]> git.ipfire.org Git - thirdparty/openvpn.git/log
thirdparty/openvpn.git
14 years agoChoose a different field in X509 to be username
Emilien Mantel [Thu, 17 Jun 2010 19:38:59 +0000 (21:38 +0200)] 
Choose a different field in X509 to be username

For my company, we use a PKI (linked to a LDAP) with OpenVPN. We can't use "CN" to be
username (few people can have the same "CN"). In our case, we only use the UID.

With my patch, you can choose another field to be username with a new option called
--x509-username-field, the default value is "CN".

Signed-off-by: Emilien Mantel <emilien.mantel@businessdecision.com>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agossl.c: fix use of openvpn_run_script()'s return value
Fabian Knittel [Tue, 4 May 2010 14:21:47 +0000 (16:21 +0200)] 
ssl.c: fix use of openvpn_run_script()'s return value

This patch fixes two bugs introduced in

    commit 339f2a4d4b487afa53fa99d72c35b16f31e417d3
    Author: David Sommerseth <dazo@users.sourceforge.net>
    Date:   Thu Apr 29 23:35:45 2010 +0200

David's patch replaced openvpn_execve() with openvpn_run_script() in two places,
but didn't adjust the return value handling.  openvpn_run_script() returns true
or false, while openvpn_execve() returns the program's exit code.

Without the fix, the --tls-verify script and the --auth-user-pass-verify
script fail to run.  (I noticed the latter, but haven't actually tested the
former.)

The return value handling is fine for the other places where
openvpn_run_script() is used, because those places previously used
openvpn_execve_check() (notice the "_check" suffix).

Signed-off-by: Fabian Knittel <fabian.knittel@avona.com>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoRevamped the script-security warning logging (version 2)
David Sommerseth [Thu, 29 Apr 2010 21:35:45 +0000 (23:35 +0200)] 
Revamped the script-security warning logging (version 2)

The main task of this patch is to avoid reporting the SCRIPT_SECURITY_WARNING
over and over again, in addition to not show this warning when it should not
be a problem.  This general warning should now only appear once, and only when
--script-security is not set, 0 or 1.  In all other cases this warning should
not appear.

In addition, this warning will come close to the script-hook which most probably
will fail.  It will also give a little bit more concrete hint on which script-hook
which failed.  If --script-security is 2 or 3, only the execve failure itself will
be shown.  This message will on the other hand be shown repeatedly.

This is a new rewritten version which simplifies the implementaion of the new
openvpn_run_script() function.  It was considered to remove it completely, but
due to code clearity and easy of use it was decided to make this function a static
inline function instead.  Anyhow, this function will enforce openvpn_execve_check()
to be called with the S_SCRIPT flag.

Patch ACKed on the developers meeting 2009-04-29.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: James Yonan <james@openvpn.net>
14 years agoDon't add compile time information if --enable-small is used
David Sommerseth [Thu, 22 Apr 2010 21:05:00 +0000 (23:05 +0200)] 
Don't add compile time information if --enable-small is used

This is to satisfy those wanting to build openvpn for embedded devices
where every bytes matters.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoMake use of automake CLEANFILES variable instead of clean-local rule
David Sommerseth [Tue, 13 Apr 2010 13:12:27 +0000 (15:12 +0200)] 
Make use of automake CLEANFILES variable instead of clean-local rule

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoFix dependency checking for configure.h (v2)
David Sommerseth [Thu, 22 Apr 2010 21:01:31 +0000 (23:01 +0200)] 
Fix dependency checking for configure.h (v2)

Alon Bar-Lev indicated commit f27bf509315a48b0070294c3993a718df0c2626c
was missing proper dependency checking.  This patch corrects this and
fixes an issue when creating configure.h via make distcheck.

This is an enhanced version of the one sent to the openvpn-devel mailing
list April 13, 2010 [1], after having received some feedback from Gert
Doering, cleaning up configure_log.awk further.

[1] <http://thread.gmane.org/gmane.network.openvpn.devel/3410/focus=3491>

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoAdd comile time information/settings from ./configure to --version
David Sommerseth [Thu, 8 Apr 2010 18:31:01 +0000 (20:31 +0200)] 
Add comile time information/settings from ./configure to --version

This patch will create ./configure.h which will contain two new #define
strings.  CONFIGURE_DEFINES will contain all USE, ENABLED, DISABLED and
DEPRECATED defines from ./config.h.  CONFIGURE_CALL will contain the
complete ./configure line which was used when configuring the package
for building.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: James Yonan <james@openvpn.net>
14 years agopkitool lacks expected option "--help"
Wil Cooley [Tue, 2 Mar 2010 20:54:15 +0000 (21:54 +0100)] 
pkitool lacks expected option "--help"

The pkitool script lacks the "--help" parameter to actually display the
usage statement; most people are conditioned to try that before running the
command without options. This patch adds that and "--version" to display
just the program name and version.

sf.net tracker:
<https://sourceforge.net/tracker/?func=detail&atid=454721&aid=1705407&group_id=48978>

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Jan Just Keijser <janjust@nikhef.nl>
14 years agoSeveral updates to openvpn.8 (man page updates)
Karl O. Pinc [Tue, 2 Mar 2010 20:41:06 +0000 (21:41 +0100)] 
Several updates to openvpn.8 (man page updates)

This is a collection of 4 patches sent to the -devel mailing list:
* [PATCH] Frob the openvpn(8) man page tls-verify section to clarify
* [PATCH] More improvments to openvpn(8) --tls-verify
* [PATCH] Yet another tweak of openvpn(8) --tls-verify
* [PATCH] Final frobbing of openvpn(8) --tls-verify

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoenhance tls-verify possibility
Mathieu GIANNECCHINI [Mon, 1 Mar 2010 23:26:57 +0000 (00:26 +0100)] 
enhance tls-verify possibility

It should be nice to enhance tls-verify check possibilities against peer
cert during a pending TLS connection like :
- OCSP verification
- check any X509 extensions of the peer certificate
- delta CRL verification
- ...

This patch add a new "tls-export-cert" option which allow to get peer
certificate in PEM format and to store it in an openvpn temporary file.
Peer certificate is stored before tls-script execution and deleted after.
The name of the related temporary file is available under tls-verify
script by an environment variable "peer_cert".

The patch was made from OpenVPN svn Beta21 branches.

