OpenVPN
init.c
Go to the documentation of this file.
1/*
2 * OpenVPN -- An application to securely tunnel IP networks
3 * over a single TCP/UDP port, with support for SSL/TLS-based
4 * session authentication and key exchange,
5 * packet encryption, packet authentication, and
6 * packet compression.
7 *
8 * Copyright (C) 2002-2026 OpenVPN Inc <sales@openvpn.net>
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License version 2
12 * as published by the Free Software Foundation.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License along
20 * with this program; if not, see <https://www.gnu.org/licenses/>.
21 */
22
23#ifdef HAVE_CONFIG_H
24#include "config.h"
25#endif
26
27#include "syshead.h"
28
29#ifdef ENABLE_SYSTEMD
30#include <systemd/sd-daemon.h>
31#endif
32
33#include "win32.h"
34#include "init.h"
35#include "run_command.h"
36#include "sig.h"
37#include "occ.h"
38#include "list.h"
39#include "otime.h"
40#include "pool.h"
41#include "gremlin.h"
42#include "occ.h"
43#include "pkcs11.h"
44#include "ps.h"
45#include "lladdr.h"
46#include "ping.h"
47#include "ssl_verify.h"
48#include "ssl_ncp.h"
49#include "tls_crypt.h"
50#include "forward.h"
51#include "auth_token.h"
52#include "mss.h"
53#include "mudp.h"
54#include "dco.h"
55#include "tun_afunix.h"
56
57#include "memdbg.h"
58
59
60static struct context *static_context; /* GLOBAL */
61static const char *saved_pid_file_name; /* GLOBAL */
62
63/*
64 * Crypto initialization flags
65 */
66#define CF_LOAD_PERSISTED_PACKET_ID (1 << 0)
67#define CF_INIT_TLS_MULTI (1 << 1)
68#define CF_INIT_TLS_AUTH_STANDALONE (1 << 2)
69
70static void do_init_first_time(struct context *c);
71
72static bool do_deferred_p2p_ncp(struct context *c);
73
74static void
76{
77 CLEAR(*c);
78}
79
80static void
82{
83 CLEAR(c->c1);
84}
85
86void
88{
89 CLEAR(c->c2);
90}
91
92void
94{
95 const bool first_time_save = c->first_time;
96 const struct context_persist cpsave = c->persist;
98 c->first_time = first_time_save;
99 c->persist = cpsave;
100}
101
102/*
103 * Pass tunnel endpoint and MTU parms to a user-supplied script.
104 * Used to execute the up/down script/plugins.
105 */
106static void
107run_up_down(const char *command, const struct plugin_list *plugins, int plugin_type,
108 const char *arg,
109#ifdef _WIN32
110 DWORD adapter_index,
111#endif
112 const char *dev_type, int tun_mtu, const char *ifconfig_local,
113 const char *ifconfig_remote, const char *context, const char *signal_text,
114 const char *script_type, struct env_set *es)
115{
116 struct gc_arena gc = gc_new();
117
118 if (signal_text)
119 {
120 setenv_str(es, "signal", signal_text);
121 }
122 setenv_str(es, "script_context", context);
123 setenv_int(es, "tun_mtu", tun_mtu);
124 setenv_str(es, "dev", arg);
125 if (dev_type)
126 {
127 setenv_str(es, "dev_type", dev_type);
128 }
129#ifdef _WIN32
130 setenv_int(es, "dev_idx", adapter_index);
131#endif
132
133 if (!ifconfig_local)
134 {
135 ifconfig_local = "";
136 }
137 if (!ifconfig_remote)
138 {
139 ifconfig_remote = "";
140 }
141 if (!context)
142 {
143 context = "";
144 }
145
146 if (plugin_defined(plugins, plugin_type))
147 {
148 struct argv argv = argv_new();
149 ASSERT(arg);
150 argv_printf(&argv, "%s %d 0 %s %s %s", arg, tun_mtu, ifconfig_local, ifconfig_remote,
151 context);
152
153 if (plugin_call(plugins, plugin_type, &argv, NULL, es) != OPENVPN_PLUGIN_FUNC_SUCCESS)
154 {
155 msg(M_FATAL, "ERROR: up/down plugin call failed");
156 }
157
158 argv_free(&argv);
159 }
160
161 if (command)
162 {
163 struct argv argv = argv_new();
164 ASSERT(arg);
165 setenv_str(es, "script_type", script_type);
166 argv_parse_cmd(&argv, command);
167 argv_printf_cat(&argv, "%s %d 0 %s %s %s", arg, tun_mtu, ifconfig_local, ifconfig_remote,
168 context);
170 openvpn_run_script(&argv, es, S_FATAL, "--up/--down");
171 argv_free(&argv);
172 }
173
174 gc_free(&gc);
175}
176
177/*
178 * Should be called after options->ce is modified at the top
179 * of a SIGUSR1 restart.
180 */
181static void
183{
184 /*
185 * In pull mode, we usually import --ping/--ping-restart parameters from
186 * the server. However we should also set an initial default --ping-restart
187 * for the period of time before we pull the --ping-restart parameter
188 * from the server.
189 */
192 {
195 }
196}
197
198#ifdef ENABLE_MANAGEMENT
199static bool
200management_callback_proxy_cmd(void *arg, const char **p)
201{
202 struct context *c = arg;
203 struct connection_entry *ce = &c->options.ce;
204 struct gc_arena *gc = &c->c2.gc;
205 bool ret = false;
206
207 update_time();
208 if (streq(p[1], "NONE"))
209 {
210 ret = true;
211 }
212 else if (p[2] && p[3])
213 {
214 if (streq(p[1], "HTTP"))
215 {
216 struct http_proxy_options *ho;
217 if (ce->proto != PROTO_TCP && ce->proto != PROTO_TCP_CLIENT)
218 {
219 msg(M_WARN, "HTTP proxy support only works for TCP based connections");
220 return false;
221 }
223 ho->server = string_alloc(p[2], gc);
224 ho->port = string_alloc(p[3], gc);
225 ho->auth_retry = (p[4] && streq(p[4], "nct") ? PAR_NCT : PAR_ALL);
226 ret = true;
227 }
228 else if (streq(p[1], "SOCKS"))
229 {
231 ce->socks_proxy_port = string_alloc(p[3], gc);
232 ret = true;
233 }
234 }
235 else
236 {
237 msg(M_WARN, "Bad proxy command");
238 }
239
240 ce->flags &= ~CE_MAN_QUERY_PROXY;
241
242 return ret;
243}
244
245static bool
247{
248 const struct connection_list *l = c->options.connection_list;
249 struct connection_entry *ce = &c->options.ce;
250 struct gc_arena gc;
251 bool ret = true;
252
253 update_time();
254 if (management)
255 {
256 gc = gc_new();
257 {
258 struct buffer out = alloc_buf_gc(256, &gc);
259 buf_printf(&out, ">PROXY:%u,%s,%s", (l ? l->current : 0) + 1,
260 (proto_is_udp(ce->proto) ? "UDP" : "TCP"), np(ce->remote));
263 }
265 while (ce->flags & CE_MAN_QUERY_PROXY)
266 {
268 if (IS_SIG(c))
269 {
270 ret = false;
271 break;
272 }
273 }
275 gc_free(&gc);
276 }
277
278 return ret;
279}
280
295static bool
296management_callback_send_cc_message(void *arg, const char *command, const char *parameters)
297{
298 struct context *c = (struct context *)arg;
299 size_t len = strlen(command) + 1 + strlen(parameters) + 1;
300 if (len > PUSH_BUNDLE_SIZE)
301 {
302 return false;
303 }
304
305 struct gc_arena gc = gc_new();
306 struct buffer buf = alloc_buf_gc(len, &gc);
307 ASSERT(buf_printf(&buf, "%s", command));
308 if (parameters)
309 {
310 ASSERT(buf_printf(&buf, ",%s", parameters));
311 }
313
314 gc_free(&gc);
315 return status;
316}
317
318static unsigned int
320{
321 ASSERT(arg);
322 struct context *c = (struct context *)arg;
323 struct connection_list *l = c->options.connection_list;
324
325 return l->len;
326}
327
328static bool
329management_callback_remote_entry_get(void *arg, unsigned int index, char **remote)
330{
331 ASSERT(arg);
332 ASSERT(remote);
333
334 struct context *c = (struct context *)arg;
335 struct connection_list *l = c->options.connection_list;
336 bool ret = true;
337
338 if (index < l->len)
339 {
340 struct connection_entry *ce = l->array[index];
341 const char *proto = proto2ascii(ce->proto, ce->af, false);
342 const char *status = (ce->flags & CE_DISABLED) ? "disabled" : "enabled";
343
344 /* space for output including 3 commas and a nul */
345 size_t len =
346 strlen(ce->remote) + strlen(ce->remote_port) + strlen(proto) + strlen(status) + 3 + 1;
347 char *out = malloc(len);
349
350 snprintf(out, len, "%s,%s,%s,%s", ce->remote, ce->remote_port, proto, status);
351 *remote = out;
352 }
353 else
354 {
355 ret = false;
356 msg(M_WARN, "Out of bounds index in management query for remote entry: index = %u", index);
357 }
358
359 return ret;
360}
361
362static bool
363management_callback_remote_cmd(void *arg, const char **p)
364{
365 struct context *c = (struct context *)arg;
366 struct connection_entry *ce = &c->options.ce;
367 int ret = false;
368 if (p[1]
371 {
372 unsigned int flags = 0;
