mirror of
https://github.com/deneraraujo/OpenVPNAdapter.git
synced 2026-04-24 00:00:05 +08:00
f5fda0fa73
6608878d5 [OVPN3-341] implement mssfix support 1bf3fc0e4 win: update project files f8d209435 travis: update to default osx image: xcode9.4 31eb246a8 travis.yml: align deps version to lib-version 996f86635 RunContext: fixed rebase issue that added two "default: signal_rearm();" clauses aebea6456 build script: minor changes to Cityhash inclusion 1d754072c modstat: make update_file_mod_time_nanoseconds() a no-op on non-Linux 7974c9867 Fixed some breakage caused by recent endian/ffs commits a0dd7fe8b endian.hpp: break out endian compile-time tests to endian_platform.hpp c8bdf5a34 ffs.hpp: support additional numeric types dcb0c9452 BufferType: append() argument can now be a flexible buffer type 2009a8a25 Added AsioTimerSafe 39e71b7dd event_loop_wait_barrier: use a longer default timeout when running under valgrind 8b7e08e9b string::contains_non_space_ctrl: consider ASCII char 127 (DEL) to be a control char e43024d7c RunContext: rearm non-terminating signals 6ab379323 write_binary_atomic: remove temporary file on move failure 55dc653cd path: added is_contained() 02bf235c6 Reverted previous commit: "ReplyParser: added undefined status" 84dbc5b9b Allow test/cli.cpp to be used with NetCfg Tunbuilder client 80fed2c55 Allow updating auth-token during session ad7da751e don't print time in debug message and use OPENVPN_LOG_PROTO_VERBOSE 981407994 tls-crypt-v2: implement abstract metadata parser be38bbeb8 tls-crypt-v2: test/ssl/proto.cpp - extend protocol test 60fcf374f tls-crypt-v2: implement WKc appending/unwrapping logic 51f4a3a29 tls-crypt-v2: introduce CONTROL_HARD_RESET_V3 packet type 156a6e58b tls-crypt-v2: implement client key parser and renderer 54a97b381 ssl: add support for encoding/decoding PEM format f090fcda4 tls-crypt: make HMAC API more generic d87f5bbc0 OpenSSL: init library 2ea88a93b Add Remote endpoint information to protect_socket call 0a081ee17 [OVPN3-315] cli/go: add option to compile SITNL component 5bbfb57c0 [OVPN3-315] TunLinux::Client: allow user to select netlink at compile time e8458a68e [OVPN3-315] GW: add netlink support 4e77edb9e [OVPN3-315] TunLinux: add Netlink implementation for Tun setup methods 68508fe56 bigmutex: include missing extern.hpp header a7b923e1e Fix logic inversion from commit 2de9aebc 923e10d13 runcontext: arrange members to allow inheritance 2de9aebc7 Replace deprecated mbedtls_sha1 with mbedtls_sha1_ret e9c0bd00b Remove unused private field ee17c33c2 Add virtual deconstructor to TransportClientParent fab64ba0f Fix clang warning about unused attributes and missing overrides 2624d9ddf Also parse dhcp-option DNS6 as DNS server for compatibility with OpenVPN 2 6d12c9cc2 Refuse external pki with non RSA keys 4a25059f5 test/ovpncli: Don't override PROF env variable f241c4c5f scripts: Add tool to update copyright years 27beeb03d Update lz4 version to 1.8.3 17e356858 Define DASIO_HAS_STD_STRING_VIEW on Android build b107fd994 Remove unsupported platforms from Android build 6a200f72e Ensure all Android components are always installed fbcd374a4 [OVPN3-327] OpenSSL: ensure >TLS1.0 is negotiated by default d9b1f78b6 JSON: #define OPENVPN_JSON_INTERNAL when internal JSON library is used 39290f19d Fix build issues with #if macro on big-endian hardware d4f62d9ed Fix instantiating a new URL instead of parsing the URL git-subtree-dir: Sources/OpenVPNAdapter/Libraries/Vendors/openvpn git-subtree-split: 6608878d57eec1c64c16c5a13ee65b2cf0418ca1
151 lines
4.6 KiB
C++
151 lines
4.6 KiB
C++
// OpenVPN -- An application to securely tunnel IP networks
|
|
// over a single port, with support for SSL/TLS-based
|
|
// session authentication and key exchange,
|
|
// packet encryption, packet authentication, and
|
|
// packet compression.
|
|
//
|
|
// Copyright (C) 2012-2018 OpenVPN Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License Version 3
|
|
// as published by the Free Software Foundation.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program in the COPYING file.