Here is a very simple exemple of Tls-verify script which provide OCSP
support to OpenVPN (with tls-export-cert option) without any OpenVPN
"core" modification :

X509=$2

openssl ocsp \
      -issuer /etc/openvpn/ssl.crt/RootCA.pem \
      -CAfile /etc/openvpn/ssl.capath/OpenVPNServeur-cafile.pem \
      -cert $peer_cert \
      -url http://your-ocsp-url
      if [ $? -ne 0 ]
      then
          echo "error : OCSP check failed for ${X509}" | logger -t
"tls-verify"
          exit 1
       fi

This has been discussed here:
<http://thread.gmane.org/gmane.network.openvpn.devel/2492>
<http://thread.gmane.org/gmane.network.openvpn.devel/3150>
<http://thread.gmane.org/gmane.network.openvpn.devel/3217>

This patch has been modified by David Sommerseth, by fixing a few issues
which came up to during the code review process.  The man page has been
updated and tmp_file in ssl.c is checked for not being NULL before calling
delete_file().

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoReworked the eurephia patch for inclusion to the openvpn-testing tree
David Sommerseth [Mon, 15 Feb 2010 22:15:44 +0000 (23:15 +0100)] 
Reworked the eurephia patch for inclusion to the openvpn-testing tree

Addedd configure option (--disable-eurephia) to disable the code which the
eurephia plug-in depends on.

It was chosen to use --disable-eurephia, as this patch is not much intrusive.  It
just enables a SHA1 fingerprint environment variable for each certificate being
used for the connection.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFix problem with special case route targets ('remote_host')
Gert Doering [Thu, 21 Oct 2010 08:35:29 +0000 (10:35 +0200)] 
Fix problem with special case route targets ('remote_host')

The init_route() function will leave &netlist untouched for
get_special_addr() routes ("remote_host" being one of them).
netlist is on stack,  contains random garbage, and netlist.len
will not be 0 - thus, random stack data is copied from
netlist.data[] until the route_list is full.

This issue has been reported several places lately:
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600166
   http://thread.gmane.org/gmane.network.openvpn.devel/4083
   https://forums.openvpn.net/viewtopic.php?f=1&t=7201&p=8168

Signed-off-by: Gert Doering <gert@greenie.muc.de>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: James Yonan <james@openvpn.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFixed compiler warnings reported on Ubuntu 10.04
David Sommerseth [Fri, 17 Sep 2010 15:10:25 +0000 (17:10 +0200)] 
Fixed compiler warnings reported on Ubuntu 10.04

The warnings reported where:
--------------------------------------------------------
misc.c:158: warning: ignoring return value of ‘nice’, declared with attribute warn_unused_result
options.c:4033: warning: format not a string literal and no format arguments
options.c:4043: warning: format not a string literal and no format arguments
options.c:4053: warning: format not a string literal and no format arguments
push.c:182: warning: format not a string literal and no format arguments
push.c:199: warning: format not a string literal and no format arguments
push.c:235: warning: format not a string literal and no format arguments
status.c:171: warning: ignoring return value of ‘ftruncate’, declared with attribute warn_unused_result
--------------------------------------------------------

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
Acked-by: Peter Stuge <peter@stuge.se>
14 years agoMore t_client.sh updates - exit with SKIP when we want to skip
David Sommerseth [Wed, 18 Aug 2010 15:05:09 +0000 (17:05 +0200)] 
More t_client.sh updates - exit with SKIP when we want to skip

Several places we exited with 0 instead of 77 when we want to indicate
that we should skip this test.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoTest framework improvment - Do not FAIL if t_client.rc is missing
David Sommerseth [Wed, 18 Aug 2010 13:00:13 +0000 (15:00 +0200)] 
Test framework improvment - Do not FAIL if t_client.rc is missing

This is to avoid 'make check' fail if this extra test case is not
configured.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoBuild t_client.sh by configure at run-time.
Gert Doering [Tue, 10 Aug 2010 10:39:28 +0000 (12:39 +0200)] 
Build t_client.sh by configure at run-time.

This is now built using "configure", knows how to find "ip", "ifconfig" and "netstat" (configure
does the work :-) ), *and* has been tested on Solaris (works!).

extend configure.ac to find "netstat" binary and to chmod +x "t_client.sh"

Signed-off-by: Gert Doering <gert@greenie.muc.de>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agofull "VPN client connect" test framework for OpenVPN
Gert Doering [Sun, 8 Aug 2010 19:24:30 +0000 (21:24 +0200)] 
full "VPN client connect" test framework for OpenVPN

Run from "make check" if "t_client.rc" is found in workdir or srcdir
 (copy t_client.rc-sample, fill in specifics for your test server)

How does it work?

 - you run "sudo make check" (needs root access to configure tun if!)

 - t_client.sh reads t_client.rc from current dir or ${srcdir}

 - t_client.rc defines a number of "test suffixes" to run (could be
   "1" "2" "3" or "p2m", "p2p", "special" or whatever you like), and
   for each suffix, there's config variables to specify

    - how to call OpenVPN
    - which hosts to ping for IPv4 and IPv6 when OpenVPN is up
      (and actually before starting OpenVPN - to make the test more
      meaningful, I have decided that the test hosts must not ping
      before the tests starts)
    - which addresses must show up in the output of "ifconfig" after
      OpenVPN has started
    - all variables except OPENVPN_CONF_<x> are optional

   (this should all be fairly obvious from looking at t_client.rc-sample)

 - the script wants to connect to a well-defined OpenVPN server that
   will assign well-known IPv4 (and IPv6) addresses, have well-defined
   pingable addresse, etc. - so you need to setup the test server before
   the script is useful for you.  (Whether you use certificates or
   username/password is up to you, you could even mix and match - run
   one test with certs, and one with user/pass against different target
   ports... :-) )

   [we *could* run a "reference server" somewhere and ship a sample
   t_client.rc + cert so that users could use this right away, but I
   do not currently have the resources to run such a public server]

 - whatever the script does is logged to a newly created directory
   below the current directory (openvpn output, ifconfig+route before
   starting OpenVPN, while running it, after ending it)

 - important: at least on NetBSD and OpenBSD, the script will print
   one failure, because the tun0 interface created is not destroyed
   after openvpn ends.  For OpenBSD, I have changed close_tun() to
   do so ("ifconfig tun0 destroy"), for NetBSD I have not yet changed
   anything - but I strongly believe that the output of "ifconfig+route"
   should be reverted to exactly how it looked like before OpenVPN
   was started, so I consider this a bug in the NetBSD-specific bits
   of OpenVPN (and will look into this).

 - the test framework has been tested on Linux, NetBSD and OpenBSD.
   It *should* work fine on FreeBSD and Solaris.
   It works on MacOS X (but the output looks funny, because /bin/sh
   does not implement "echo -e" - need to add configure trickery)

   It will *not* work on Windows yet - I haven't looked into what's
   needed to make it work (background processes and signals in mingw
   bash?), maybe it's as easy as adding the necessary "ipconfig" and
   "netsh" commands to print interface + routing config...