373 if (!strcmp(p[1], "ACCEPT"))
374 {
376 ret = true;
377 }
378 else if (!strcmp(p[1], "SKIP"))
379 {
381 ret = true;
382 c->options.ce_advance_count = (p[2]) ? atoi(p[2]) : 1;
383 }
384 else if (!strcmp(p[1], "MOD") && p[2] && p[3])
385 {
386 if (strlen(p[2]) < RH_HOST_LEN && strlen(p[3]) < RH_PORT_LEN)
387 {
388 struct remote_host_store *rhs = c->options.rh_store;
389 if (!rhs)
390 {
392 c->options.rh_store = rhs;
393 }
394 strncpynt(rhs->host, p[2], RH_HOST_LEN);
395 strncpynt(rhs->port, p[3], RH_PORT_LEN);
396
397 ce->remote = rhs->host;
398 ce->remote_port = rhs->port;
400 ret = true;
401 }
402 }
403 if (ret)
404 {
407 }
408 }
409 return ret;
410}
411
412static bool
414{
415 struct gc_arena gc = gc_new();
416 volatile struct connection_entry *ce = &c->options.ce;
417 int ce_changed = true; /* presume the connection entry will be changed */
418
419 update_time();
420 if (management)
421 {
422 struct buffer out = alloc_buf_gc(256, &gc);
423
424 buf_printf(&out, ">REMOTE:%s,%s,%s", np(ce->remote), ce->remote_port,
425 proto2ascii(ce->proto, ce->af, false));
428
433 {
435 if (IS_SIG(c))
436 {
437 ce_changed = false; /* connection entry have not been set */
438 break;
439 }
440 }
442 }
443 gc_free(&gc);
444
445 if (ce_changed)
446 {
447 /* If it is likely a connection entry was modified,
448 * check what changed in the flags and that it was not skipped
449 */
450 const int flags = ((ce->flags >> CE_MAN_QUERY_REMOTE_SHIFT) & CE_MAN_QUERY_REMOTE_MASK);
452 }
453 return ce_changed;
454}
455#endif /* ENABLE_MANAGEMENT */
456
457#if defined(__GNUC__) || defined(__clang__)
458#pragma GCC diagnostic push
459#pragma GCC diagnostic ignored "-Wconversion"
460#endif
461
462/*
463 * Initialize and possibly randomize the connection list.
464 *
465 * Applies the Fisher-Yates shuffle algorithm to ensure all permutations
466 * are equally probable, thereby eliminating shuffling bias.
467 *
468 * The algorithm randomly selects an element from the unshuffled portion
469 * and places it at position i. There's only one way to obtain each
470 * permutation through these swaps. This guarantees that each permutation
471 * occurs with equal probability in theory.
472 */
473static void
475{
476 struct connection_list *l = c->options.connection_list;
477
478 l->current = -1;
479 if (c->options.remote_random)
480 {
481 int i;
482 for (i = l->len - 1; i > 0; --i)
483 {
484 const int j = get_random() % (i + 1);
485 if (i != j)
486 {
487 struct connection_entry *tmp;
488 tmp = l->array[i];
489 l->array[i] = l->array[j];
490 l->array[j] = tmp;
491 }
492 }
493 }
494}
495
496/*
497 * Clear the remote address list
498 */
499static void
501{
502 if (lsa->remote_list && free)
503 {
504 freeaddrinfo(lsa->remote_list);
505 }
506 lsa->remote_list = NULL;
507 lsa->current_remote = NULL;
508}
509
510/*
511 * Increment to next connection entry
512 */
513static void
515{
516 struct connection_list *l = c->options.connection_list;
517 bool ce_defined;
518 struct connection_entry *ce;
519 int n_cycles = 0;
520
521 do
522 {
523 ce_defined = true;
524 if (c->options.no_advance && l->current >= 0)
525 {
526 c->options.no_advance = false;
527 }
528 else
529 {
530 /* Check if there is another resolved address to try for
531 * the current connection */
533 && c->c1.link_socket_addrs[0].current_remote->ai_next
535 {
537 c->c1.link_socket_addrs[0].current_remote->ai_next;
538 }
539 else
540 {
541 c->options.advance_next_remote = false;
542 /* FIXME (schwabe) fix the persist-remote-ip option for real,
543 * this is broken probably ever since connection lists and multiple
544 * remote existed
545 */
547 {
548 /* Connection entry addrinfo objects might have been
549 * resolved earlier but the entry itself might have been
550 * skipped by management on the previous loop.
551 * If so, clear the addrinfo objects as close_instance does
552 */
554 {
557 }
558
559 /* close_instance should have cleared the addrinfo objects */
561 ASSERT(c->c1.link_socket_addrs[0].remote_list == NULL);
562 }
563 else
564 {
567 }
568
569 int advance_count = 1;
570
571 /* If previous connection entry was skipped by management client
572 * with a count to advance by, apply it.
573 */
574 if (c->options.ce_advance_count > 0)
575 {
576 advance_count = c->options.ce_advance_count;
577 }
578
579 /*
580 * Increase the number of connection attempts
581 * If this is connect-retry-max * size(l)
582 * OpenVPN will quit
583 */
584
585 c->options.unsuccessful_attempts += advance_count;
586 l->current += advance_count;
587
588 if (l->current >= l->len)
589 {
590 l->current %= l->len;
591 if (++n_cycles >= 2)
592 {
593 msg(M_FATAL, "No usable connection profiles are present");
594 }
595 }
596 }
597 }
598
600 ce = l->array[l->current];
601
602 if (ce->flags & CE_DISABLED)
603 {
604 ce_defined = false;
605 }
606
607 c->options.ce = *ce;
608
609#ifdef ENABLE_MANAGEMENT
611 {
612 /* allow management interface to override connection entry details */
613 ce_defined = ce_management_query_remote(c);
614 if (IS_SIG(c))
615 {
616 break;
617 }
618 }
619 else if (ce_defined && management && management_query_proxy_enabled(management))
620 {
621 ce_defined = ce_management_query_proxy(c);
622 if (IS_SIG(c))
623 {
624 break;
625 }
626 }
627#endif
628 } while (!ce_defined);
629
630 /* Check if this connection attempt would bring us over the limit */
631 if (c->options.connect_retry_max > 0
633 {
634 msg(M_FATAL, "All connections have been connect-retry-max (%d) times unsuccessful, exiting",
636 }
638}
639
640/*
641 * Query for private key and auth-user-pass username/passwords
642 */
643void
645{
646 /* Certificate password input */
647 if (c->options.key_pass_file)
648 {
650 }
651
652 /* Auth user/pass input */
654 {
656#ifdef ENABLE_MANAGEMENT
658 &c->options.sc_info);
659#else
661 NULL);
662#endif
663 }
664}
665
666/*
667 * Initialize/Uninitialize HTTP or SOCKS proxy
668 */
669
670static void
672{
673 if (c->c1.http_proxy_owned && c->c1.http_proxy)
674 {
676 c->c1.http_proxy = NULL;
677 c->c1.http_proxy_owned = false;
678 }
679 if (c->c1.socks_proxy_owned && c->c1.socks_proxy)
680 {
682 c->c1.socks_proxy = NULL;
683 c->c1.socks_proxy_owned = false;
684 }
685}
686
687static void
689{
690 bool did_http = false;
691
693
695 {
697
698 /* Possible HTTP proxy user/pass input */
700 if (c->c1.http_proxy)
701 {
702 did_http = true;
703 c->c1.http_proxy_owned = true;
704 }
705 }
706
707 if (!did_http && c->options.ce.socks_proxy_server)
708 {
709 c->c1.socks_proxy =
712 if (c->c1.socks_proxy)
713 {
714 c->c1.socks_proxy_owned = true;
715 }
716 }
717}
718
719static void
721{
723}
724
725static void
727{
729}
730
731static void
737
738void
740{
742
744
746
748
750
751#if defined(ENABLE_PKCS11)
752 if (c->first_time)
753 {
754 int i;
755 pkcs11_initialize(true, c->options.pkcs11_pin_cache_period);
756 for (i = 0; i < MAX_PARMS && c->options.pkcs11_providers[i] != NULL; i++)
757 {
758 pkcs11_addProvider(
759 c->options.pkcs11_providers[i], c->options.pkcs11_protected_authentication[i],
760 c->options.pkcs11_private_mode[i], c->options.pkcs11_cert_private[i]);
761 }
762 }
763#endif
764
765#if 0 /* test get_user_pass with GET_USER_PASS_NEED_OK flag */
766 {
767 /*
768 * In the management interface, you can okay the request by entering "needok token-insertion-request ok"
769 */
770 struct user_pass up;
771 CLEAR(up);
772 strcpy(up.username, "Please insert your cryptographic token"); /* put the high-level message in up.username */
773 get_user_pass(&up, NULL, "token-insertion-request", GET_USER_PASS_MANAGEMENT|GET_USER_PASS_NEED_OK);
774 msg(M_INFO, "RET:%s", up.password); /* will return the third argument to management interface
775 * 'needok' command, usually 'ok' or 'cancel'. */
776 }
777#endif
778
779#ifdef ENABLE_SYSTEMD
780 /* We can report the PID via getpid() to systemd here as OpenVPN will not
781 * do any fork due to daemon() a future call.
