mirror of
https://github.com/deneraraujo/OpenVPNAdapter.git
synced 2026-02-22 00:00:06 +08:00
e6d68831a deps: update mbedTLS to 2.7.0 59de63fa6 cli.cpp: added OPENVPN_REMOTE_OVERRIDE caf9cf6c1 RedirectPipe: added additional flags for flexibility 68595de4d ClientAPI::RemoteOverride: added error status 37d848ca2 Log lines from C++ exceptions should contain the text "exception" f05802cf9 Increase server validation of password size to 16KB to support bundling SAML messages. 52e4d4a5f Increase client validation of password/response size to 16KB to support bundling SAML messages. a0416ed92 [OVPN3-209] win: add dependencies checksum verification f6eadbc4d [OVPN3-206] Refactor Windows build system 7b30c2f12 [OVPN3-220] proto.hpp: send initial options set on rekeying 33dd2f29e mbedtls: backport fixes for CVE-2018-0487 0912a9b62 [OVPN3-213] build system: mbedtls timing tests 98fa55576 deps: update asio to 1.12.0 620531101 [OVPN3-215] asio: apply external patches f4a73bde5 [OVPN3-215] asio: rebase external patches on top of our current commit ID a61cac928 mbedtls: Patches from 2.7 to fix timing test failures c892f41fb win: tune dependencies build 8a394a37d [OVPN3-213] build system: mbedtls timing tests 0a3dd67da [OVPN3-190] tun linux: add to/from_json methods 44c6cdfdc [OVPN3-206] readme: update Windows build instructions 0edec4a09 [OVPN3-206] win: update directories in VS projects 3d6fd62cb mac build: improve unittest stability 758ae98c6 [OVPN3-209] win: add dependencies checksum verification a7642ee82 [OVPN3-205] win: apply mbedTLS patches ac94b6eb7 [OVPN3-206] Refactor Windows build system c5bc3859e mbedTLS: don't set endpoint twice in conf object 3d5dd9ee3 [OVPN3-199] mac build: do not overwrite DEP_DIR b713762ba mbedtls: Patches from 2.7 to fix timing test failures 37ab79fa6 tun linux: apply changes from 362acf0 6a7aee2c9 [OVPN3-190] tun: implement persistence 1d2ebb07f [OVPN3-190] tun: move tun creation to separate class 53e33d634 [OVPN3-190] tun: move content of tun to tuncli 85d3377c2 [OVPN3-190] tun: move tun setup methods to separate file 735b985eb i/o layer: wrap raw pointers embedded in closures 322ae24b5 OptionList: support variadic template parameter pack in constructors 8a012b454 lz4: added namespace and improved error handling 34998e94a zlib: removed verbose parameter 846ed217d OpenSSL: set SSL_MODE_RELEASE_BUFFERS to conserve memory by releasing unneeded buffers 32e3ea117 OptionList: added show_unused_options() method fe38233a8 Buffer: added typedefs for thread-safe refcounts b34b6271e compression: added compress_lz4() and decompress_lz4() 755e1a181 linux/core.hpp: added exclude_from_core() function a7f6fe64f ManClientInstance::Send: added userprop_local_update() virtual method 94526ac19 BufferAllocated: fixed regression in buffer copy 33c16812e [OVPN3-144] mbedTLS: fix support for 4096bit encrypted keys f249ab4bd [OVPN3-144] build-mbedtls: run make check before compiling 5040aef4c [OVPN3-144] build-mbedtls: apply patches using git-apply instead of patch 8a5e838ab [OVPN3-144] mbedTLS: fix incompatibility with PKI created by OpenSSL 1.1 e7badefd7 proto.hpp/tls-crypt: fix access to ACK IDs during packet validation 73fa974db proto.hpp: print buffer exception in case of packet access error 79ad5eded Estblishing a stable branch 1c5f20ab0 Hide the @ sign in logs if