 - I have only tested "connect via IPv4 transport, use IPv4+IPv6 payload",
   but the framework is generic enough that "connect via IPv6 transport"
   should work just fine (just setup OPENVPN_CONF_x accordingly in the
   t_client.rc).

 - this is neither finished nor pretty, but it helps me a *lot* in
   quickly testing whether I broke anything when fiddling system-dependent
   code (tun.c, route.c) across multiple build hosts - so I hope this
   is going to be fairly useful to Samuli and the buildbot :-)

Signed-off-by: Gert Doering <gert@greenie.muc.de>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFixes openssl-1.0.0 compilation warning
chantra [Fri, 16 Jul 2010 18:09:07 +0000 (20:09 +0200)] 
Fixes openssl-1.0.0 compilation warning

When compiling against OpenSSL v1.0.0, the following compiler warnings
appears.

ssl.c: In function ‘verify_callback’:
ssl.c:944: warning: passing argument 1 of ‘sk_num’ from incompatible
pointer type
/usr/include/openssl/stack.h:79: note: expected ‘const struct _STACK *’
but argument is of type ‘struct stack_st_X509_REVOKED *’
ssl.c:947: warning: passing argument 1 of ‘sk_value’ from incompatible
pointer type
/usr/include/openssl/stack.h:80: note: expected ‘const struct _STACK *’
but argument is of type ‘struct stack_st_X509_REVOKED *’
ssl.c: In function ‘init_ssl’:
ssl.c:1565: warning: passing argument 1 of ‘sk_num’ from incompatible
pointer type
/usr/include/openssl/stack.h:79: note: expected ‘const struct _STACK *’
but argument is of type ‘struct stack_st_X509 *’
ssl.c: In function ‘print_details’:
ssl.c:1766: warning: assignment discards qualifiers from pointer target type

Trac ticket #5
https://community.openvpn.net/openvpn/ticket/5

Signed-off-by: chantra <chantra@debuntu.org>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFix <net/if.h> compile time problems on OpenBSD for good
Gert Doering [Sat, 10 Jul 2010 09:24:41 +0000 (11:24 +0200)] 
Fix <net/if.h> compile time problems on OpenBSD for good

Previous fix (commit eb973e055bc249948) fixed NetBSD but not OpenBSD
(include <sys/socket.h> *after* <sys/types.h>)

Signed-off-by: Gert Doering <gert@greenie.muc.de>
Acked-by: krzee <jeff@doeshosting.com>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFix compile problems on NetBSD and OpenBSD
Gert Doering [Fri, 9 Jul 2010 08:24:46 +0000 (10:24 +0200)] 
Fix compile problems on NetBSD and OpenBSD

Configure will not find <net/if.h> due to missing <sys/types.h> in the test program,
and thus, tun.c will fail to compile with missing symbol IFF_MULTICAST.

Signed-off-by: Gert Doering <gert@greenie.muc.de>
Acked-by: krzee <jeff@doeshosting.com>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFix multiple configured scripts conflicts issue (version 2)
David Sommerseth [Thu, 5 Aug 2010 18:51:22 +0000 (20:51 +0200)] 
Fix multiple configured scripts conflicts issue (version 2)

This is a fix for trac ticket #20,
<https://community.openvpn.net/openvpn/ticket/20>
which was started in the sf.net bug tracker:
<http://sourceforge.net/tracker/?func=detail&aid=2078470&group_id=48978&atid=454719>

The implemented solution is to give a warning for each of the different script hooks
available.  The last configured script will override any earlier configured scripts,
to ensure that the command line can override the configuration file.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: James Yonan <james@openvpn.net>
14 years agoExclude ping and control packets from activity
Davide Brini [Sun, 2 May 2010 09:07:38 +0000 (11:07 +0200)] 
Exclude ping and control packets from activity

Problem: using --ping and --inactive together partially defeats the
point of using --inactive as periodic ping packets are counted as
activity. Here is the original discussion:

http://article.gmane.org/gmane.network.openvpn.devel/3676

It turns out that "activity" is detected and recorded in two places
in the code, both in forward.c: in process_outgoing_tun() for received
packets, after they've been decrypted and sent to the TUN device; and
in process_outgoing_link(), after they've been encrypted and written
to the network socket.

In the first case we can be sure that packets that get so far are
really due to user activity, whereas in the second case there can be
non-user packets (like OpenVPN's internal ping packets, and TLS control
packets), and those should not be counted as activity as they are not
coming from the user.

So a need arises to detect those control packets and not count them as
activity for the purposes of --inactive. Unfortunately, at that stage
packets are already compressed and encrypted, so it's not possible to
look into them to see what they are. However, there seems to be a
convention in the code that packets whose buffer length in the context_2
structure is 0 should be ignored for certain purposes. TLS control
packets follow that convention already, so this patch makes a small
change in the code that generates the ping packets to set their buffer
length to 0 as well.
Finally, the call to register_activity() in process_outgoing_link() is
made conditional to the buffer length being > 0.

According to my tests, now --inactive behaves correctly according to
the configured parameters (time or time+bytes) even when --ping is
being used.

forward.c:
    Call register_activity() in process_outgoing_link() only if the
    packet is not a ping or TLS control packet.

openvpn.8:
    Updated the description of --inactive to describe the new semantics.

ping.c:
    Set c->c2.buf.len = 0 after the ping packet has been generated and
    encrypted.

Test routine is described here:
<https://community.openvpn.net/openvpn/wiki/PingInactivePatch?version=6>

Signed-off-by: Davide Brini <dave_br@gmx.com>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFix errors in openvpn-plugin.h documentation
chantra [Fri, 30 Jul 2010 18:48:50 +0000 (20:48 +0200)] 
Fix errors in openvpn-plugin.h documentation

Just minor updates to comments in openvpn-plugin.h

Signed-off-by: chantra <chantra@debuntu.org>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFixed client hang when server don't PUSH (aka the NO_SOUP_FOR_YOU patch)
David Sommerseth [Sat, 12 Jun 2010 22:35:55 +0000 (00:35 +0200)] 
Fixed client hang when server don't PUSH (aka the NO_SOUP_FOR_YOU patch)

Solves bug ticket 13
<https://community.openvpn.net/openvpn/ticket/13>

When the client sends PUSH_REQUESTS, it waits until the server sends PUSH_REPLY.
If the server do not have anything to push to the client nothing happens.  The
client will then regularly send new PUSH_REQUESTS until it gets an answer, which
results in not completing the connection negotiation.