782 * See possibly_become_daemon() [init.c] for more details.
783 */
784 sd_notifyf(0, "READY=1\nSTATUS=Pre-connection initialization successful\nMAINPID=%lu",
785 (unsigned long)getpid());
786#endif
787}
788
789void
791{
792 gc_free(&c->c2.gc);
793 gc_free(&c->options.gc);
794 gc_free(&c->gc);
795}
796
797#if PORT_SHARE
798
799static void
800close_port_share(void)
801{
802 if (port_share)
803 {
804 port_share_close(port_share);
805 port_share = NULL;
806 }
807}
808
809static void
810init_port_share(struct context *c)
811{
812 if (!port_share && (c->options.port_share_host && c->options.port_share_port))
813 {
814 port_share =
815 port_share_open(c->options.port_share_host, c->options.port_share_port,
816 c->c2.frame.buf.payload_size, c->options.port_share_journal_dir);
817 if (port_share == NULL)
818 {
819 msg(M_FATAL, "Fatal error: Port sharing failed");
820 }
821 }
822}
823
824#endif /* if PORT_SHARE */
825
826
827bool
829{
830#if defined(DMALLOC)
831 crypto_init_dmalloc();
832#endif
833
834
835 /*
836 * Initialize random number seed. random() is only used
837 * when "weak" random numbers are acceptable.
838 * SSL library routines are always used when cryptographically
839 * strong random numbers are required.
840 */
841 struct timeval tv;
842 if (!gettimeofday(&tv, NULL))
843 {
844 const unsigned int seed = (unsigned int)tv.tv_sec ^ tv.tv_usec;
845 srandom(seed);
846 }
847
848 error_reset(); /* initialize error.c */
849 reset_check_status(); /* initialize status check code in socket.c */
850
851#ifdef _WIN32
852 init_win32();
853#endif
854
855#ifdef OPENVPN_DEBUG_COMMAND_LINE
856 {
857 int i;
858 for (i = 0; i < argc; ++i)
859 {
860 msg(M_INFO, "argv[%d] = '%s'", i, argv[i]);
861 }
862 }
863#endif
864
865 update_time();
866
867 init_ssl_lib();
868
869#ifdef SCHEDULE_TEST
870 schedule_test();
871 return false;
872#endif
873
874#ifdef IFCONFIG_POOL_TEST
875 ifconfig_pool_test(0x0A010004, 0x0A0100FF);
876 return false;
877#endif
878
879#ifdef TIME_TEST
880 time_test();
881 return false;
882#endif
883
884#ifdef GEN_PATH_TEST
885 {
886 struct gc_arena gc = gc_new();
887 const char *fn = gen_path("foo", "bar", &gc);
888 printf("%s\n", fn);
889 gc_free(&gc);
890 }
891 return false;
892#endif
893
894#ifdef STATUS_PRINTF_TEST
895 {
896 struct gc_arena gc = gc_new();
897 const char *tmp_file = platform_create_temp_file("/tmp", "foo", &gc);
898 struct status_output *so = status_open(tmp_file, 0, -1, NULL, STATUS_OUTPUT_WRITE);
899 status_printf(so, "%s", "foo");
900 status_printf(so, "%s", "bar");
901 if (!status_close(so))
902 {
903 msg(M_WARN, "STATUS_PRINTF_TEST: %s: write error", tmp_file);
904 }
905 gc_free(&gc);
906 }
907 return false;
908#endif
909
910 return true;
911}
912
913void
915{
916 free_ssl_lib();
917
918#ifdef ENABLE_PKCS11
919 pkcs11_terminate();
920#endif
921
922#if PORT_SHARE
923 close_port_share();
924#endif
925
926#if defined(MEASURE_TLS_HANDSHAKE_STATS)
927 show_tls_performance_stats();
928#endif
929}
930
931void
932init_verb_mute(struct context *c, unsigned int flags)
933{
934 if (flags & IVM_LEVEL_1)
935 {
936 /* set verbosity and mute levels */
940 }
941
942 /* special D_LOG_RW mode */
943 if (flags & IVM_LEVEL_2)
944 {
946 }
947}
948
949/*
950 * Possibly set --dev based on --dev-node.
951 * For example, if --dev-node /tmp/foo/tun, and --dev undefined,
952 * set --dev to tun.
953 */
954void
956{
957 if (!options->dev && options->dev_node)
958 {
959 /* POSIX basename() implementations may modify its arguments */
960 char *dev_node = string_alloc(options->dev_node, NULL);
961 options->dev = basename(dev_node);
962 }
963}
964
965bool
967{
968 /*
969 * OpenSSL info print mode?
970 */
973 {
975 {
977 }
979 {
981 }
983 {
985 }
987 {
990 }
991 if (options->show_curves)
992 {
994 }
995 return true;
996 }
997 return false;
998}
999
1000/*
1001 * Static pre-shared key generation mode?
1002 */
1003bool
1005{
1006 /* should we disable paging? */
1007 if (options->mlock && (options->genkey))
1008 {
1009 platform_mlockall(true);
1010 }
1011
1012 /*
1013 * We do not want user to use --genkey with --secret. In the transistion
1014 * phase we for secret.
1015 */
1017 {
1018 msg(M_USAGE, "Using --genkey type with --secret filename is "
1019 "not supported. Use --genkey type filename instead.");
1020 }
1022 {
1023 int nbits_written;
1024 const char *genkey_filename = options->genkey_filename;
1026 {
1027 msg(M_USAGE, "You must provide a filename to either --genkey "
1028 "or --secret, not both");
1029 }
1030
1031 /*
1032 * Copy filename from shared_secret_file to genkey_filename to support
1033 * the old --genkey --secret foo.file syntax.
1034 */
1036 {
1037 msg(M_WARN, "WARNING: Using --genkey --secret filename is "
1038 "DEPRECATED. Use --genkey secret filename instead.");
1039 genkey_filename = options->shared_secret_file;
1040 }
1041
1042 nbits_written = write_key_file(2, genkey_filename);
1043 if (nbits_written < 0)
1044 {
1045 msg(M_FATAL, "Failed to write key file");
1046 }
1047
1048 msg(D_GENKEY | M_NOPREFIX, "Randomly generated %d bit key written to %s", nbits_written,
1050 return true;
1051 }
1053 {
1055 return true;
1056 }
1058 {
1060 {
1061 msg(M_USAGE,
1062 "--genkey tls-crypt-v2-client requires a server key to be set via --tls-crypt-v2 to create a client key");
1063 }
1064
1068 return true;
1069 }
1071 {
1073 return true;
1074 }
1075 else
1076 {
1077 return false;
1078 }
1079}
1080
1081/*
1082 * Persistent TUN/TAP device management mode?
