mirror of
https://github.com/deneraraujo/OpenVPNAdapter.git
synced 2026-02-11 00:00:08 +08:00
Squashed 'OpenVPN Adapter/Vendors/openvpn/' changes from 098fd412a..e6d68831a
e6d68831a deps: update mbedTLS to 2.7.0 59de63fa6 cli.cpp: added OPENVPN_REMOTE_OVERRIDE caf9cf6c1 RedirectPipe: added additional flags for flexibility 68595de4d ClientAPI::RemoteOverride: added error status 37d848ca2 Log lines from C++ exceptions should contain the text "exception" f05802cf9 Increase server validation of password size to 16KB to support bundling SAML messages. 52e4d4a5f Increase client validation of password/response size to 16KB to support bundling SAML messages. a0416ed92 [OVPN3-209] win: add dependencies checksum verification f6eadbc4d [OVPN3-206] Refactor Windows build system 7b30c2f12 [OVPN3-220] proto.hpp: send initial options set on rekeying 33dd2f29e mbedtls: backport fixes for CVE-2018-0487 0912a9b62 [OVPN3-213] build system: mbedtls timing tests 98fa55576 deps: update asio to 1.12.0 620531101 [OVPN3-215] asio: apply external patches f4a73bde5 [OVPN3-215] asio: rebase external patches on top of our current commit ID a61cac928 mbedtls: Patches from 2.7 to fix timing test failures c892f41fb win: tune dependencies build 8a394a37d [OVPN3-213] build system: mbedtls timing tests 0a3dd67da [OVPN3-190] tun linux: add to/from_json methods 44c6cdfdc [OVPN3-206] readme: update Windows build instructions 0edec4a09 [OVPN3-206] win: update directories in VS projects 3d6fd62cb mac build: improve unittest stability 758ae98c6 [OVPN3-209] win: add dependencies checksum verification a7642ee82 [OVPN3-205] win: apply mbedTLS patches ac94b6eb7 [OVPN3-206] Refactor Windows build system c5bc3859e mbedTLS: don't set endpoint twice in conf object 3d5dd9ee3 [OVPN3-199] mac build: do not overwrite DEP_DIR b713762ba mbedtls: Patches from 2.7 to fix timing test failures 37ab79fa6 tun linux: apply changes from 362acf0 6a7aee2c9 [OVPN3-190] tun: implement persistence 1d2ebb07f [OVPN3-190] tun: move tun creation to separate class 53e33d634 [OVPN3-190] tun: move content of tun to tuncli 85d3377c2 [OVPN3-190] tun: move tun setup methods to separate file 735b985eb i/o layer: wrap raw pointers embedded in closures 322ae24b5 OptionList: support variadic template parameter pack in constructors 8a012b454 lz4: added namespace and improved error handling 34998e94a zlib: removed verbose parameter 846ed217d OpenSSL: set SSL_MODE_RELEASE_BUFFERS to conserve memory by releasing unneeded buffers 32e3ea117 OptionList: added show_unused_options() method fe38233a8 Buffer: added typedefs for thread-safe refcounts b34b6271e compression: added compress_lz4() and decompress_lz4() 755e1a181 linux/core.hpp: added exclude_from_core() function a7f6fe64f ManClientInstance::Send: added userprop_local_update() virtual method 94526ac19 BufferAllocated: fixed regression in buffer copy 33c16812e [OVPN3-144] mbedTLS: fix support for 4096bit encrypted keys f249ab4bd [OVPN3-144] build-mbedtls: run make check before compiling 5040aef4c [OVPN3-144] build-mbedtls: apply patches using git-apply instead of patch 8a5e838ab [OVPN3-144] mbedTLS: fix incompatibility with PKI created by OpenSSL 1.1 e7badefd7 proto.hpp/tls-crypt: fix access to ACK IDs during packet validation 73fa974db proto.hpp: print buffer exception in case of packet access error 79ad5eded Estblishing a stable branch 1c5f20ab0 Hide the @ sign in logs if username is empty 01ee1f5a4 Added ClientAPI::Config::retryOnAuthFailed parameter 05880b136 Added