This patch makes the server send an empty PUSH_REPLY when it has nothing to more
to push to the client.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: James Yonan <james@openvpn.net>
14 years agoHandle non standard subnets in PF grammar
chantra [Fri, 11 Jun 2010 14:23:03 +0000 (16:23 +0200)] 
Handle non standard subnets in PF grammar

Allow subnets for like 192.168.100.8/28 to be understood.  A warning
will be logged when subnet is incorrect and is being corrected to what
is assumed to be correct.

Signed-off-by: chantra <chantra@debuntu.org>
Acked-by: Gert Doering <gert@greenie.muc.de>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoOCSP_check.sh: new check logic
David Sommerseth [Sun, 16 May 2010 17:42:40 +0000 (19:42 +0200)] 
OCSP_check.sh: new check logic

contrib/OCSP_check/OCSP_check.sh:
  I discovered that, quite surprisingly, the exit status of "openssl ocsp"
  is 0 even if the certificate status is "revoked". This means that the
  logic of the script needs to be rewritten so that it parses the output
  returned by the query and explicitly looks for a

  "0x<serial number>: good"

  line, and exit if either the command has a non-zero exit status, or the
  above line is not found.

  Doing that portably without bashisms requires some juggling around, so
  perhaps the code is slightly less clean now, but it does have many
  comments.

Signed-off-by: Davide Brini <dave_br@gmx.com>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoAvoid repetition of "this config may cache passwords in memory" (v2)
David Sommerseth [Mon, 26 Apr 2010 07:50:30 +0000 (09:50 +0200)] 
Avoid repetition of "this config may cache passwords in memory" (v2)

For OpenVPN clients with long living connections, this message is repeated
everytime the connection is renegotiated.  This patch removes this behaviour
and will only show this warning once.

Patch ACKed on the developers meeting 2009-04-29.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: James Yonan <james@openvpn.net>
14 years agoFix certificate serial number export
Davide Brini [Tue, 27 Apr 2010 11:20:05 +0000 (12:20 +0100)] 
Fix certificate serial number export

    contrib/OCSP_check/OCSP_check.sh:
             New barebone script to demonstrate how to use $tls_serial_{n}
             to perform simple OCSP queries using OpenSSL command line
             "openssl ocsp". Minimal sanity checks to fail if user tries to
             use it without customizing.

    openvpn.8:
             Added some notes about $tls_serial_{n} format and usage to the
             existing description.

    ssl.c:
             correctly manage and export serial numbers of any size (as
             parsed by OpenSSL) into the environment. Set to empty string
             in case of errors, as 0 and negative numbers are all possible
             (although illegal) certificate serial numbers. Use an OpenSSL
             BIO object to do the job. Conforms to coding style guidelines.

    See the discussion at

    http://article.gmane.org/gmane.network.openvpn.devel/3588

    for more details.

Signed-off-by: Davide Brini <dave_br@gmx.com>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFix missing /bin/bash -> /bin/sh
Davide Brini [Thu, 22 Apr 2010 07:50:31 +0000 (09:50 +0200)] 
Fix missing /bin/bash -> /bin/sh

In commit a9c9a89e96dc1e4e843e05ecadc4349b81606b06 the
client.{up,down} scripts where overhauled and bashism was removed.
During that process, a #! change was missing.

Signed-off-by: Davide Brini <dave_br@gmx.com>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoEnhance contrib/pull-resolv-conf/client.{up,down} scripts
Davide Brini [Mon, 19 Apr 2010 20:41:42 +0000 (22:41 +0200)] 
Enhance contrib/pull-resolv-conf/client.{up,down} scripts

Patch arrived from Davide Brini:

- No more bashisms (AFAICT). Should work with any POSIX-compatible shell
(which means "almost all reasonably recent shells"), though I've only tested
with bash and dash.

- Unnecessary calls to external tools (sed) removed

- Manages multiple DNS and DOMAIN options. Each DNS option becomes a
"nameserver" line in the new resolv.conf (up to a maximum of 3). If there's a
single DOMAIN option, it becomes a "domain" line in resolv.conf; otherwise,
all the domains are listed in a "search" line in resolv.conf (eg "search
foo.com example.net").

- Client.up renames the existing resolv.conf and creates a brand new one;
client.down restores it from the saved copy when the VPN terminates (the usual
rules about running as root apply). This is how Gentoo does that; the old
scripts instead added/removed some lines at the beginning of the file, which
looks a less clean approach to me. The rename approach also dramatically
simplifies and shortens client.down, as you'll see.

- Uses resolvconf if it's available (detected by the presence of
/sbin/resolvconf) rather than writing to resolv.conf directly. Not sure
whether this is a Linux-only thing or other systems use it though.

Script has been smoke tested on Fedora 12 with OpenVPN 2.1.1 without
the resolvconf package , and in addition Debian Lenny with
OpenVPN 2.1_rc11 according to the patch.

Signed-off-by: Davide Brini <dave_br@gmx.com>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoThe man page does not mention that the default value of "mssfix" is 1450.
Davide Brini [Sun, 18 Apr 2010 22:23:52 +0000 (00:23 +0200)] 
The man page does not mention that the default value of "mssfix" is 1450.

Signed-off-by: Davide Brini <dave_br@gmx.com>
Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFixed potential NULL pointer issue
David Sommerseth [Sat, 17 Apr 2010 19:03:06 +0000 (21:03 +0200)] 
Fixed potential NULL pointer issue

If create_temp_file() returns NULL, this strlen() check would cause
a SEGV.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoRemoved no longer needed delete_file() call
David Sommerseth [Sat, 17 Apr 2010 19:01:20 +0000 (21:01 +0200)] 
Removed no longer needed delete_file() call

Fabian Knittel noticed that this delete_file() calls should have been
removed in commit 5d30273a8741d2c1410bfdbc08b341398bf39b40

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoUpdated the man page to reflect the behavioural change of create_temp_file()
David Sommerseth [Fri, 16 Apr 2010 20:11:59 +0000 (22:11 +0200)] 
Updated the man page to reflect the behavioural change of create_temp_file()

As this function now creates the temp file, it is no longer
'not-yet-created', but 'freshly created'.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoRenamed all calls to create_temp_filename()
David Sommerseth [Fri, 16 Apr 2010 20:09:48 +0000 (22:09 +0200)] 
Renamed all calls to create_temp_filename()

All places where create_temp_filename() was called are now calling
create_temp_file().  Extra checks on the result of create_temp_file()
is added in addition.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoHarden create_temp_filename() (version 2)
David Sommerseth [Fri, 16 Apr 2010 20:02:36 +0000 (22:02 +0200)] 
Harden create_temp_filename() (version 2)

By hardening the create_temp_filename() function to check if the generated
filename exists and to create the temp file with only S_IRUSR|S_IWUSR bit
files set before calling the script, it should become even more difficult to
exploit such a scenario.