1083 */
1084bool
1086{
1087 if (!options->persist_config)
1088 {
1089 return false;
1090 }
1091
1092 /* sanity check on options for --mktun or --rmtun */
1093 notnull(options->dev, "TUN/TAP device (--dev)");
1096 {
1098 "options --mktun or --rmtun should only be used together with --dev");
1099 }
1100
1101#if defined(ENABLE_DCO)
1102 if (dco_enabled(options))
1103 {
1104 /* creating a DCO interface via --mktun is not supported as it does not
1105 * make much sense. Since DCO is enabled by default, people may run into
1106 * this without knowing, therefore this case should be properly handled.
1107 *
1108 * Disable DCO if --mktun was provided and print a message to let
1109 * user know.
1110 */
1112 {
1113 msg(M_WARN, "Note: --mktun does not support DCO. Creating TUN interface.");
1114 }
1115
1116 options->disable_dco = true;
1117 }
1118#endif
1119
1120#ifdef ENABLE_FEATURE_TUN_PERSIST
1124 {
1125 set_lladdr(ctx, options->dev, options->lladdr, NULL);
1126 }
1127 return true;
1128#else /* ifdef ENABLE_FEATURE_TUN_PERSIST */
1130 "options --mktun and --rmtun are not available on your operating "
1131 "system. Please check 'man tun' (or 'tap'), whether your system "
1132 "supports using 'ifconfig %s create' / 'destroy' to create/remove "
1133 "persistent tunnel interfaces.",
1134 options->dev);
1135#endif
1136 return false;
1137}
1138
1139/*
1140 * Should we become a daemon?
1141 * Return true if we did it.
1142 */
1143bool
1145{
1146 bool ret = false;
1147
1148#ifdef ENABLE_SYSTEMD
1149 /* return without forking if we are running from systemd */
1150 if (sd_notify(0, "READY=0") > 0)
1151 {
1152 return ret;
1153 }
1154#endif
1155
1156 if (options->daemon)
1157 {
1158 /* Don't chdir immediately, but the end of the init sequence, if needed */
1159
1160#if defined(__APPLE__) && defined(__clang__)
1161#pragma clang diagnostic push
1162#pragma clang diagnostic ignored "-Wdeprecated-declarations"
1163#endif
1164 if (daemon(1, options->log) < 0)
1165 {
1166 msg(M_ERR, "daemon() failed or unsupported");
1167 }
1168#if defined(__APPLE__) && defined(__clang__)
1169#pragma clang diagnostic pop
1170#endif
1172 if (options->log)
1173 {
1175 }
1176
1177 ret = true;
1178 }
1179 return ret;
1180}
1181
1182/*
1183 * Actually do UID/GID downgrade, chroot and SELinux context switching, if requested.
1184 */
1185static void
1186do_uid_gid_chroot(struct context *c, bool no_delay)
1187{
1188 static const char why_not[] = "will be delayed because of --client, --pull, or --up-delay";
1189 struct context_0 *c0 = c->c0;
1190
1191 if (c0 && !c0->uid_gid_chroot_set)
1192 {
1193 /* chroot if requested */
1194 if (c->options.chroot_dir)
1195 {
1196 if (no_delay)
1197 {
1199 }
1200 else if (c->first_time)
1201 {
1202 msg(M_INFO, "NOTE: chroot %s", why_not);
1203 }
1204 }
1205
1206 /* set user and/or group if we want to setuid/setgid */
1207 if (c0->uid_gid_specified)
1208 {
1209 if (no_delay)
1210 {
1212 }
1213 else if (c->first_time)
1214 {
1215 msg(M_INFO, "NOTE: UID/GID downgrade %s", why_not);
1216 }
1217 }
1218
1219#ifdef ENABLE_SELINUX
1220 /* Apply a SELinux context in order to restrict what OpenVPN can do
1221 * to _only_ what it is supposed to do after initialization is complete
1222 * (basically just network I/O operations). Doing it after chroot
1223 * requires /proc to be mounted in the chroot (which is annoying indeed
1224 * but doing it before requires more complex SELinux policies.
1225 */
1226 if (c->options.selinux_context)
1227 {
1228 if (no_delay)
1229 {
1230 if (-1 == setcon(c->options.selinux_context))
1231 {
1232 msg(M_ERR, "setcon to '%s' failed; is /proc accessible?",
1233 c->options.selinux_context);
1234 }
1235 else
1236 {
1237 msg(M_INFO, "setcon to '%s' succeeded", c->options.selinux_context);
1238 }
1239 }
1240 else if (c->first_time)
1241 {
1242 msg(M_INFO, "NOTE: setcon %s", why_not);
1243 }
1244 }
1245#endif
1246
1247 /* Privileges are going to be dropped by now (if requested), be sure
1248 * to prevent any future privilege dropping attempts from now on.
1249 */
1250 if (no_delay)
1251 {
1252 c0->uid_gid_chroot_set = true;
1253 }
1254 }
1255}
1256
1257/*
1258 * Return common name in a way that is formatted for
1259 * prepending to msg() output.
1260 */
1261const char *
1263{
1264 struct buffer out = alloc_buf_gc(256, gc);
1265 if (c->c2.tls_multi)
1266 {
1267 buf_printf(&out, "[%s] ", tls_common_name(c->c2.tls_multi, false));
1268 }
1269 return BSTR(&out);
1270}
1271
1272void
1274{
1275#ifdef _WIN32
1277 {
1280 }
1281 else
1282 {
1284
1285 /* put a title on the top window bar */
1287 {
1290 }
1291 }
1292#endif /* ifdef _WIN32 */
1293}
1294
1295void
1297{
1298 c->c2.coarse_timer_wakeup = 0;
1299}
1300
1301/*
1302 * Initialise the server poll timeout timer
1303 * This timer is used in the http/socks proxy setup so it needs to be setup
1304 * before
1305 */
1306static void
1308{
1309 update_time();
1310 if (c->options.ce.connect_timeout)
1311 {
1312 event_timeout_init(&c->c2.server_poll_interval, c->options.ce.connect_timeout, now);
1313 }
1314}
1315
1316/*
1317 * Initialize timers
1318 */
1319static void
1321{
1322 update_time();
1324
1325 /* initialize inactivity timeout */
1326 if (c->options.inactivity_timeout)
1327 {
1328 event_timeout_init(&c->c2.inactivity_interval, c->options.inactivity_timeout, now);
1329 }
1330
1331 /* initialize inactivity timeout */
1332 if (c->options.session_timeout)
1333 {
1334 event_timeout_init(&c->c2.session_interval, c->options.session_timeout, now);
1335 }
1336
1337 /* initialize pings */
1338 if (dco_enabled(&c->options))
1339 {
1340 /* The DCO kernel module will send the pings instead of user space */
1341 event_timeout_clear(&c->c2.ping_rec_interval);
1342 event_timeout_clear(&c->c2.ping_send_interval);
1343 }
1344 else
1345 {
1346 if (c->options.ping_send_timeout)
1347 {
1348 event_timeout_init(&c->c2.ping_send_interval, c->options.ping_send_timeout, 0);
1349 }
1350
1351 if (c->options.ping_rec_timeout)
1352 {
1353 event_timeout_init(&c->c2.ping_rec_interval, c->options.ping_rec_timeout, now);
1354 }
1355 }
1356
1357 /* If the auth-token renewal interval is shorter than reneg-sec, arm
1358 * "auth-token renewal" timer to send additional auth-token to update the
1359 * token on the client more often. If not, this happens automatically
1360 * at renegotiation time, without needing an extra event.
1361 */
1362 if (c->options.auth_token_generate
1363 && c->options.auth_token_renewal < c->options.renegotiate_seconds)
1364 {
1365 event_timeout_init(&c->c2.auth_token_renewal_interval, c->options.auth_token_renewal, now);
1366 }
1367
1368 if (!deferred)
1369 {
1370 /* initialize connection establishment timer */
1371 event_timeout_init(&c->c2.wait_for_connect, 1, now);
1372
1373 /* initialize occ timers */
1374
1375 if (c->options.occ && !TLS_MODE(c) && c->c2.options_string_local
1376 && c->c2.options_string_remote)
1377 {
1378 event_timeout_init(&c->c2.occ_interval, OCC_INTERVAL_SECONDS, now);
1379 }
1380
1381 if (c->options.mtu_test)
1382 {
1383 event_timeout_init(&c->c2.occ_mtu_load_test_interval, OCC_MTU_LOAD_INTERVAL_SECONDS,
1384 now);
1385 }
1386
1387 /* initialize packet_id persistence timer */
1388 if (c->options.packet_id_file)
1389 {
1390 event_timeout_init(&c->c2.packet_id_persist_interval, 60, now);
1391 }
1392
1393 /* initialize tmp_int optimization that limits the number of times we call
1394 * tls_multi_process in the main event loop */
1396 }
1397}
1398
1399/*
1400 * Initialize traffic shaper.
