19:51 +0200)] 
* init.c: small in-doc tweaks

14 years ago* init.c: document the ENABLE_MANAGEMENT place to work on
JuanJo Ciarlante [Mon, 28 Sep 2009 11:47:16 +0000 (13:47 +0200)] 
* init.c: document the ENABLE_MANAGEMENT place to work on

14 years ago* updated {README,TODO}.ipv6 from feedback at openvpn-devel mlist
JuanJo Ciarlante [Mon, 28 Sep 2009 10:16:26 +0000 (12:16 +0200)] 
* updated {README,TODO}.ipv6 from feedback at openvpn-devel mlist

14 years ago* renamed README.ipv6{.txt,}
JuanJo Ciarlante [Fri, 25 Sep 2009 21:20:41 +0000 (23:20 +0200)] 
* renamed README.ipv6{.txt,}

14 years ago* correctly setup hints.ai_socktype for getaddrinfo(),
JuanJo Ciarlante [Thu, 24 Sep 2009 18:09:55 +0000 (20:09 +0200)] 
* correctly setup hints.ai_socktype for getaddrinfo(),
  althought sorta hacky, see TODO.ipv6.

14 years ago* make possible to x-compile openvpn/win32 in Linux
JuanJo Ciarlante [Thu, 24 Sep 2009 17:59:32 +0000 (19:59 +0200)] 
* make possible to x-compile openvpn/win32 in Linux