After a discussion on the mailing list, Fabian Knittel provided an enhanced
version of the inital patch which is added to this patch.

This patch also renames create_temp_filename() to create_temp_file(), as this
patch also creates the temporary file.  The function returns the filename of the
created file, or NULL on error.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: Fabian Knittel <fabian.knittel@avona.com>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoMake use of counter_type instead of int when counting bytes and network packets
David Sommerseth [Thu, 8 Apr 2010 19:18:42 +0000 (21:18 +0200)] 
Make use of counter_type instead of int when counting bytes and network packets

This is in response to a reported Debian bug, where the connection counter overflows.
<http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576827>

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoThe man page needs dash escaping in UTF-8 environments
Jan Brinkmann [Sun, 28 Feb 2010 22:29:29 +0000 (23:29 +0100)] 
The man page needs dash escaping in UTF-8 environments

There was a debian bugreport which was filed in 2005 . It was patched but
it seems that nobody forwarded the patch to the openvpn project itself.

The problem is quite simple:
The dashes for options (the double dashes) are not escaped. This causes
trouble in relationship with utf-8 .

Since the bugreport was closed it was patched within the debian/ubuntu
packages itself. I've attached the patch to get it atleast reviewed by the
openvpn project itself.

See <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=296133> for details.

sf.net tracker:
<https://sourceforge.net/tracker/?func=detail&aid=2935611&group_id=48978&atid=454721>

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Tested-by: Jan Just Keijser <janjust@nikhef.nl>
Tested-by: Pavel Shramov <shramov@mexmat.net>
Tested-by: Samuli Seppänen <samuli@openvpn.net>
14 years agoWhen I began testing OpenVPN v2.1_rc9 I was having trouble authenticating to the...
Daniel Johnson [Tue, 30 Mar 2010 13:54:44 +0000 (15:54 +0200)] 
When I began testing OpenVPN v2.1_rc9 I was having trouble authenticating to the MS Active Directory through auth-pam and Samba. I used the following line in my configs (without the linebreak of course):

plugin /opt/openvpn/openvpn-auth-pam.so
                   "openvpn login OURDOMAIN+USERNAME password PASSWORD"

Finally I turned on more verbose logging and found that the plugin did
not recognize "USERNAME" as something to replace, because it expected
the string to be surrounded by whitespace.  I wrote the following patch
to correct this.  I hope you find it useful,

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoDebian patch: Fix spelling in log message
Alberto Gonzalez Iniesta [Tue, 16 Mar 2010 22:03:10 +0000 (23:03 +0100)] 
Debian patch: Fix spelling in log message

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
14 years agoFix autotools cross-compiling support
David Sommerseth [Thu, 11 Mar 2010 16:28:41 +0000 (17:28 +0100)] 
Fix autotools cross-compiling support

This is a modified version of a patch sent to the sf.net
patch tracker:

<http://sourceforge.net/tracker/?func=detail&aid=2491190&group_id=48978&atid=454721>

After having disucssed this patch on IRC (#openvpn-discussions)
March 4, 2010, it was decided to accept this patch when not modifying
TARGET_* defines through out the code.  Further, in a mail comment
Alon Bar-Lev had some other comments of what would be needed to be done.

Mail reference:
<http://thread.gmane.org/gmane.network.openvpn.devel/3176>

This patch has been tested by bootstrapping the code on a RHEL4.6 box.
with the following autotools packages installed:
autoconf-2.59-5
automake-1.9.2-3
libtool-1.5.6-4.EL4.2

It builds cleanly and 'make check' passes.

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: James Yonan <james@openvpn.net>
Acked-by: Alon Bar-Lev <alon.barlev@gmail.com>
14 years agoOn TARGET_LINUX define _GNU_SOURCE if not defined
David Sommerseth [Wed, 10 Mar 2010 10:45:04 +0000 (11:45 +0100)] 
On TARGET_LINUX define _GNU_SOURCE if not defined

This is to include peercred support on hosts where _GNU_SOURCE is not
defined by default.  This issue has been found on Gentoo with glibc-2.8.

The solution was discussed on the IRC meeting March 4, 2010
in #openvpn-discussions.
<http://thread.gmane.org/gmane.network.openvpn.devel/3242>

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: James Yonan <james@openvpn.net>
14 years agoThe man page needs dash escaping in UTF-8 environments
Jan Brinkmann [Sun, 28 Feb 2010 22:29:29 +0000 (23:29 +0100)] 
The man page needs dash escaping in UTF-8 environments

There was a debian bugreport which was filed in 2005 . It was patched but
it seems that nobody forwarded the patch to the openvpn project itself.

The problem is quite simple:
The dashes for options (the double dashes) are not escaped. This causes
trouble in relationship with utf-8 .

Since the bugreport was closed it was patched within the debian/ubuntu
packages itself. I've attached the patch to get it atleast reviewed by the
openvpn project itself.

See <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=296133> for details.

sf.net tracker:
<https://sourceforge.net/tracker/?func=detail&aid=2935611&group_id=48978&atid=454721>

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Tested-by: Jan Just Keijser <janjust@nikhef.nl>
Tested-by: Pavel Shramov <shramov@mexmat.net>
Tested-by: Samuli Seppänen <samuli@openvpn.net>
14 years agobash->bourne script cleanup
Dan Nelson [Sun, 28 Feb 2010 21:09:18 +0000 (22:09 +0100)] 
bash->bourne script cleanup

Many of the scripts in the openvpn source have their shell set to
/bin/bash, but only two use bash features. The attached patch (against
openvpn-2.1_rc9) sets the shell on the rest of the scripts to /bin/sh for
better portability. The only scripts that actually require bash are
contrib/pull-resolv-conf/client.{up,down} ; they use the ${!var} variable
indirection feature.

sf.net tracker:
<https://sourceforge.net/tracker/?func=detail&aid=2040296&group_id=48978&atid=454721>

Discussed on the IRC meeting March 4, 2010 in #openvpn-discussions.
<http://thread.gmane.org/gmane.network.openvpn.devel/3242>

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: James Yonan <james@openvpn.net>
14 years agoAllow 'lport 0' setup for random port binding
Enrico Scholz [Sun, 28 Feb 2010 13:40:57 +0000 (14:40 +0100)] 
Allow 'lport 0' setup for random port binding

I am running a multihomed host where 'local <extip>' must be specified
for proper operation.  Unfortunately, this implies 'lport 1194' or
another static port.