1401 */
1402static void
1404{
1405 /* initialize traffic shaper (i.e. transmit bandwidth limiter) */
1406 if (c->options.shaper)
1407 {
1408 shaper_init(&c->c2.shaper, c->options.shaper);
1409 shaper_msg(&c->c2.shaper);
1410 }
1411}
1412
1413/*
1414 * Allocate route list structures for IPv4 and IPv6
1415 * (we do this for IPv4 even if no --route option has been seen, as other
1416 * parts of OpenVPN might want to fill the route-list with info, e.g. DHCP)
1417 */
1418static void
1420{
1421 if (!c->c1.route_list)
1422 {
1423 ALLOC_OBJ_CLEAR_GC(c->c1.route_list, struct route_list, &c->gc);
1424 }
1425 if (c->options.routes_ipv6 && !c->c1.route_ipv6_list)
1426 {
1427 ALLOC_OBJ_CLEAR_GC(c->c1.route_ipv6_list, struct route_ipv6_list, &c->gc);
1428 }
1429}
1430
1431
1432/*
1433 * Initialize the route list, resolving any DNS names in route
1434 * options and saving routes in the environment.
1435 */
1436static void
1438 const struct link_socket_info *link_socket_info, struct env_set *es,
1439 openvpn_net_ctx_t *ctx)
1440{
1441 const char *gw = NULL;
1443 int metric = 0;
1444
1445 /* if DCO is enabled we have both regular routes and iroutes in the system
1446 * routing table, and normal routes must have a higher metric for that to
1447 * work so that iroutes are always matched first
1448 */
1449 if (dco_enabled(options))
1450 {
1451 metric = DCO_DEFAULT_METRIC;
1452 }
1453
1454 if (dev == DEV_TYPE_TUN && (options->topology == TOP_NET30 || options->topology == TOP_P2P))
1455 {
1457 }
1459 {
1461 }
1463 {
1464 metric = options->route_default_metric;
1465 }
1466
1469 {
1470 /* copy routes to environment */
1472 }
1473}
1474
1475static void
1477 const struct link_socket_info *link_socket_info, struct env_set *es,
1478 openvpn_net_ctx_t *ctx)
1479{
1480 const char *gw = NULL;
1481 int metric = -1; /* no metric set */
1482
1483 /* see explanation in do_init_route_list() */
1484 if (dco_enabled(options))
1485 {
1486 metric = DCO_DEFAULT_METRIC;
1487 }
1488
1489 gw = options->ifconfig_ipv6_remote; /* default GW = remote end */
1491 {
1493 }
1494
1496 {
1497 metric = options->route_default_metric;
1498 }
1499
1500 /* redirect (IPv6) gateway to VPN? if yes, add a few more specifics
1501 */
1503 {
1504 char *opt_list[] = { "::/3", "2000::/4", "3000::/4", "fc00::/7", NULL };
1505 int i;
1506
1507 for (i = 0; opt_list[i]; i++)
1508 {
1512 }
1513 }
1514
1517 {
1518 /* copy routes to environment */
1520 }
1521}
1522
1523
1524/*
1525 * Called after all initialization has been completed.
1526 */
1527void
1528initialization_sequence_completed(struct context *c, const unsigned int flags)
1529{
1530 static const char message[] = "Initialization Sequence Completed";
1531
1532 /* Reset the unsuccessful connection counter on complete initialisation */
1533 c->options.unsuccessful_attempts = 0;
1534
1535 /* If we delayed UID/GID downgrade or chroot, do it now */
1536 do_uid_gid_chroot(c, true);
1537
1538 /* Test if errors */
1539 if (flags & ISC_ERRORS)
1540 {
1541#ifdef _WIN32
1544 msg(M_INFO, "%s With Errors ( see http://openvpn.net/faq.html#dhcpclientserv )", message);
1545#else
1546#ifdef ENABLE_SYSTEMD
1547 sd_notifyf(0, "STATUS=Failed to start up: %s With Errors\nERRNO=1", message);
1548#endif
1549 msg(M_INFO, "%s With Errors", message);
1550#endif
1551 }
1552 else
1553 {
1554#ifdef ENABLE_SYSTEMD
1555 sd_notifyf(0, "STATUS=%s", message);
1556#endif
1557 msg(M_INFO, "%s", message);
1558 }
1559
1560 /* Flag that we initialized */
1561 if ((flags & (ISC_ERRORS | ISC_SERVER)) == 0)
1562 {
1563 c->options.no_advance = true;
1564 }
1565
1566#ifdef _WIN32
1567 fork_register_dns_action(c->c1.tuntap);
1568#endif
1569
1570#ifdef ENABLE_MANAGEMENT
1571 /* Tell management interface that we initialized */
1572 if (management)
1573 {
1575 struct in6_addr *tun_local6 = NULL;
1576 struct openvpn_sockaddr local, remote;
1577 struct link_socket_actual *actual;
1578 socklen_t sa_len = sizeof(local);
1579 const char *detail = "SUCCESS";
1580 if (flags & ISC_ERRORS)
1581 {
1582 detail = "ERROR";
1583 }
1584 /* Flag route error only on platforms where trivial "already exists" errors
1585 * are filtered out. Currently this is the case on Windows or if usng netlink.
1586 */
1587#if defined(_WIN32) || defined(ENABLE_SITNL)
1588 else if (flags & ISC_ROUTE_ERRORS)
1589 {
1590 detail = "ROUTE_ERROR";
1591 }
1592#endif
1593
1594 CLEAR(local);
1595 actual = &get_link_socket_info(c)->lsa->actual;
1596 remote = actual->dest;
1597 getsockname(c->c2.link_sockets[0]->sd, &local.addr.sa, &sa_len);
1598#if ENABLE_IP_PKTINFO
1599 if (!addr_defined(&local))
1600 {
1601 switch (local.addr.sa.sa_family)
1602 {
1603 case AF_INET:
1604#if defined(HAVE_IN_PKTINFO) && defined(HAVE_IPI_SPEC_DST)
1605 local.addr.in4.sin_addr = actual->pi.in4.ipi_spec_dst;
1606#else
1607 local.addr.in4.sin_addr = actual->pi.in4;
1608#endif
1609 break;
1610
1611 case AF_INET6:
1612 local.addr.in6.sin6_addr = actual->pi.in6.ipi6_addr;
1613 break;
1614 }
1615 }
1616#endif
1617
1618 if (c->c1.tuntap)
1619 {
1620 tun_local = &c->c1.tuntap->local;
1621 tun_local6 = &c->c1.tuntap->local_ipv6;
1622 }
1623 management_set_state(management, OPENVPN_STATE_CONNECTED, detail, tun_local, tun_local6,
1624 &local, &remote);
1625 if (tun_local)
1626 {
1628 }
1629 }
1630#endif /* ifdef ENABLE_MANAGEMENT */
1631}
1632
1637static bool
1638route_noexec_enabled(const struct options *o, const struct tuntap *tt)
1639{
1640 return o->route_noexec || (tt && tt->backend_driver == DRIVER_AFUNIX)
1641 || (tt && tt->backend_driver == DRIVER_NULL);
1642}
1643
1644/*
1645 * Possibly add routes and/or call route-up script
1646 * based on options.
1647 */
1648bool
1650 struct route_ipv6_list *route_ipv6_list, const struct tuntap *tt,
1651 const struct plugin_list *plugins, struct env_set *es, openvpn_net_ctx_t *ctx)
1652{
1653 bool ret = true;
1655 {
1658 }
1659#ifdef ENABLE_MANAGEMENT
1660 if (management)
1661 {
1663 }
1664#endif
1665
1666 if (plugin_defined(plugins, OPENVPN_PLUGIN_ROUTE_UP))
1667 {
1668 if (plugin_call(plugins, OPENVPN_PLUGIN_ROUTE_UP, NULL, NULL, es)
1669 != OPENVPN_PLUGIN_FUNC_SUCCESS)
1670 {
1671 msg(M_WARN, "WARNING: route-up plugin call failed");
1672 }
1673 }
1674
1675 if (options->route_script)
1676 {
1677 struct argv argv = argv_new();
1678 setenv_str(es, "script_type", "route-up");
1680 openvpn_run_script(&argv, es, 0, "--route-up");
1681 argv_free(&argv);
1682 }
1683
1684#ifdef _WIN32
1685 if (options->show_net_up)
1686 {
1689 }
1690 else if (check_debug_level(D_SHOW_NET))
1691 {
1694 }
1695#endif
1696 return ret;
1697}
1698
1699/*
1700 * initialize tun/tap device object
1701 */
1702static void
1704{
1710 c->c2.es, &c->net_ctx, c->c1.tuntap);
1711
1713 {
1714 /* Using AF_UNIX trumps using DCO */
1716 }
1717 else if (is_dev_type(c->options.dev, c->options.dev_type, "null"))
1718 {
1720 }
1721#ifdef _WIN32
1722 else
1723 {
1725 }
1726#else
1727 else if (dco_enabled(&c->options))
1728 {
1730 }
1731 else
1732 {
1734 }
1735#endif
1736
1738
1739 c->c1.tuntap_owned = true;
1740}
1741
1742/*
1743 * Open tun/tap device, ifconfig, call up script, etc.