username is empty 01ee1f5a4 Added ClientAPI::Config::retryOnAuthFailed parameter 05880b136 Added ProfileParseLimits::MAX_SERVER_LIST_SIZE and raise limit to 4096 eedee4fa6 cli.cpp: allow -s server override to reference a friendly name 6e350e9f9 Linux tun setup: use LinuxGW46 to obtain gateway info 3e044c6c7 top-level .gitignore was missing a trailing newline a27355ac7 Use C++11 push_back(std::move(...))) for pushing objects onto vectors 8c3af2704 HostPort::split_host_port: support unix socket filename as an alternative kind of host 14b588c86 asio: added asio_resolver_results_to_string() fd6e8e9bf AsioPolySock: minor changes to remote_endpoint_str() 06f5e4d71 AsioBoundSocket::Socket: added to_string() method 8fd968532 RemoteList: minor cleanup in set_endpoint_range() f9fc2f54e BufferAllocated: improve movability 8cb8d52cd string: added first_line() method a26b1646b AsioPolySock: extend AltRouting support ef3a40c27 Listen::Item: added AltRouting mode 02e786bc9 write_binary_atomic: support ConstBuffer 6745799c9 fileunix: added read_binary_unix_fast() 5689c2d9c write_binary_unix(): added ConstBuffer variant 2b0e76453 enum_dir: refactor to allow enumeration via lambda 116a5bd5e bufstr: added const_buf_from_string() method f8ec81413 Buffer: added const_buffer_ref() variant accepting a const argument ae98aa8b6 AsioPolySock: support AltRouting 8f81479f1 AsioBoundSocket::Socket: support inheritance 9598918e9 ServerProto: added schedule_disconnect() method. 4516cf67b ServerProto: reset CoarseTime object when AsioTimer is canceled 0ffc76a0b Route: implement operator< so Route objects can be used as map/set keys. c4af9f68b event_loop_wait_barrier: raise default timeout to 30 seconds d7fe87540 appversion.hpp: rename VERSION -> BUILD_VERSION git-subtree-dir: OpenVPN Adapter/Vendors/openvpn git-subtree-split: e6d68831a71131b7d92fbea93d3b9cbe10ba2068
474 lines
15 KiB
C++
474 lines
15 KiB
C++
// OpenVPN -- An application to securely tunnel IP networks
|
|
// over a single port, with support for SSL/TLS-based
|
|
// session authentication and key exchange,
|
|
// packet encryption, packet authentication, and
|
|
// packet compression.
|
|
//
|
|
// Copyright (C) 2012-2017 OpenVPN Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License Version 3
|
|
// as published by the Free Software Foundation.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program in the COPYING file.
|
|
// If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
// Client tun interface for Linux.
|
|
|
|
#ifndef OPENVPN_TUN_LINUX_CLIENT_TUNSETUP_H
|
|
#define OPENVPN_TUN_LINUX_CLIENT_TUNSETUP_H
|
|
|
|
#include <sys/ioctl.h>
|
|
#include <fcntl.h>
|
|
#include <errno.h>
|
|
#include <net/if.h>
|
|
#include <linux/if_tun.h>
|
|
|
|
#include <openvpn/common/exception.hpp>
|
|
#include <openvpn/common/file.hpp>
|
|
#include <openvpn/common/split.hpp>
|
|
#include <openvpn/common/splitlines.hpp>
|
|
#include <openvpn/common/hexstr.hpp>
|
|
#include <openvpn/common/to_string.hpp>
|
|
#include <openvpn/common/process.hpp>
|
|
#include <openvpn/common/action.hpp>
|
|
#include <openvpn/addr/route.hpp>
|
|
#include <openvpn/tun/builder/capture.hpp>
|
|
#include <openvpn/tun/builder/setup.hpp>
|
|
#include <openvpn/tun/client/tunbase.hpp>
|
|
#include <openvpn/tun/client/tunprop.hpp>
|
|
#include <openvpn/netconf/linux/gw.hpp>