This causes problems with stateful firewalls which register the host/port
pairs in the internal connection tracking table. On ungraceful reconnects,
the new TCP connection will have same the host/port pairs but unexpected
sequence numbers. The new connection will be assumed as invalid hence and
be dropped.

It would be nice when local port can be configured to be bound to a
random port number.  After reading code,

|    else if (streq (p[0], "lport") && p[1])
|  ...
|        port = atoi (p[1]);
|-       if (!legal_ipv4_port (port))
|+       if (port != 0 && !legal_ipv4_port (port))
|          {

in options.c seems to be the only required change.

This has been discussed here:
<http://thread.gmane.org/gmane.network.openvpn.user/28622>

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years agoremove duplicate code in FREEBSD+DRAGONFLY system-dependent ifconfig
Gert Doering [Sun, 28 Feb 2010 22:09:40 +0000 (23:09 +0100)] 
remove duplicate code in FREEBSD+DRAGONFLY system-dependent ifconfig
(ACKed by Eric F Crist and David Sommerseth)

(cherry picked from commit dd66b12647852e3f1267be70b0fb3b11deedf377)

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Signed-off-by: Gert Doering <gert@greenie.muc.de>
14 years agoverb 5 logging wrongly reports received bytes
David Sommerseth [Fri, 19 Feb 2010 16:32:56 +0000 (17:32 +0100)] 
verb 5 logging wrongly reports received bytes

With --verb 5, openvpn logs a single letter (rwRW) for each package
received or sent. I recently ran into a problem with the tun device on
Linux where the read from that device returned 0. Unfortunately this was
also logged as "r", which made me assume that openvpn had received
something, while it actually hadn't.

(See https://dev.openwrt.org/ticket/6650 for the bug that made me find out
about this problem with openvpn.)

I'm attaching a patch which prevents openvpn from logging "r" or "R" when
it didn't actually read anything. This is against openvpn 2.1-rc20, but
probably still applies to the most recent version.

This patch was received anonymously via the sf.net bug tracker:
<http://sourceforge.net/tracker/?func=detail&atid=454719&aid=2951003&group_id=48978>

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
14 years ago[PATCH] Change verify-cn so cn is no longer hardcoded in openvpn's config file
Karl O. Pinc [Thu, 18 Feb 2010 20:30:48 +0000 (21:30 +0100)] 
[PATCH] Change verify-cn so cn is no longer hardcoded in openvpn's config file

This patch should be easy to process.
A resubmission of the patch sent to this list on 04/23/2009.

The patch changes the verify-cn script sample
to be used with --tls-verify so that instead of having
to hardcode a cn to verify in the OpenVPN configuration file
the allowed cns may be written into a separate file.

This makes the process of verifying cns a whole
lot more dynamic, to the point where it is useful
in the real world.

One problem with this patch is that it is backwards
incompatible.  I did not bother keeping the original
calling interface as A) it's a sample script, and B) the
original's functionality seems useless
and equalivant functionality is easily available
with the new script.

The problem with the original is that there seems
little point in verifying a client's cn when all
the clients share one cn, as would have to be
the case when the cn is hardcoded into the openvpn
config file.

This patch applies against the testing allmiscs branch,
and should apply against any of the other testing
branches as well.

It works for me.  I've tested it throughly but not
used it extensively in production.

Regards,

Karl <kop@meme.com>

Signed-off-by: David Sommerseth <dazo@users.sourceforge.net>
Acked-by: Gert Doering <gert@greenie.muc.de>
Acked-by: Eric F Crist <ecrist@secure-computing.net>
14 years agoAdded mapping files from SVN commit ID to more descriptive commit IDs.
David Sommerseth [Tue, 16 Feb 2010 21:06:51 +0000 (22:06 +0100)] 
Added mapping files from SVN commit ID to more descriptive commit IDs.

Unfortunately, this will not rewrite the commit history.  So all commits
done by james@e7ae566f-a301-0410-adde-c780ea21d3b5 is James Yonans commits.

It was considered to risky to use git tools to rewrite the commit history, as
it could influence those already using this git tree.

14 years agoAdded --proto-force directive.
James Yonan [Wed, 1 Sep 2010 06:04:29 +0000 (06:04 +0000)] 
Added --proto-force directive.

Version 2.1.3a

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6424 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoDon't configure Linux tun/tap txqueuelen setting if OpenVPN
James Yonan [Tue, 31 Aug 2010 21:39:30 +0000 (21:39 +0000)] 
Don't configure Linux tun/tap txqueuelen setting if OpenVPN
txqueuelen directive is set to 0.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6420 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoAllow PKCS12 file content to be included inline in configuration file,
James Yonan [Sun, 29 Aug 2010 05:24:15 +0000 (05:24 +0000)] 
Allow PKCS12 file content to be included inline in configuration file,
rendered as base64.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6412 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoAttempt to fix issue where domake-win build system was not properly v2.1.3
James Yonan [Fri, 20 Aug 2010 20:24:42 +0000 (20:24 +0000)] 
Attempt to fix issue where domake-win build system was not properly
signing drivers and .exe files.

Added win/tap_span.py for building multiple versions of the TAP driver
and tapinstall binaries using different DDK versions to span from Win2K
to Win7 and beyond.

Version 2.1.3

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6404 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoWindows security issue: v2.1.2
James Yonan [Sun, 15 Aug 2010 21:53:00 +0000 (21:53 +0000)] 
Windows security issue:
Fixed potential local privilege escalation vulnerability in
Windows service. The Windows service did not properly quote the
executable filename passed to CreateService.  A local attacker
with write access to the root directory C:\ could create an
executable that would be run with the same privilege level as
the OpenVPN Windows service.  However, since non-Administrative
users normally lack write permission on C:\, this vulnerability
is generally not exploitable except on older versions of Windows
(such as Win2K) where the default permissions on C:\ would allow
any user to create files there.
Credit:  Scott Laurie, MWR InfoSecurity

Version 2.1.2

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6400 e7ae566f-a301-0410-adde-c780ea21d3b5

14 years agoAdded warning about tls-remote in man page.
James Yonan [Tue, 10 Aug 2010 17:31:31 +0000 (17:31 +0000)] 
Added warning about tls-remote in man page.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6384 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoDistribute win directory (Python/MSVC-based build system)
James Yonan [Mon, 9 Aug 2010 20:15:27 +0000 (20:15 +0000)] 
Distribute win directory (Python/MSVC-based build system)
in "make dist" tarball.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6382 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoAdded "net stop dnscache" and "net start dnscache" in front
James Yonan [Tue, 27 Jul 2010 21:46:34 +0000 (21:46 +0000)] 
Added "net stop dnscache" and "net start dnscache" in front
of existing --register-dns commands.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6352 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoFixed an issue where application payload transmissions on the
James Yonan [Tue, 27 Jul 2010 07:10:01 +0000 (07:10 +0000)] 
Fixed an issue where application payload transmissions on the
TLS control channel (such as AUTH_FAILED) that occur during
or immediately after a TLS renegotiation might be dropped.