1744 */
1745
1746
1747static bool
1749{
1750 if (tt && tt->backend_driver == DRIVER_AFUNIX)
1751 {
1752 return false;
1753 }
1754#ifdef TARGET_ANDROID
1755 return false;
1756#else
1757 return is_tun_type_set(tt);
1758#endif
1759}
1760
1769static void
1771{
1772#if defined(_WIN32)
1773 /* Fortify 'redirect-gateway block-local' with firewall rules? */
1774 bool block_local = block_local_needed(c->c1.route_list);
1775
1776 if (c->options.block_outside_dns || block_local)
1777 {
1778 BOOL dns_only = !block_local;
1779 if (!win_wfp_block(c->c1.tuntap->adapter_index, c->options.msg_channel, dns_only))
1780 {
1781 msg(M_FATAL, "WFP: initialization failed");
1782 }
1783 }
1784#endif
1785}
1786
1795static void
1796del_wfp_block(struct context *c, unsigned long adapter_index)
1797{
1798#if defined(_WIN32)
1800 {
1801 if (!win_wfp_uninit(adapter_index, c->options.msg_channel))
1802 {
1803 msg(M_FATAL, "WFP: deinitialization failed");
1804 }
1805 }
1806#endif
1807}
1808
1814static bool
1816{
1817 return c->options.ifconfig_noexec
1818 || (c->c1.tuntap && c->c1.tuntap->backend_driver == DRIVER_AFUNIX)
1819 || (c->c1.tuntap && c->c1.tuntap->backend_driver == DRIVER_NULL);
1820}
1821
1822static void
1824{
1825 struct tuntap *tt = c->c1.tuntap;
1826
1827 if (tt->backend_driver == DRIVER_NULL)
1828 {
1830 }
1831 else if (tt->backend_driver == DRIVER_AFUNIX)
1832 {
1833 open_tun_afunix(&c->options, c->c2.frame.tun_mtu, tt, c->c2.es);
1834 }
1835 else
1836 {
1838 }
1839 msg(M_INFO, "%s device [%s] opened", print_tun_backend_driver(tt->backend_driver),
1840 tt->actual_name);
1841}
1842
1843
1844static bool
1845do_open_tun(struct context *c, int *error_flags)
1846{
1847 struct gc_arena gc = gc_new();
1848 bool ret = false;
1849 *error_flags = 0;
1850
1851 if (!can_preserve_tun(c->c1.tuntap))
1852 {
1853#ifdef TARGET_ANDROID
1854 /* If we emulate persist-tun on android we still have to open a new tun and
1855 * then close the old */
1856 int oldtunfd = -1;
1857 if (c->c1.tuntap)
1858 {
1859 oldtunfd = c->c1.tuntap->fd;
1860 free(c->c1.tuntap);
1861 c->c1.tuntap = NULL;
1862 c->c1.tuntap_owned = false;
1863 }
1864#endif
1865
1866 /* initialize (but do not open) tun/tap object, this also sets
1867 * the backend driver type */
1868 do_init_tun(c);
1869
1870 /* inherit the dco context from the tuntap object */
1871 if (c->c2.tls_multi)
1872 {
1873 c->c2.tls_multi->dco = &c->c1.tuntap->dco;
1874 }
1875
1876#ifdef _WIN32
1877 /* store (hide) interactive service handle in tuntap_options */
1879 msg(D_ROUTE, "interactive service msg_channel=%" PRIuPTR, (intptr_t)c->options.msg_channel);
1880#endif
1881
1882 /* allocate route list structure */
1884
1885 /* parse and resolve the route option list */
1886 ASSERT(c->c2.link_sockets[0]);
1887 if (c->options.routes && c->c1.route_list)
1888 {
1890 c->c2.es, &c->net_ctx);
1891 }
1893 {
1895 &c->c2.link_sockets[0]->info, c->c2.es, &c->net_ctx);
1896 }
1897
1898 /* do ifconfig */
1900 {
1901 /* guess actual tun/tap unit number that will be returned
1902 * by open_tun */
1903 const char *guess =
1905 do_ifconfig(c->c1.tuntap, guess, c->c2.frame.tun_mtu, c->c2.es, &c->net_ctx);
1906 }
1907
1908 /* possibly add routes */
1910 {
1911 /* Ignore route_delay, would cause ROUTE_BEFORE_TUN to be ignored */
1913 c->c1.tuntap, c->plugins, c->c2.es, &c->net_ctx);
1914 *error_flags |= (status ? 0 : ISC_ROUTE_ERRORS);
1915 }
1916#ifdef TARGET_ANDROID
1917 /* Store the old fd inside the fd so open_tun can use it */
1918 c->c1.tuntap->fd = oldtunfd;
1919#endif
1920
1921 if (dco_enabled(&c->options))
1922 {
1923 ovpn_dco_init(c);
1924 }
1925
1926 /* open the tun device */
1928
1929 /* set the hardware address */
1930 if (c->options.lladdr)
1931 {
1933 }
1934
1935 /* do ifconfig */
1937 {
1939 &c->net_ctx);
1940 }
1941
1942 run_dns_up_down(true, &c->options, c->c1.tuntap, &c->persist.duri);
1943
1944 /* run the up script */
1945 run_up_down(c->options.up_script, c->plugins, OPENVPN_PLUGIN_UP, c->c1.tuntap->actual_name,
1946#ifdef _WIN32
1948#endif
1952 NULL, "up", c->c2.es);
1953
1954 add_wfp_block(c);
1955
1956 /* possibly add routes */
1958 {
1960 c->c1.tuntap, c->plugins, c->c2.es, &c->net_ctx);
1961 *error_flags |= (status ? 0 : ISC_ROUTE_ERRORS);
1962 }
1963
1964 ret = true;
1965 static_context = c;
1966 }
1967 else
1968 {
1969 msg(M_INFO, "Preserving previous TUN/TAP instance: %s", c->c1.tuntap->actual_name);
1970
1971 /* explicitly set the ifconfig_* env vars */
1973
1974 run_dns_up_down(true, &c->options, c->c1.tuntap, &c->persist.duri);
1975
1976 /* run the up script if user specified --up-restart */
1977 if (c->options.up_restart)
1978 {
1979 run_up_down(c->options.up_script, c->plugins, OPENVPN_PLUGIN_UP,
1980 c->c1.tuntap->actual_name,
1981#ifdef _WIN32
1983#endif
1987 "restart", NULL, "up", c->c2.es);
1988 }
1989
1990 add_wfp_block(c);
1991 }
1992 gc_free(&gc);
1993 return ret;
1994}
1995
1996/*
1997 * Close TUN/TAP device
1998 */
1999
2000static void
2002{
2003 msg(D_CLOSE, "Closing %s interface", print_tun_backend_driver(c->c1.tuntap->backend_driver));
2004
2005 if (c->c1.tuntap)
2006 {
2008 {
2009 undo_ifconfig(c->c1.tuntap, &c->net_ctx);
2010 }
2012 {
2014 }
2015 else if (c->c1.tuntap->backend_driver == DRIVER_NULL)
2016 {
2017 free(c->c1.tuntap->actual_name);
2018 free(c->c1.tuntap);
2019 }
2020 else
2021 {
2022 close_tun(c->c1.tuntap, &c->net_ctx);
2023 }
2024 c->c1.tuntap = NULL;
2025 }
2026 c->c1.tuntap_owned = false;
2028}
2029
2030static void
2031do_close_tun(struct context *c, bool force)
2032{
2033 /* With dco-win we open tun handle in the very beginning.