|
|
// If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
#pragma once
|
|
|
|
#include <openvpn/buffer/buffer.hpp>
|
|
#include <openvpn/ip/ipcommon.hpp>
|
|
#include <openvpn/ip/ip4.hpp>
|
|
#include <openvpn/ip/ip6.hpp>
|
|
#include <openvpn/ip/tcp.hpp>
|
|
|
|
#if OPENVPN_DEBUG_PROTO >= 2
|
|
#define OPENVPN_LOG_MSSFIX(x) OPENVPN_LOG(x)
|
|
#else
|
|
#define OPENVPN_LOG_MSSFIX(x)
|
|
#endif
|
|
|
|
namespace openvpn {
|
|
class MSSFix {
|
|
public:
|
|
static void mssfix(BufferAllocated& buf, int mss_inter)
|
|
{
|
|
if (buf.empty())
|
|
return;
|
|
|
|
switch (IPCommon::version(buf[0]))
|
|
{
|
|
case IPCommon::IPv4:
|
|
{
|
|
if (buf.length() <= sizeof(struct IPv4Header))
|
|
break;
|
|
|
|
const IPv4Header *iphdr = (const IPv4Header *)buf.c_data();
|
|
|
|
auto ipv4hlen = IPv4Header::length(iphdr->version_len);
|
|
|
|
if (iphdr->protocol == IPCommon::TCP &&
|
|
ntohs(iphdr->tot_len) == buf.length() &&
|
|
(ntohs(iphdr->frag_off) & IPv4Header::OFFMASK) == 0 &&
|
|
ipv4hlen <= buf.length() &&
|
|
buf.length() - ipv4hlen >= sizeof(struct TCPHeader))
|
|
{
|
|
TCPHeader* tcphdr = (TCPHeader*)(buf.data() + ipv4hlen);
|
|
int ip_payload_len = buf.length() - ipv4hlen;
|
|
|
|
do_mssfix(tcphdr, mss_inter - (sizeof(struct IPv4Header) + sizeof(struct TCPHeader)), ip_payload_len);
|
|
}
|
|
}
|
|
break;
|
|
|
|
case IPCommon::IPv6:
|
|
{
|
|
if (buf.length() <= sizeof(struct IPv6Header))
|
|
break;
|
|
|
|
const IPv6Header *iphdr = (const IPv6Header *)buf.c_data();
|
|
|
|
if (buf.length() != ntohs(iphdr->payload_len) + sizeof(struct IPv6Header))
|
|
break;
|
|
|
|
/* follow header chain until we reach final header, then check for TCP
|
|
*
|
|
* An IPv6 packet could, theoretically, have a chain of multiple headers
|
|
* before the final header (TCP, UDP, ...), so we'd need to walk that
|
|
* chain (see RFC 2460 and RFC 6564 for details).
|
|
*
|
|
* In practice, "most typically used" extention headers (AH, routing,
|
|
* fragment, mobility) are very unlikely to be seen inside an OpenVPN
|
|
* tun, so for now, we only handle the case of "single next header = TCP"
|
|
*/
|
|
if (iphdr->nexthdr != IPCommon::TCP)
|
|
break;
|
|
|
|
/* skip IPv6 header (40 bytes),
|
|
* verify remainder is large enough to contain a full TCP header
|
|
*/
|
|
int payload_len = buf.length() - sizeof(struct IPv6Header);
|
|
if (payload_len >= (int) sizeof(struct TCPHeader))
|
|
{
|
|
TCPHeader *tcphdr = (TCPHeader *)(buf.data() + sizeof(struct IPv6Header));
|
|
do_mssfix(tcphdr, mss_inter - (sizeof(struct IPv6Header) + sizeof(struct TCPHeader)),
|
|
payload_len);
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
private:
|
|
static void do_mssfix(TCPHeader *tcphdr, int max_mss, int ip_payload_len)
|
|
{
|
|
if ((tcphdr->flags & TCPHeader::FLAG_SYN) == 0)
|
|
return;
|
|
|
|
int tcphlen = TCPHeader::length(tcphdr->doff_res);
|
|
if (tcphlen <= (int) sizeof(struct TCPHeader) || tcphlen > ip_payload_len)
|
|
return;
|
|
|
|
int olen, optlen; // length of options field and Option-Length
|
|
uint8_t *opt; // option type
|
|
|
|
for (olen = tcphlen - sizeof(struct TCPHeader), opt = (uint8_t *)(tcphdr + 1);
|
|
olen > 1;
|
|
olen -= optlen, opt += optlen)
|
|
{
|
|
if (*opt == TCPHeader::OPT_EOL)
|
|
break;
|
|
else if (*opt == TCPHeader::OPT_NOP)
|
|
optlen = 1;
|
|
else
|
|
{
|
|
optlen = *(opt + 1);
|
|
if (optlen <= 0 || optlen > olen)
|
|
break;
|
|
if ((*opt == TCPHeader::OPT_MAXSEG) && (optlen == TCPHeader::OPTLEN_MAXSEG))
|
|
{
|
|
uint16_t mssval = (opt[2] << 8) + opt[3];
|
|
if (mssval > max_mss)
|
|
{
|
|
OPENVPN_LOG_MSSFIX("MTU MSS " << mssval << " -> " << max_mss);
|
|
int accumulate = htons(mssval);
|
|
opt[2] = (max_mss >> 8) & 0xff;
|
|
opt[3] = max_mss & 0xff;
|
|
accumulate -= htons(max_mss);
|
|
tcp_adjust_checksum(accumulate, tcphdr->check);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
};
|
|
}
|