ProfileParseLimits::MAX_SERVER_LIST_SIZE and raise limit to 4096 eedee4fa6 cli.cpp: allow -s server override to reference a friendly name 6e350e9f9 Linux tun setup: use LinuxGW46 to obtain gateway info 3e044c6c7 top-level .gitignore was missing a trailing newline a27355ac7 Use C++11 push_back(std::move(...))) for pushing objects onto vectors 8c3af2704 HostPort::split_host_port: support unix socket filename as an alternative kind of host 14b588c86 asio: added asio_resolver_results_to_string() fd6e8e9bf AsioPolySock: minor changes to remote_endpoint_str() 06f5e4d71 AsioBoundSocket::Socket: added to_string() method 8fd968532 RemoteList: minor cleanup in set_endpoint_range() f9fc2f54e BufferAllocated: improve movability 8cb8d52cd string: added first_line() method a26b1646b AsioPolySock: extend AltRouting support ef3a40c27 Listen::Item: added AltRouting mode 02e786bc9 write_binary_atomic: support ConstBuffer 6745799c9 fileunix: added read_binary_unix_fast() 5689c2d9c write_binary_unix(): added ConstBuffer variant 2b0e76453 enum_dir: refactor to allow enumeration via lambda 116a5bd5e bufstr: added const_buf_from_string() method f8ec81413 Buffer: added const_buffer_ref() variant accepting a const argument ae98aa8b6 AsioPolySock: support AltRouting 8f81479f1 AsioBoundSocket::Socket: support inheritance 9598918e9 ServerProto: added schedule_disconnect() method. 4516cf67b ServerProto: reset CoarseTime object when AsioTimer is canceled 0ffc76a0b Route: implement operator< so Route objects can be used as map/set keys. c4af9f68b event_loop_wait_barrier: raise default timeout to 30 seconds d7fe87540 appversion.hpp: rename VERSION -> BUILD_VERSION git-subtree-dir: OpenVPN Adapter/Vendors/openvpn git-subtree-split: e6d68831a71131b7d92fbea93d3b9cbe10ba2068
This commit is contained in:
@@ -68,6 +68,10 @@
|
||||
#include <openvpn/ssl/peerinfo.hpp>
|
||||
#include <openvpn/ssl/sslchoose.hpp>
|
||||
|
||||
#ifdef OPENVPN_REMOTE_OVERRIDE
|
||||
#include <openvpn/common/process.hpp>
|
||||
#endif
|
||||
|
||||
#if defined(USE_MBEDTLS)
|
||||
#include <openvpn/mbedtls/util/pkcs1.hpp>
|
||||
#endif
|
||||
@@ -129,6 +133,13 @@ public:
|
||||
}
|
||||
}
|
||||
|
||||
#ifdef OPENVPN_REMOTE_OVERRIDE
|
||||
void set_remote_override_cmd(const std::string& cmd)
|
||||
{
|
||||
remote_override_cmd = cmd;
|
||||
}
|
||||
#endif
|
||||
|
||||
private:
|
||||
virtual bool socket_protect(int socket) override
|
||||
{
|
||||
@@ -304,10 +315,51 @@ private:
|
||||
return false;
|
||||
}
|
||||
|
||||
#ifdef OPENVPN_REMOTE_OVERRIDE
|
||||
virtual bool remote_override_enabled() override
|
||||
{
|
||||
return !remote_override_cmd.empty();
|
||||
}
|
||||
|
||||
virtual void remote_override(ClientAPI::RemoteOverride& ro)
|
||||
{
|
||||
RedirectPipe::InOut pio;
|
||||
Argv argv;
|
||||
argv.emplace_back(remote_override_cmd);
|
||||
OPENVPN_LOG(argv.to_string());
|
||||
const int status = system_cmd(remote_override_cmd,
|
||||
argv,
|
||||
nullptr,
|
||||
pio,
|
||||
RedirectPipe::IGNORE_ERR);
|
||||
if (!status)
|
||||
{
|
||||
const std::string out = string::first_line(pio.out);
|
||||
OPENVPN_LOG("REMOTE OVERRIDE: " << out);
|
||||
auto svec = string::split(out, ',');
|
||||
if (svec.size() == 4)
|
||||
{
|
||||
ro.host = svec[0];
|
||||
ro.ip = svec[1];
|
||||
ro.port = svec[2];
|
||||
ro.proto = svec[3];
|
||||
}
|
||||
else
|
||||
ro.error = "cannot parse remote-override, expecting host,ip,port,proto (at least one or both of host and ip must be defined)";
|
||||
}
|
||||
else