2034 * In case when tun wasn't opened - like we haven't connected,
2035 * we still need to close tun handle
2036 */
2038 {
2040 return;
2041 }
2042
2043 if (!c->c1.tuntap || !c->c1.tuntap_owned)
2044 {
2045 return;
2046 }
2047
2048 struct gc_arena gc = gc_new();
2049 const char *tuntap_actual = string_alloc(c->c1.tuntap->actual_name, &gc);
2050 const in_addr_t local = c->c1.tuntap->local;
2051 const in_addr_t remote_netmask = c->c1.tuntap->remote_netmask;
2052 unsigned long adapter_index = 0;
2053#ifdef _WIN32
2054 adapter_index = c->c1.tuntap->adapter_index;
2055#endif
2056
2057 run_dns_up_down(false, &c->options, c->c1.tuntap, &c->persist.duri);
2058
2059 if (force || !(c->sig->signal_received == SIGUSR1 && c->options.persist_tun))
2060 {
2061 static_context = NULL;
2062
2063#ifdef ENABLE_MANAGEMENT
2064 /* tell management layer we are about to close the TUN/TAP device */
2065 if (management)
2066 {
2068 management_up_down(management, "DOWN", c->c2.es);
2069 }
2070#endif
2071
2072 /* delete any routes we added */
2073 if (c->c1.route_list || c->c1.route_ipv6_list)
2074 {
2075 run_up_down(c->options.route_predown_script, c->plugins, OPENVPN_PLUGIN_ROUTE_PREDOWN,
2076 tuntap_actual,
2077#ifdef _WIN32
2078 adapter_index,
2079#endif
2080 NULL, c->c2.frame.tun_mtu, print_in_addr_t(local, IA_EMPTY_IF_UNDEF, &gc),
2081 print_in_addr_t(remote_netmask, IA_EMPTY_IF_UNDEF, &gc), "init",
2083 "route-pre-down", c->c2.es);
2084
2086 ROUTE_OPTION_FLAGS(&c->options), c->c2.es, &c->net_ctx);
2087 }
2088
2089 /* actually close tun/tap device based on --down-pre flag */
2090 if (!c->options.down_pre)
2091 {
2093 }
2094
2095 /* Run the down script -- note that it will run at reduced
2096 * privilege if, for example, "--user" was used. */
2097 run_up_down(c->options.down_script, c->plugins, OPENVPN_PLUGIN_DOWN, tuntap_actual,
2098#ifdef _WIN32
2099 adapter_index,
2100#endif
2101 NULL, c->c2.frame.tun_mtu, print_in_addr_t(local, IA_EMPTY_IF_UNDEF, &gc),
2102 print_in_addr_t(remote_netmask, IA_EMPTY_IF_UNDEF, &gc), "init",
2104 c->c2.es);
2105
2106 del_wfp_block(c, adapter_index);
2107
2108 /* actually close tun/tap device based on --down-pre flag */
2109 if (c->options.down_pre)
2110 {
2112 }
2113 }
2114 else
2115 {
2116 /* run the down script on this restart if --up-restart was specified */
2117 if (c->options.up_restart)
2118 {
2119 run_up_down(c->options.down_script, c->plugins, OPENVPN_PLUGIN_DOWN, tuntap_actual,
2120#ifdef _WIN32
2121 adapter_index,
2122#endif
2123 NULL, c->c2.frame.tun_mtu, print_in_addr_t(local, IA_EMPTY_IF_UNDEF, &gc),
2124 print_in_addr_t(remote_netmask, IA_EMPTY_IF_UNDEF, &gc), "restart",
2126 c->c2.es);
2127 }
2128
2129 del_wfp_block(c, adapter_index);
2130 }
2131 gc_free(&gc);
2132}
2133
2134void
2136{
2137 struct context *c = static_context;
2138 if (c)
2139 {
2140 static_context = NULL;
2141 do_close_tun(c, true);
2142 }
2143}
2144
2145/*
2146 * Handle delayed tun/tap interface bringup due to --up-delay or --pull
2147 */
2148
2153static bool
2155{
2156 const struct sha256_digest zero = { { 0 } };
2157 return memcmp(a, b, sizeof(struct sha256_digest))
2158 || !memcmp(a, &zero, sizeof(struct sha256_digest));
2159}
2160
2166static void
2167add_delim_if_non_empty(struct buffer *buf, const char *header)
2168{
2169 if (buf_len(buf) > strlen(header))
2170 {
2171 buf_printf(buf, ", ");
2172 }
2173}
2174
2175
2180static void
2182{
2183 struct options *o = &c->options;
2184
2185 struct buffer out;
2186 uint8_t line[1024] = { 0 };
2187 buf_set_write(&out, line, sizeof(line));
2188
2189
2190 if (cipher_kt_mode_aead(o->ciphername))
2191 {
2192 buf_printf(&out, "Data Channel: cipher '%s'", cipher_kt_name(o->ciphername));
2193 }
2194 else
2195 {
2196 buf_printf(&out, "Data Channel: cipher '%s', auth '%s'", cipher_kt_name(o->ciphername),
2197 md_kt_name(o->authname));
2198 }
2199
2200 if (o->use_peer_id)
2201 {
2202 buf_printf(&out, ", peer-id: %d", o->peer_id);
2203 }
2204
2205#ifdef USE_COMP
2206 if (c->c2.comp_context)
2207 {
2208 buf_printf(&out, ", compression: '%s'", c->c2.comp_context->alg.name);
2209 }
2210#endif
2211
2212 msg(D_HANDSHAKE, "%s", BSTR(&out));
2213
2214 buf_clear(&out);
2215
2216 const char *header = "Timers: ";
2217
2218 buf_printf(&out, "%s", header);
2219
2220 if (o->ping_send_timeout)
2221 {
2222 buf_printf(&out, "ping %d", o->ping_send_timeout);
2223 }
2224
2225 if (o->ping_rec_timeout_action != PING_UNDEF)
2226 {
2227 /* yes unidirectional ping is possible .... */
2228 add_delim_if_non_empty(&out, header);
2229
2230 if (o->ping_rec_timeout_action == PING_EXIT)
2231 {
2232 buf_printf(&out, "ping-exit %d", o->ping_rec_timeout);
2233 }
2234 else
2235 {
2236 buf_printf(&out, "ping-restart %d", o->ping_rec_timeout);
2237 }
2238 }
2239
2240 if (o->inactivity_timeout)
2241 {
2242 add_delim_if_non_empty(&out, header);
2243
2244 buf_printf(&out, "inactive %d", o->inactivity_timeout);
2245 if (o->inactivity_minimum_bytes)
2246 {
2247 buf_printf(&out, " %" PRIu64, o->inactivity_minimum_bytes);
2248 }
2249 }
2250
2251 if (o->session_timeout)
2252 {
2253 add_delim_if_non_empty(&out, header);
2254 buf_printf(&out, "session-timeout %d", o->session_timeout);
2255 }
2256
2257 if (buf_len(&out) > strlen(header))
2258 {
2259 msg(D_HANDSHAKE, "%s", BSTR(&out));
2260 }
2261
2262 buf_clear(&out);
2263 header = "Protocol options: ";
2264 buf_printf(&out, "%s", header);
2265
2266 if (c->options.ce.explicit_exit_notification)
2267 {
2268 buf_printf(&out, "explicit-exit-notify %d", c->options.ce.explicit_exit_notification);
2269 }
2270 if (c->options.imported_protocol_flags)
2271 {
2272 add_delim_if_non_empty(&out, header);
2273
2274 buf_printf(&out, "protocol-flags");
2275
2276 if (o->imported_protocol_flags & CO_USE_CC_EXIT_NOTIFY)
2277 {
2278 buf_printf(&out, " cc-exit");
2279 }
2280 if (o->imported_protocol_flags & CO_USE_TLS_KEY_MATERIAL_EXPORT)
2281 {
2282 buf_printf(&out, " tls-ekm");
2283 }
2284 if (o->imported_protocol_flags & CO_USE_DYNAMIC_TLS_CRYPT)
2285 {
2286 buf_printf(&out, " dyn-tls-crypt");
2287 }
2288 if (o->imported_protocol_flags & CO_EPOCH_DATA_KEY_FORMAT)
2289 {
2290 buf_printf(&out, " aead-epoch");
2291 }
2292 }
2293
2294 if (buf_len(&out) > strlen(header))
2295 {
2296 msg(D_HANDSHAKE, "%s", BSTR(&out));
2297 }
2298}
2299
2300
2308static bool
2310{
2311 struct frame *frame_fragment = NULL;
2312#ifdef ENABLE_FRAGMENT
2313 if (c->options.ce.fragment)
2314 {
2315 frame_fragment = &c->c2.frame_fragment;
2316 }
2317#endif
2318
2321 frame_fragment, get_link_socket_info(c),
2322 &c->c1.tuntap->dco))
2323 {
2324 msg(D_TLS_ERRORS, "OPTIONS ERROR: failed to import crypto options");
2325 return false;
2326 }
2327
2328 return true;
2329}
2330
2331bool
2332do_up(struct context *c, bool pulled_options, unsigned int option_types_found)
2333{
2334 int error_flags = 0;
2335 if (!c->c2.do_up_ran)
2336 {
2338
2339 if (pulled_options)
2340 {
2341 if (!do_deferred_options(c, option_types_found, false))
2342 {
2343 msg(D_PUSH_ERRORS, "ERROR: Failed to apply push options");
2344 return false;
2345 }
2346 }
2347
2348 /* if --up-delay specified, open tun, do ifconfig, and run up script now */
2349 if (c->options.up_delay || PULL_DEFINED(&c->options))
2350 {
2351 c->c2.did_open_tun = do_open_tun(c, &error_flags);
2352 update_time();
2353
2354 /*
2355 * Was tun interface object persisted from previous restart iteration,
2356 * and if so did pulled options string change from previous iteration?