|
|
|
|
namespace openvpn {
|
|
namespace TunLinux {
|
|
|
|
OPENVPN_EXCEPTION(tun_linux_error);
|
|
OPENVPN_EXCEPTION(tun_open_error);
|
|
OPENVPN_EXCEPTION(tun_layer_error);
|
|
OPENVPN_EXCEPTION(tun_ioctl_error);
|
|
OPENVPN_EXCEPTION(tun_fcntl_error);
|
|
OPENVPN_EXCEPTION(tun_name_error);
|
|
OPENVPN_EXCEPTION(tun_tx_queue_len_error);
|
|
OPENVPN_EXCEPTION(tun_ifconfig_error);
|
|
|
|
enum { // add_del_route flags
|
|
R_IPv6=(1<<0),
|
|
R_ADD_SYS=(1<<1),
|
|
R_ADD_DCO=(1<<2),
|
|
R_ADD_ALL=R_ADD_SYS|R_ADD_DCO,
|
|
};
|
|
|
|
inline IP::Addr cvt_pnr_ip_v4(const std::string& hexaddr)
|
|
{
|
|
BufferAllocated v(4, BufferAllocated::CONSTRUCT_ZERO);
|
|
parse_hex(v, hexaddr);
|
|
if (v.size() != 4)
|
|
throw tun_linux_error("bad hex address");
|
|
IPv4::Addr ret = IPv4::Addr::from_bytes(v.data());
|
|
return IP::Addr::from_ipv4(ret);
|
|
}
|
|
|
|
inline void add_del_route(const std::string& addr_str,
|
|
const int prefix_len,
|
|
const std::string& gateway_str,
|
|
const std::string& dev,
|
|
const unsigned int flags,
|
|
std::vector<IP::Route>* rtvec,
|
|
Action::Ptr& create,
|
|
Action::Ptr& destroy)
|
|
{
|
|
if (flags & R_IPv6)
|
|
{
|
|
const IPv6::Addr addr = IPv6::Addr::from_string(addr_str);
|
|
const IPv6::Addr netmask = IPv6::Addr::netmask_from_prefix_len(prefix_len);
|
|
const IPv6::Addr net = addr & netmask;
|
|
|
|
if (flags & R_ADD_SYS)
|
|
{
|
|
// ip route add 2001:db8:1::/48 via 2001:db8:1::1
|
|
Command::Ptr add(new Command);
|
|
add->argv.push_back("/sbin/ip");
|
|
add->argv.push_back("-6");
|
|
add->argv.push_back("route");
|
|
add->argv.push_back("add");
|
|
add->argv.push_back(net.to_string() + '/' + openvpn::to_string(prefix_len));
|
|
add->argv.push_back("via");
|
|
add->argv.push_back(gateway_str);
|
|
if (!dev.empty())
|
|
{
|
|
add->argv.push_back("dev");
|
|
add->argv.push_back(dev);
|
|
}
|
|
create = add;
|
|
|
|
// for the destroy command, copy the add command but replace "add" with "delete"
|
|
Command::Ptr del(add->copy());
|
|
del->argv[3] = "del";
|
|
destroy = del;
|
|
}
|
|
|
|
if (rtvec && (flags & R_ADD_DCO))
|
|
rtvec->emplace_back(IP::Addr::from_ipv6(net), prefix_len);
|
|
}
|
|
else
|
|
{
|
|
const IPv4::Addr addr = IPv4::Addr::from_string(addr_str);
|
|
const IPv4::Addr netmask = IPv4::Addr::netmask_from_prefix_len(prefix_len);
|
|
const IPv4::Addr net = addr & netmask;
|
|
|
|
if (flags & R_ADD_SYS)
|
|
{
|
|
// ip route add 192.0.2.128/25 via 192.0.2.1
|
|
Command::Ptr add(new Command);
|
|
add->argv.push_back("/sbin/ip");
|
|
add->argv.push_back("-4");
|
|
add->argv.push_back("route");
|
|
add->argv.push_back("add");
|
|
add->argv.push_back(net.to_string() + '/' + openvpn::to_string(prefix_len));
|
|
add->argv.push_back("via");
|
|
add->argv.push_back(gateway_str);
|
|
create = add;
|
|
|
|
// for the destroy command, copy the add command but replace "add" with "delete"
|
|
Command::Ptr del(add->copy());
|
|
del->argv[3] = "del";
|
|
destroy = del;
|
|
}
|
|
|
|
if (rtvec && (flags & R_ADD_DCO))
|
|
rtvec->emplace_back(IP::Addr::from_ipv4(net), prefix_len);
|
|
}
|
|
}
|
|
|
|
inline void add_del_route(const std::string& addr_str,
|
|
const int prefix_len,
|
|
const std::string& gateway_str,
|
|
const std::string& dev,
|
|
const unsigned int flags,// add interface route to rtvec if defined
|
|
std::vector<IP::Route>* rtvec,
