// OpenVPN -- An application to securely tunnel IP networks // over a single port, with support for SSL/TLS-based // session authentication and key exchange, // packet encryption, packet authentication, and // packet compression. // // Copyright (C) 2012-2017 OpenVPN Inc. // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU Affero General Public License Version 3 // as published by the Free Software Foundation. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program in the COPYING file. // If not, see . #ifndef OPENVPN_TUN_BUILDER_BASE_H #define OPENVPN_TUN_BUILDER_BASE_H #include namespace openvpn { class TunBuilderBase { public: // Tun builder methods, loosely based on the Android VpnService.Builder // abstraction. These methods comprise an abstraction layer that // allows the OpenVPN C++ core to call out to external methods for // establishing the tunnel, adding routes, etc. // All methods returning bool use the return // value to indicate success (true) or fail (false). // tun_builder_new() should be called first, then arbitrary setter methods, // and finally tun_builder_establish to return the socket descriptor // for the session. IP addresses are pre-validated before being passed to // these methods. // This interface is based on Android's VpnService.Builder. // Callback to construct a new tun builder // Should be called first. virtual bool tun_builder_new() { return false; } // Optional callback that indicates OSI layer, should be 2 or 3. // Defaults to 3. virtual bool tun_builder_set_layer(int layer) { return true; } // Callback to set address of remote server // Never called more than once per tun_builder session. virtual bool tun_builder_set_remote_address(const std::string& address, bool ipv6) { return false; } // Callback to add network address to VPN interface // May be called more than once per tun_builder session virtual bool tun_builder_add_address(const std::string& address, int prefix_length, const std::string& gateway, // optional bool ipv6, bool net30) { return false; } // Optional callback to set default value for route metric. // Guaranteed to be called before other methods that deal // with routes such as tun_builder_add_route and // tun_builder_reroute_gw. Route metric is ignored // if < 0. virtual bool tun_builder_set_route_metric_default(int metric) { return true; } // Callback to reroute default gateway to VPN interface. // ipv4 is true if the default route to be added should be IPv4. // ipv6 is true if the default route to be added should be IPv6. // flags are defined in RGWFlags (rgwflags.hpp). // Never called more than once per tun_builder session. virtual bool tun_builder_reroute_gw(bool ipv4, bool ipv6, unsigned int flags) { return false; } // Callback to add route to VPN interface // May be called more than once per tun_builder session // metric is optional and should be ignored if < 0 virtual bool tun_builder_add_route(const std::string& address, int prefix_length, int metric, bool ipv6) { return false; } // Callback to exclude route from VPN interface // May be called more than once per tun_builder session // metric is optional and should be ignored if < 0 virtual bool tun_builder_exclude_route(const std::string& address, int prefix_length, int metric, bool ipv6) { return false; } // Callback to add DNS server to VPN interface // May be called more than once per tun_builder session // If reroute_dns is true, all DNS traffic should be routed over the // tunnel, while if false, only DNS traffic that matches an added search // domain should be routed. // Guaranteed to be called after tun_builder_reroute_gw. virtual bool tun_builder_add_dns_server(const std::string& address, bool ipv6) { return false; } // Callback to add search domain to DNS resolver // May be called more than once per tun_builder session // See tun_builder_add_dns_server above for description of // reroute_dns parameter. // Guaranteed to be called after tun_builder_reroute_gw. virtual bool tun_builder_add_search_domain(const std::string& domain) { return false; } // Callback to set MTU of the VPN interface // Never called more than once per tun_builder session. virtual bool tun_builder_set_mtu(int mtu) { return false; } // Callback to set the session name // Never called more than once per tun_builder session. virtual bool tun_builder_set_session_name(const std::string& name) { return false; } // Callback to add a host which should bypass the proxy // May be called more than once per tun_builder session virtual bool tun_builder_add_proxy_bypass(const std::string& bypass_host) { return false; } // Callback to set the proxy "Auto Config URL" // Never called more than once per tun_builder session. virtual bool tun_builder_set_proxy_auto_config_url(const std::string& url) { return false; } // Callback to set the HTTP proxy // Never called more than once per tun_builder session. virtual bool tun_builder_set_proxy_http(const std::string& host, int port) { return false; } // Callback to set the HTTPS proxy // Never called more than once per tun_builder session. virtual bool tun_builder_set_proxy_https(const std::string& host, int port) { return false; } // Callback to add Windows WINS server to VPN interface. // WINS server addresses are always IPv4. // May be called more than once per tun_builder session. // Guaranteed to be called after tun_builder_reroute_gw. virtual bool tun_builder_add_wins_server(const std::string& address) { return false; } // Optional callback that indicates whether IPv6 traffic should be // blocked, to prevent unencrypted IPv6 packet leakage when the // tunnel is IPv4-only, but the local machine has IPv6 connectivity // to the internet. Enabled by "block-ipv6" config var. virtual bool tun_builder_set_block_ipv6(bool block_ipv6) { return true; } // Optional callback to set a DNS suffix on tun/tap adapter. // Currently only implemented on Windows, where it will // set the "Connection-specific DNS Suffix" property on // the TAP driver. virtual bool tun_builder_set_adapter_domain_suffix(const std::string& name) { return true; } // Callback to establish the VPN tunnel, returning a file descriptor // to the tunnel, which the caller will henceforth own. Returns -1 // if the tunnel could not be established. // Always called last after tun_builder session has been configured. virtual int tun_builder_establish() { return -1; } // Return true if tun interface may be persisted, i.e. rolled // into a new session with properties untouched. This method // is only called after all other tests of persistence // allowability succeed, therefore it can veto persistence. // If persistence is ultimately enabled, // tun_builder_establish_lite() will be called. Otherwise, // tun_builder_establish() will be called. virtual bool tun_builder_persist() { return true; } // When the exclude local network option is enabled this // function is called to get a list of local networks so routes // to exclude them from the VPN network are generated // This should be a list of CIDR networks (e.g. 192.168.0.0/24) virtual const std::vector tun_builder_get_local_networks(bool ipv6) { return {}; } // Indicates a reconnection with persisted tun state. virtual void tun_builder_establish_lite() { } // Indicates that tunnel is being torn down. // If disconnect == true, then the teardown is occurring // prior to final disconnect. virtual void tun_builder_teardown(bool disconnect) {} virtual ~TunBuilderBase() {} }; } #endif