Version 2.1.1n

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6350 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoFixed typo: missing comment close.
James Yonan [Mon, 26 Jul 2010 18:26:49 +0000 (18:26 +0000)] 
Fixed typo: missing comment close.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6347 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoAdded win/build_exe.py script, which is similar to
James Yonan [Fri, 16 Jul 2010 19:08:35 +0000 (19:08 +0000)] 
Added win/build_exe.py script, which is similar to
win/build_all.py except that it doesn't build the
TAP drivers or tapinstall.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6306 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoAdded --register-dns option for Windows.
James Yonan [Fri, 16 Jul 2010 18:01:11 +0000 (18:01 +0000)] 
Added --register-dns option for Windows.

Fixed some issues on Windows with --log, subprocess creation
for command execution, and stdout/stderr redirection.

Version 2.1.1m.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6304 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoImplemented multi-address DNS expansion on the network field of route
James Yonan [Mon, 12 Jul 2010 01:55:54 +0000 (01:55 +0000)] 
Implemented multi-address DNS expansion on the network field of route
commands.

When only a single IP address is desired from a multi-address DNS
expansion, use the first address rather than a random selection.

Version 2.1.1l

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6291 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoVersion 2.1.1k
James Yonan [Sat, 10 Jul 2010 03:13:25 +0000 (03:13 +0000)] 
Version 2.1.1k

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6285 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoFixed bug in proxy fallback capability where openvpn.exe could
James Yonan [Sat, 10 Jul 2010 03:04:27 +0000 (03:04 +0000)] 
Fixed bug in proxy fallback capability where openvpn.exe could
core dump if http-proxy-fallback-disable command was issued in
response to ">PROXY:NEED_NOW management" interface notification.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6284 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoAdded support for MSVC debugging of openvpn.exe in settings.in:
James Yonan [Sat, 10 Jul 2010 03:00:08 +0000 (03:00 +0000)] 
Added support for MSVC debugging of openvpn.exe in settings.in:

  # Build debugging version of openvpn.exe
  !define PRODUCT_OPENVPN_DEBUG

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@6283 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoFixed issue where bad creds provided by the management interface
James Yonan [Thu, 10 Jun 2010 03:17:21 +0000 (03:17 +0000)] 
Fixed issue where bad creds provided by the management interface
for HTTP Proxy Basic Authentication would go into an infinite
retry-fail loop instead of requerying the management interface for
new creds.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5701 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoImplemented a key/value auth channel from client to server.
James Yonan [Tue, 1 Jun 2010 07:12:27 +0000 (07:12 +0000)] 
Implemented a key/value auth channel from client to server.

Version 2.1.1i

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5668 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoImplemented http-proxy-override and http-proxy-fallback directives to make it
James Yonan [Mon, 24 May 2010 22:51:16 +0000 (22:51 +0000)] 
Implemented http-proxy-override and http-proxy-fallback directives to make it
easier for OpenVPN client UIs to start a pre-existing client config file with
proxy options, or to adaptively fall back to a proxy connection if a direct
connection fails.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5652 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoMinor fixes to recent HTTP proxy changes:
James Yonan [Tue, 11 May 2010 19:47:03 +0000 (19:47 +0000)] 
Minor fixes to recent HTTP proxy changes:

* use strcasecmp instead of stricmp

* define HASH and HASHHEX as unsigned char to avoid compiler
  warnings

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5629 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoProxy improvements:
James Yonan [Tue, 11 May 2010 19:32:41 +0000 (19:32 +0000)] 
Proxy improvements:

Improved the ability of http-auth "auto" flag to dynamically detect
the auth method required by the proxy.

Added http-auth "auto-nct" flag to reject weak proxy auth methods.

Added HTTP proxy digest authentication method.

Removed extraneous openvpn_sleep calls from proxy.c.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5628 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoFixed issue on Windows with MSVC compiler, where TCP_NODELAY support
James Yonan [Sun, 9 May 2010 00:03:42 +0000 (00:03 +0000)] 
Fixed issue on Windows with MSVC compiler, where TCP_NODELAY support
was not being compiled in.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5620 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoUpdated copyright date to 2010.
James Yonan [Wed, 28 Apr 2010 16:31:36 +0000 (16:31 +0000)] 
Updated copyright date to 2010.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5599 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoAdded Python-based build system for Windows in
James Yonan [Thu, 22 Apr 2010 12:53:31 +0000 (12:53 +0000)] 
Added Python-based build system for Windows in
win directory.

Fixed minor issue in TAP driver DEBUG builds where
non-null-terminated unicode strings were being
printed incorrectly.

Version 2.1.1g

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5577 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoMinor change to doclean script:
James Yonan [Sat, 17 Apr 2010 02:23:50 +0000 (02:23 +0000)] 
Minor change to doclean script:

Don't delete config-win32.h, because this is now a true source file
and no longer a generated file.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5558 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoManagement interface performance optimizations:
James Yonan [Fri, 16 Apr 2010 07:04:45 +0000 (07:04 +0000)] 
Management interface performance optimizations:

* Added env-filter MI command to perform filtering on env vars
  passed through as a part of --management-client-auth

* man_write will now try to aggregate output into larger blocks
  (up to 1024 bytes) for more efficient i/o

Version 2.1.1f

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5557 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoUpdated MSVC build scripts to Visual Studio 2008:
James Yonan [Wed, 31 Mar 2010 06:38:21 +0000 (06:38 +0000)] 
Updated MSVC build scripts to Visual Studio 2008:
  python msvc\config.py
  nmake /f msvc\msvc.mak

Version 2.1.1e

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5516 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoSet socket buffers (SO_SNDBUF and SO_RCVBUF) immediately after
James Yonan [Tue, 30 Mar 2010 04:20:55 +0000 (04:20 +0000)] 
Set socket buffers (SO_SNDBUF and SO_RCVBUF) immediately after
socket is created rather than waiting until after connect/listen.