|
|
ActionList& create,
|
|
ActionList& destroy)
|
|
{
|
|
Action::Ptr c, d;
|
|
add_del_route(addr_str, prefix_len, gateway_str, dev, flags, rtvec, c, d);
|
|
create.add(c);
|
|
destroy.add(d);
|
|
}
|
|
|
|
inline void iface_up(const std::string& iface_name,
|
|
const int mtu,
|
|
ActionList& create,
|
|
ActionList& destroy)
|
|
{
|
|
{
|
|
Command::Ptr add(new Command);
|
|
add->argv.push_back("/sbin/ip");
|
|
add->argv.push_back("link");
|
|
add->argv.push_back("set");
|
|
add->argv.push_back(iface_name);
|
|
add->argv.push_back("up");
|
|
if (mtu > 0)
|
|
{
|
|
add->argv.push_back("mtu");
|
|
add->argv.push_back(openvpn::to_string(mtu));
|
|
}
|
|
create.add(add);
|
|
|
|
// for the destroy command, copy the add command but replace "up" with "down"
|
|
Command::Ptr del(add->copy());
|
|
del->argv[4] = "down";
|
|
destroy.add(del);
|
|
}
|
|
}
|
|
|
|
inline void iface_config(const std::string& iface_name,
|
|
int unit,
|
|
const TunBuilderCapture& pull,
|
|
std::vector<IP::Route>* rtvec,
|
|
ActionList& create,
|
|
ActionList& destroy)
|
|
{
|
|
// set local4 and local6 to point to IPv4/6 route configurations
|
|
const TunBuilderCapture::RouteAddress* local4 = pull.vpn_ipv4();
|
|
const TunBuilderCapture::RouteAddress* local6 = pull.vpn_ipv6();
|
|
|
|
// Set IPv4 Interface
|
|
if (local4)
|
|
{
|
|
Command::Ptr add(new Command);
|
|
add->argv.push_back("/sbin/ip");
|
|
add->argv.push_back("-4");
|
|
add->argv.push_back("addr");
|
|
add->argv.push_back("add");
|
|
add->argv.push_back(local4->address + '/' + openvpn::to_string(local4->prefix_length));
|
|
add->argv.push_back("broadcast");
|
|
add->argv.push_back((IPv4::Addr::from_string(local4->address) | ~IPv4::Addr::netmask_from_prefix_len(local4->prefix_length)).to_string());
|
|
add->argv.push_back("dev");
|
|
add->argv.push_back(iface_name);
|
|
if (unit >= 0)
|
|
{
|
|
add->argv.push_back("label");
|
|
add->argv.push_back(iface_name + ':' + openvpn::to_string(unit));
|
|
}
|
|
create.add(add);
|
|
|
|
// for the destroy command, copy the add command but replace "add" with "delete"
|
|
Command::Ptr del(add->copy());
|
|
del->argv[3] = "del";
|
|
destroy.add(del);
|
|
|
|
// add interface route to rtvec if defined
|
|
add_del_route(local4->address, local4->prefix_length, local4->address, iface_name, R_ADD_DCO, rtvec, create, destroy);
|
|
}
|
|
|
|
// Set IPv6 Interface
|
|
if (local6 && !pull.block_ipv6)
|
|
{
|
|
Command::Ptr add(new Command);
|
|
add->argv.push_back("/sbin/ip");
|
|
add->argv.push_back("-6");
|
|
add->argv.push_back("addr");
|
|
add->argv.push_back("add");
|
|
add->argv.push_back(local6->address + '/' + openvpn::to_string(local6->prefix_length));
|
|
add->argv.push_back("dev");
|
|
add->argv.push_back(iface_name);
|
|
create.add(add);
|
|
|
|
// for the destroy command, copy the add command but replace "add" with "delete"
|
|
Command::Ptr del(add->copy());
|
|
del->argv[3] = "del";
|
|
destroy.add(del);
|
|
|
|
// add interface route to rtvec if defined
|
|
add_del_route(local6->address, local6->prefix_length, local6->address, iface_name, R_ADD_DCO|R_IPv6, rtvec, create, destroy);
|
|
}
|
|
}
|
|
|
|
inline void tun_config(const std::string& iface_name,
|
|
const TunBuilderCapture& pull,
|
|
std::vector<IP::Route>* rtvec,
|
|
ActionList& create,
|
|
ActionList& destroy)
|
|
{
|
|