|
||||
ro.error = "status=" + std::to_string(status);
|
||||
}
|
||||
#endif
|
||||
|
||||
std::mutex log_mutex;
|
||||
std::string dc_cookie;
|
||||
RandomAPI::Ptr rng; // random data source for epki
|
||||
volatile ClockTickAction clock_tick_action = CT_UNDEF;
|
||||
|
||||
#ifdef OPENVPN_REMOTE_OVERRIDE
|
||||
std::string remote_override_cmd;
|
||||
#endif
|
||||
};
|
||||
|
||||
static Client *the_client = nullptr; // GLOBAL
|
||||
@@ -543,11 +595,15 @@ int openvpn_client(int argc, char *argv[], const std::string* profile_content)
|
||||
{ "merge", no_argument, nullptr, 'm' },
|
||||
{ "version", no_argument, nullptr, 'v' },
|
||||
{ "auto-sess", no_argument, nullptr, 'a' },
|
||||
{ "auth-retry", no_argument, nullptr, 'Y' },
|
||||
{ "tcprof-override", required_argument, nullptr, 'X' },
|
||||
{ "ssl-debug", required_argument, nullptr, 1 },
|
||||
{ "epki-cert", required_argument, nullptr, 2 },
|
||||
{ "epki-ca", required_argument, nullptr, 3 },
|
||||
{ "epki-key", required_argument, nullptr, 4 },
|
||||
#ifdef OPENVPN_REMOTE_OVERRIDE
|
||||
{ "remote-override",required_argument, nullptr, 5 },
|
||||
#endif
|
||||
{ nullptr, 0, nullptr, 0 }
|
||||
};
|
||||
|
||||
@@ -588,6 +644,7 @@ int openvpn_client(int argc, char *argv[], const std::string* profile_content)
|
||||
int sslDebugLevel = 0;
|
||||
bool googleDnsFallback = false;
|
||||
bool autologinSessions = false;
|
||||
bool retryOnAuthFailed = false;
|
||||
bool tunPersist = false;
|
||||
bool merge = false;
|
||||
bool version = false;
|
||||
@@ -596,10 +653,13 @@ int openvpn_client(int argc, char *argv[], const std::string* profile_content)
|
||||
std::string epki_cert_fn;
|
||||
std::string epki_ca_fn;
|
||||
std::string epki_key_fn;
|
||||
#ifdef OPENVPN_REMOTE_OVERRIDE
|
||||
std::string remote_override_cmd;
|
||||
#endif
|
||||
|
||||
int ch;
|
||||
optind = 1;
|
||||
while ((ch = getopt_long(argc, argv, "BAdeTCxfgjmvau:p:r:D:P:6:s:t:c:z:M:h:q:U:W:I:G:k:X:R:", longopts, nullptr)) != -1)
|
||||
while ((ch = getopt_long(argc, argv, "BAdeTCxfgjmvaYu:p:r:D:P:6:s:t:c:z:M:h:q:U:W:I:G:k:X:R:", longopts, nullptr)) != -1)
|
||||
{
|
||||
switch (ch)
|
||||
{
|
||||
@@ -615,6 +675,11 @@ int openvpn_client(int argc, char *argv[], const std::string* profile_content)
|
||||
case 4: // --epki-key
|
||||
epki_key_fn = optarg;
|
||||
break;
|
||||
#ifdef OPENVPN_REMOTE_OVERRIDE
|
||||
case 5: // --remote-override
|
||||
remote_override_cmd = optarg;
|
||||
break;
|
||||
#endif
|
||||
case 'e':
|
||||
eval = true;
|
||||
break;
|
||||
@@ -693,6 +758,9 @@ int openvpn_client(int argc, char *argv[], const std::string* profile_content)
|
||||
case 'a':
|
||||
autologinSessions = true;
|
||||
break;
|
||||
case 'Y':
|
||||
retryOnAuthFailed = true;
|
||||
break;
|
||||
case 'j':
|
||||
tunPersist = true;
|
||||
break;
|
||||
@@ -786,6 +854,7 @@ int openvpn_client(int argc, char *argv[], const std::string* profile_content)
|
||||
config.sslDebugLevel = sslDebugLevel;
|
||||
config.googleDnsFallback = googleDnsFallback;
|
||||
config.autologinSessions = autologinSessions;
|
||||
config.retryOnAuthFailed = retryOnAuthFailed;
|
||||
config.tunPersist = tunPersist;
|
||||
config.gremlinConfig = gremlin;
|
||||
config.info = true;
|
||||
@@ -798,9 +867,25 @@ int openvpn_client(int argc, char *argv[], const std::string* profile_content)
|
||||
|
||||
PeerInfo::Set::parse_csv(peer_info, config.peerInfo);
|
||||
|
||||
// allow -s server override to reference a friendly name
|
||||
// in the config.