Version 2.1.1d

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5514 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoVersion 2.1.1c
James Yonan [Wed, 17 Mar 2010 18:54:47 +0000 (18:54 +0000)] 
Version 2.1.1c

Enable exponential backoff in reliability layer
retransmits.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5490 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoModified ">PASSWORD:Verification Failed" management interface
James Yonan [Fri, 12 Mar 2010 03:05:34 +0000 (03:05 +0000)] 
Modified ">PASSWORD:Verification Failed" management interface
notification to include a client reason string:

  >PASSWORD:Verification Failed: 'AUTH_TYPE' ['REASON_STRING']

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5468 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoAdded stub directive "remote-ip-hint".
James Yonan [Fri, 12 Mar 2010 03:00:41 +0000 (03:00 +0000)] 
Added stub directive "remote-ip-hint".

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5467 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoTrivial fix to proxy.c -- #define proxy auth type as UP_TYPE_PROXY.
James Yonan [Fri, 12 Mar 2010 02:59:17 +0000 (02:59 +0000)] 
Trivial fix to proxy.c -- #define proxy auth type as UP_TYPE_PROXY.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5466 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoFixed an issue where if reneg-sec was set to 0 on the client,
James Yonan [Sat, 6 Mar 2010 15:38:23 +0000 (15:38 +0000)] 
Fixed an issue where if reneg-sec was set to 0 on the client,
so that the server-side value would take precedence,
the auth_deferred_expire_window function would incorrectly
return a window period of 0 seconds.  In this case, the
correct window period should be the handshake window
period.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5464 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoFixed an issue in the Management Interface that could cause
James Yonan [Fri, 26 Feb 2010 10:26:45 +0000 (10:26 +0000)] 
Fixed an issue in the Management Interface that could cause
a process hang with 100% CPU utilization in --management-client
mode if the management interface client disconnected at the
point where credentials are queried.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5458 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoVersion 2.1.1b
james [Sat, 16 Jan 2010 04:10:30 +0000 (04:10 +0000)] 
Version 2.1.1b

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5371 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoDon't advance the connection list on AUTH_FAILED errors.
james [Sat, 16 Jan 2010 03:54:00 +0000 (03:54 +0000)] 
Don't advance the connection list on AUTH_FAILED errors.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5370 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoFixed an issue where AUTH_FAILED was not being properly delivered
james [Sat, 16 Jan 2010 03:24:07 +0000 (03:24 +0000)] 
Fixed an issue where AUTH_FAILED was not being properly delivered
to the client when a bad password is given for mid-session reauth.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5369 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoWhen aborting in a non-graceful way, try to execute do_close_tun in
james [Tue, 12 Jan 2010 18:26:22 +0000 (18:26 +0000)] 
When aborting in a non-graceful way, try to execute do_close_tun in
init.c prior to daemon exit to ensure that the tun/tap interface is
closed and any added routes are deleted.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5367 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoFixed some breakage in openvpn.spec (which is required to build an v2.1.1
james [Fri, 11 Dec 2009 23:44:34 +0000 (23:44 +0000)] 
Fixed some breakage in openvpn.spec (which is required to build an
RPM distribution) where it was referencing a non-existent
subdirectory in the tarball, causing it to fail (patch from
David Sommerseth).

Version 2.1.1.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5269 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoVersion 2.1.0 v2.1.0
james [Fri, 11 Dec 2009 08:18:50 +0000 (08:18 +0000)] 
Version 2.1.0

* Updated ChangeLog.

* Note in man page that clients connecting to a --multihome server
  should always use the --nobind option.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5266 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoClarified that TAP-Win32 driver is licensed under GPL 2.
james [Fri, 11 Dec 2009 05:13:24 +0000 (05:13 +0000)] 
Clarified that TAP-Win32 driver is licensed under GPL 2.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5265 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoDocumented --multihome in the man page.
james [Fri, 11 Dec 2009 01:47:26 +0000 (01:47 +0000)] 
Documented --multihome in the man page.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5264 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoFixed a couple issues in sample plugins auth-pam.c and down-root.c:
james [Thu, 10 Dec 2009 23:50:03 +0000 (23:50 +0000)] 
Fixed a couple issues in sample plugins auth-pam.c and down-root.c:

1. Fail gracefully rather than segfault if calloc returns NULL.

2. The openvpn_plugin_abort_v1 function can potentially be called
   with handle == NULL.  Add code to detect this case, and if
   so, avoid dereferencing pointers derived from handle.

(Thanks to David Sommerseth for finding this bug).

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5261 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoVersion 2.1_rc22 v2.1_rc22
james [Fri, 20 Nov 2009 13:22:27 +0000 (13:22 +0000)] 
Version 2.1_rc22

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5169 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoFixed a client-side bug that occurred when the "dhcp-pre-release"
james [Thu, 19 Nov 2009 16:42:51 +0000 (16:42 +0000)] 
Fixed a client-side bug that occurred when the "dhcp-pre-release"
or "dhcp-renew" options were combined with "route-gateway dhcp".

The problem is that the IP Helper functions for DHCP release and
renew are blocking, and so calling them from a single-threaded
client stops tunnel traffic forwarding, and hence breaks
"route-gateway dhcp" which requires an active tunnel.  The fix is
to call the IP Helper functions for DHCP release and renew from
another process.

Version 2.1_rc21b.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5164 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoIncrease MAX_CERT_DEPTH to 16 (from 8), and when exceeded,
james [Fri, 13 Nov 2009 11:09:47 +0000 (11:09 +0000)] 
Increase MAX_CERT_DEPTH to 16 (from 8), and when exceeded,
make it a hard failure, rather than just a warning.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5159 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoVersion 2.1_rc21 v2.1_rc21
james [Thu, 12 Nov 2009 09:30:45 +0000 (09:30 +0000)] 
Version 2.1_rc21

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5152 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoVersion 2.1_rc20a
james [Sun, 25 Oct 2009 15:54:01 +0000 (15:54 +0000)] 
Version 2.1_rc20a

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5106 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoOn server, lock client-provided certs against mid-session TLS
james [Sun, 25 Oct 2009 15:51:04 +0000 (15:51 +0000)] 
On server, lock client-provided certs against mid-session TLS
renegotiations -- this is similer to how the common name is also
locked.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5105 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoChange to doval valgrind script. The openvpn command parameter is now
james [Sun, 25 Oct 2009 15:44:28 +0000 (15:44 +0000)] 
Change to doval valgrind script.  The openvpn command parameter is now
implied, so new usage is:

  ./doval [openvpn parms]

instead of:

  ./doval ./openvpn [openvpn parms]

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5104 e7ae566f-a301-0410-adde-c780ea21d3b5

15 years agoOn server, lock session username against changes in mid-session TLS
james [Sat, 24 Oct 2009 01:08:30 +0000 (01:08 +0000)] 
On server, lock session username against changes in mid-session TLS
renegotiations -- this is similer to how the common name is also
locked.

git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@5098 e7ae566f-a301-0410-adde-c780ea21d3b5