const LinuxGW46 gw(true);
|
|
|
|
// set local4 and local6 to point to IPv4/6 route configurations
|
|
const TunBuilderCapture::RouteAddress* local4 = pull.vpn_ipv4();
|
|
const TunBuilderCapture::RouteAddress* local6 = pull.vpn_ipv6();
|
|
|
|
// configure interface
|
|
iface_up(iface_name, pull.mtu, create, destroy);
|
|
iface_config(iface_name, -1, pull, rtvec, create, destroy);
|
|
|
|
// Process Routes
|
|
{
|
|
for (const auto &route : pull.add_routes)
|
|
{
|
|
if (route.ipv6)
|
|
{
|
|
if (!pull.block_ipv6)
|
|
add_del_route(route.address, route.prefix_length, local6->gateway, iface_name, R_ADD_ALL|R_IPv6, rtvec, create, destroy);
|
|
}
|
|
else
|
|
{
|
|
if (local4 && !local4->gateway.empty())
|
|
add_del_route(route.address, route.prefix_length, local4->gateway, iface_name, R_ADD_ALL, rtvec, create, destroy);
|
|
else
|
|
OPENVPN_LOG("ERROR: IPv4 route pushed without IPv4 ifconfig and/or route-gateway");
|
|
}
|
|
}
|
|
}
|
|
|
|
// Process exclude routes
|
|
{
|
|
for (const auto &route : pull.exclude_routes)
|
|
{
|
|
if (route.ipv6)
|
|
{
|
|
OPENVPN_LOG("NOTE: exclude IPv6 routes not supported yet"); // fixme
|
|
}
|
|
else
|
|
{
|
|
if (gw.v4.defined())
|
|
add_del_route(route.address, route.prefix_length, gw.v4.addr().to_string(), gw.v4.dev(), R_ADD_SYS, rtvec, create, destroy);
|
|
else
|
|
OPENVPN_LOG("NOTE: cannot determine gateway for exclude IPv4 routes");
|
|
}
|
|
}
|
|
}
|
|
|
|
// Process IPv4 redirect-gateway
|
|
if (pull.reroute_gw.ipv4)
|
|
{
|
|
// add bypass route
|
|
if (!pull.remote_address.ipv6 && !(pull.reroute_gw.flags & RedirectGatewayFlags::RG_LOCAL))
|
|
add_del_route(pull.remote_address.address, 32, gw.v4.addr().to_string(), gw.v4.dev(), R_ADD_SYS, rtvec, create, destroy);
|
|
|
|
add_del_route("0.0.0.0", 1, local4->gateway, iface_name, R_ADD_ALL, rtvec, create, destroy);
|
|
add_del_route("128.0.0.0", 1, local4->gateway, iface_name, R_ADD_ALL, rtvec, create, destroy);
|
|
}
|
|
|
|
// Process IPv6 redirect-gateway
|
|
if (pull.reroute_gw.ipv6 && !pull.block_ipv6)
|
|
{
|
|
// add bypass route
|
|
if (pull.remote_address.ipv6 && !(pull.reroute_gw.flags & RedirectGatewayFlags::RG_LOCAL))
|
|
add_del_route(pull.remote_address.address, 128, gw.v6.addr().to_string(), gw.v6.dev(), R_ADD_SYS|R_IPv6, rtvec, create, destroy);
|
|
|
|
add_del_route("0000::", 1, local6->gateway, iface_name, R_ADD_ALL|R_IPv6, rtvec, create, destroy);
|
|
add_del_route("8000::", 1, local6->gateway, iface_name, R_ADD_ALL|R_IPv6, rtvec, create, destroy);
|
|
}
|
|
|
|
// fixme -- Process block-ipv6
|
|
|
|
// fixme -- Handle pushed DNS servers
|
|
}
|
|
|
|
class Setup : public TunBuilderSetup::Base
|
|
{
|
|
public:
|
|
typedef RCPtr<Setup> Ptr;
|
|
|
|
struct Config : public TunBuilderSetup::Config
|
|
{
|
|
std::string iface_name;
|
|
Layer layer; // OSI layer
|
|
std::string dev_name;
|
|
int txqueuelen;
|
|
|
|
#ifdef HAVE_JSON
|
|
virtual Json::Value to_json() override
|
|
{
|
|
Json::Value root(Json::objectValue);
|
|
root["iface_name"] = Json::Value(iface_name);
|
|
root["layer"] = Json::Value(layer.str());
|
|
root["dev_name"] = Json::Value(dev_name);
|
|
root["txqueuelen"] = Json::Value(txqueuelen);
|
|
return root;
|
|
};
|
|
|
|
virtual void from_json(const Json::Value& root, const std::string& title) override
|
|
{
|
|
json::assert_dict(root, title);
|
|