|
||||
// setenv SERVER <HOST>/<FRIENDLY_NAME>
|
||||
if (!config.serverOverride.empty())
|
||||
{
|
||||
const ClientAPI::EvalConfig eval = ClientAPI::OpenVPNClient::eval_config_static(config);
|
||||
for (auto &se : eval.serverList)
|
||||
{
|
||||
if (config.serverOverride == se.friendlyName)
|
||||
{
|
||||
config.serverOverride = se.server;
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (eval)
|
||||
{
|
||||
ClientAPI::EvalConfig eval = ClientAPI::OpenVPNClient::eval_config_static(config);
|
||||
const ClientAPI::EvalConfig eval = ClientAPI::OpenVPNClient::eval_config_static(config);
|
||||
std::cout << "EVAL PROFILE" << std::endl;
|
||||
std::cout << "error=" << eval.error << std::endl;
|
||||
std::cout << "message=" << eval.message << std::endl;
|
||||
@@ -814,6 +899,9 @@ int openvpn_client(int argc, char *argv[], const std::string* profile_content)
|
||||
std::cout << "privateKeyPasswordRequired=" << eval.privateKeyPasswordRequired << std::endl;
|
||||
std::cout << "allowPasswordSave=" << eval.allowPasswordSave << std::endl;
|
||||
|
||||
if (!config.serverOverride.empty())
|
||||
std::cout << "server=" << config.serverOverride << std::endl;
|
||||
|
||||
for (size_t i = 0; i < eval.serverList.size(); ++i)
|
||||
{
|
||||
const ClientAPI::ServerEntry& se = eval.serverList[i];
|
||||
@@ -823,7 +911,7 @@ int openvpn_client(int argc, char *argv[], const std::string* profile_content)
|
||||
else
|
||||
{
|
||||
Client client;
|
||||
ClientAPI::EvalConfig eval = client.eval_config(config);
|
||||
const ClientAPI::EvalConfig eval = client.eval_config(config);
|
||||
if (eval.error)
|
||||
OPENVPN_THROW_EXCEPTION("eval config error: " << eval.message);
|
||||
if (eval.autologin)
|
||||
@@ -866,6 +954,10 @@ int openvpn_client(int argc, char *argv[], const std::string* profile_content)
|
||||
#endif
|
||||
}
|
||||
|
||||
#ifdef OPENVPN_REMOTE_OVERRIDE
|
||||
client.set_remote_override_cmd(remote_override_cmd);
|
||||
#endif
|
||||
|
||||
std::cout << "CONNECTING..." << std::endl;
|
||||
|
||||
// start the client thread
|
||||
@@ -908,6 +1000,9 @@ int openvpn_client(int argc, char *argv[], const std::string* profile_content)
|
||||
std::cout << "--proto, -P : protocol override (udp|tcp)" << std::endl;
|
||||
std::cout << "--server, -s : server override" << std::endl;
|
||||
std::cout << "--port, -R : port override" << std::endl;
|
||||
#ifdef OPENVPN_REMOTE_OVERRIDE
|
||||
std::cout << "--remote-override : command to run to generate next remote (returning host,ip,port,proto)" << std::endl;
|
||||
#endif
|
||||
std::cout << "--ipv6, -6 : IPv6 (yes|no|default)" << std::endl;
|
||||
std::cout << "--timeout, -t : timeout" << std::endl;
|
||||
std::cout << "--compress, -c : compression mode (yes|no|asym)" << std::endl;
|
||||
@@ -932,6 +1027,7 @@ int openvpn_client(int argc, char *argv[], const std::string* profile_content)
|
||||
std::cout << "--ssl-debug : SSL debug level" << std::endl;
|
||||
std::cout << "--google-dns, -g : enable Google DNS fallback" << std::endl;
|
||||
std::cout << "--auto-sess, -a : request autologin session" << std::endl;
|
||||
std::cout << "--auth-retry, -Y : retry connection on auth failure" << std::endl;
|
||||
std::cout << "--persist-tun, -j : keep TUN interface open across reconnects" << std::endl;
|
||||
std::cout << "--peer-info, -I : peer info key/value list in the form K1=V1,K2=V2,..." << std::endl;
|
||||
std::cout << "--gremlin, -G : gremlin info (send_delay_ms, recv_delay_ms, send_drop_prob, recv_drop_prob)" << std::endl;
|
||||
|
||||
Reference in New Issue
Block a user