json::to_string(root, iface_name, "iface_name", title);
|
|
layer = Layer::from_str(json::get_string(root, "layer", title));
|
|
json::to_string(root, dev_name, "dev_name", title);
|
|
json::to_int(root, txqueuelen, "txqueuelen", title);
|
|
}
|
|
#endif
|
|
};
|
|
|
|
virtual void destroy(std::ostream &os)
|
|
{
|
|
// remove added routes
|
|
if (remove_cmds)
|
|
remove_cmds->execute(std::cout);
|
|
}
|
|
|
|
virtual int establish(const TunBuilderCapture& pull, // defined by TunBuilderSetup::Base
|
|
TunBuilderSetup::Config* config,
|
|
Stop* stop,
|
|
std::ostream& os) override
|
|
{
|
|
// get configuration
|
|
Config *conf = dynamic_cast<Config *>(config);
|
|
if (!conf)
|
|
throw tun_linux_error("missing config");
|
|
|
|
static const char node[] = "/dev/net/tun";
|
|
ScopedFD fd(open(node, O_RDWR));
|
|
if (!fd.defined())
|
|
OPENVPN_THROW(tun_open_error, "error opening tun device " << node << ": " << errinfo(errno));
|
|
|
|
struct ifreq ifr;
|
|
std::memset(&ifr, 0, sizeof(ifr));
|
|
ifr.ifr_flags = IFF_ONE_QUEUE;
|
|
ifr.ifr_flags |= IFF_NO_PI;
|
|
if (conf->layer() == Layer::OSI_LAYER_3)
|
|
ifr.ifr_flags |= IFF_TUN;
|
|
else if (conf->layer() == Layer::OSI_LAYER_2)
|
|
ifr.ifr_flags |= IFF_TAP;
|
|
else
|
|
throw tun_layer_error("unknown OSI layer");
|
|
|
|
open_unit(conf->dev_name, ifr, fd);
|
|
|
|
if (fcntl (fd(), F_SETFL, O_NONBLOCK) < 0)
|
|
throw tun_fcntl_error(errinfo(errno));
|
|
|
|
// Set the TX send queue size
|
|
if (conf->txqueuelen)
|
|
{
|
|
struct ifreq netifr;
|
|
ScopedFD ctl_fd(socket (AF_INET, SOCK_DGRAM, 0));
|
|
|
|
if (ctl_fd.defined())
|
|
{
|
|
std::memset(&netifr, 0, sizeof(netifr));
|
|
strcpy (netifr.ifr_name, ifr.ifr_name);
|
|
netifr.ifr_qlen = conf->txqueuelen;
|
|
if (ioctl (ctl_fd(), SIOCSIFTXQLEN, (void *) &netifr) < 0)
|
|
throw tun_tx_queue_len_error(errinfo(errno));
|
|
}
|
|
else
|
|
throw tun_tx_queue_len_error(errinfo(errno));
|
|
}
|
|
|
|
conf->iface_name = ifr.ifr_name;
|
|
|
|
ActionList::Ptr add_cmds = new ActionList();
|
|
remove_cmds.reset(new ActionListReversed()); // remove commands executed in reversed order
|
|
|
|
// configure tun properties
|
|
tun_config(ifr.ifr_name, pull, nullptr, *add_cmds, *remove_cmds);
|
|
|
|
// execute commands to bring up interface
|
|
add_cmds->execute(std::cout);
|
|
|
|
return fd.release();
|
|
}
|
|
|
|
private:
|
|
void open_unit(const std::string& name, struct ifreq& ifr, ScopedFD& fd)
|
|
{
|
|
if (!name.empty())
|
|
{
|
|
const int max_units = 256;
|
|
for (int unit = 0; unit < max_units; ++unit)
|
|
{
|
|
std::string n = name;
|
|
if (unit)
|
|
n += openvpn::to_string(unit);
|
|
if (n.length() < IFNAMSIZ)
|
|
::strcpy (ifr.ifr_name, n.c_str());
|
|
else
|
|
throw tun_name_error();
|
|
if (ioctl (fd(), TUNSETIFF, (void *) &ifr) == 0)
|
|
return;
|
|
}
|
|
const int eno = errno;
|
|
OPENVPN_THROW(tun_ioctl_error, "failed to open tun device '" << name << "' after trying " << max_units << " units : " << errinfo(eno));
|
|
}
|
|
else
|
|
{
|
|
if (ioctl (fd(), TUNSETIFF, (void *) &ifr) < 0)
|
|
{
|
|
const int eno = errno;
|
|
OPENVPN_THROW(tun_ioctl_error, "failed to open tun device '" << name << "' : " << errinfo(eno));
|
|
}
|
|
}
|
|
}
|
|
|
|
ActionListReversed::Ptr remove_cmds;
|
|
};
|
|
}
|
|
} // namespace openvpn
|
|
|
|
#endif // OPENVPN_TUN_LINUX_CLIENT_TUNCLI_H
|