2357 */
2358 if (!c->c2.did_open_tun && PULL_DEFINED(&c->options) && c->c1.tuntap
2361 {
2362 /* if so, close tun, delete routes, then reinitialize tun and add routes */
2363 msg(M_INFO,
2364 "NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.");
2365
2366 bool tt_dco_win = tuntap_is_dco_win(c->c1.tuntap);
2367 do_close_tun(c, true);
2368
2369 if (tt_dco_win)
2370 {
2371 msg(M_NONFATAL, "dco-win doesn't yet support reopening TUN device");
2372 /* prevent link_socket_close() from closing handle with WinSock API */
2374 return false;
2375 }
2376 else
2377 {
2379 c->c2.did_open_tun = do_open_tun(c, &error_flags);
2380 update_time();
2381 }
2382 }
2383 }
2384 }
2385
2386 /* This part needs to be run in p2p mode (without pull) when the client
2387 * reconnects to setup various things (like DCO and NCP cipher) that
2388 * might have changed from the previous connection.
2389 */
2390 if (!c->c2.do_up_ran
2392 {
2393 if (c->mode == MODE_POINT_TO_POINT)
2394 {
2395 /* ovpn-dco requires adding the peer now, before any option can be set,
2396 * but *after* having parsed the pushed peer-id in do_deferred_options()
2397 */
2398 int ret = dco_p2p_add_new_peer(c);
2399 if (ret < 0)
2400 {
2401 msg(D_DCO, "Cannot add peer to DCO: %s (%d)", strerror(-ret), ret);
2402 return false;
2403 }
2404 }
2405
2406 /* do_deferred_options_part2() and do_deferred_p2p_ncp() *must* be
2407 * invoked after open_tun().
2408 * This is required by DCO because we must have created the interface
2409 * and added the peer before we can fiddle with the keys or any other
2410 * data channel per-peer setting.
2411 */
2412 if (pulled_options)
2413 {
2415 {
2416 return false;
2417 }
2418 }
2419 else
2420 {
2421 if (c->mode == MODE_POINT_TO_POINT)
2422 {
2423 if (!do_deferred_p2p_ncp(c))
2424 {
2425 msg(D_TLS_ERRORS, "ERROR: Failed to apply P2P negotiated protocol options");
2426 return false;
2427 }
2428 }
2429 }
2430
2431 if (c->c2.did_open_tun)
2432 {
2434
2435 /* if --route-delay was specified, start timer */
2437 {
2442 }
2443 else
2444 {
2445 /* client/p2p --route-delay undefined */
2446 initialization_sequence_completed(c, error_flags);
2447 }
2448 }
2449 else if (c->options.mode == MODE_POINT_TO_POINT)
2450 {
2451 /* client/p2p restart with --persist-tun */
2452 initialization_sequence_completed(c, error_flags);
2453 }
2454
2456
2457 c->c2.do_up_ran = true;
2458 if (c->c2.tls_multi)
2459 {
2461 }
2462 }
2463 return true;
2464}
2465
2466bool
2467do_update(struct context *c, unsigned int option_types_found)
2468{
2469 /* Not necessary since to receive the update the openvpn
2470 * instance must be up and running but just in case
2471 */
2472 if (!c->c2.do_up_ran)
2473 {
2474 return false;
2475 }
2476
2477 bool tt_dco_win = tuntap_is_dco_win(c->c1.tuntap);
2478 if (tt_dco_win)
2479 {
2480 msg(M_NONFATAL, "dco-win doesn't yet support reopening TUN device");
2481 return false;
2482 }
2483
2484 if (!do_deferred_options(c, option_types_found, true))
2485 {
2486 msg(D_PUSH_ERRORS, "ERROR: Failed to apply push options");
2487 return false;
2488 }
2489
2490 do_close_tun(c, true);
2491
2493 int error_flags = 0;
2494 c->c2.did_open_tun = do_open_tun(c, &error_flags);
2495 update_time();
2496
2497 if (c->c2.did_open_tun)
2498 {
2499 /* if --route-delay was specified, start timer */
2501 {
2506 }
2507
2508 initialization_sequence_completed(c, error_flags);
2509 }
2510
2512
2513 return true;
2514}
2515
2516/*
2517 * These are the option categories which will be accepted by pull.
2518 */
2519unsigned int
2521{
2522 unsigned int flags = OPT_P_UP | OPT_P_ROUTE_EXTRAS | OPT_P_SOCKBUF | OPT_P_SOCKFLAGS
2526
2527 if (!c->options.route_nopull)
2528 {
2529 flags |= (OPT_P_ROUTE | OPT_P_DHCPDNS);
2530 }
2531
2532 return flags;
2533}
2534
2535static bool
2537{
2538 if (!c->c2.tls_multi)
2539 {
2540 return true;
2541 }
2542
2544
2546
2547 const char *ncp_cipher =
2549
2550 if (ncp_cipher)
2551 {
2552 c->options.ciphername = ncp_cipher;
2553 }
2554 else if (!c->options.enable_ncp_fallback)
2555 {
2556 msg(D_TLS_ERRORS, "ERROR: failed to negotiate cipher with peer and "
2557 "--data-ciphers-fallback not enabled. No usable "
2558 "data channel cipher");
2559 return false;
2560 }
2561
2562 struct frame *frame_fragment = NULL;
2563#ifdef ENABLE_FRAGMENT
2564 if (c->options.ce.fragment)
2565 {
2566 frame_fragment = &c->c2.frame_fragment;
2567 }
2568#endif
2569
2571 frame_fragment, get_link_socket_info(c),
2572 &c->c1.tuntap->dco))
2573 {
2574 msg(D_TLS_ERRORS, "ERROR: failed to set crypto cipher");
2575 return false;
2576 }
2577 return true;
2578}
2579
2580bool
2581do_deferred_options(struct context *c, const unsigned int found, const bool is_update)
2582{
2583 if (found & OPT_P_MESSAGES)
2584 {
2586 msg(D_PUSH, "OPTIONS IMPORT: --verb and/or --mute level changed");
2587 }
2588 if (found & OPT_P_TIMER)
2589 {
2590 do_init_timers(c, true);
2591 msg(D_PUSH_DEBUG, "OPTIONS IMPORT: timers and/or timeouts modified");
2592 }
2593
2594 if (found & OPT_P_EXPLICIT_NOTIFY)
2595 {
2596 /* Client side, so just check the first link_socket */
2599 {
2600 msg(D_PUSH, "OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp");
2602 }
2603 else
2604 {
2605 msg(D_PUSH_DEBUG, "OPTIONS IMPORT: explicit notify parm(s) modified");
2606 }
2607 }
2608
2609 if (found & OPT_P_COMP)
2610 {
2612 {
2613 msg(D_PUSH_ERRORS, "OPTIONS ERROR: server pushed compression "
2614 "settings that are not allowed and will result "
2615 "in a non-working connection. "
2616 "See also allow-compression in the manual.");
2617 return false;
2618 }
2619#ifdef USE_COMP
2620 msg(D_PUSH_DEBUG, "OPTIONS IMPORT: compression parms modified");
2621 comp_uninit(c->c2.comp_context);
2622 c->c2.comp_context = comp_init(&c->options.comp);
2623#endif
2624 }
2625
2626 if (found & OPT_P_SHAPER)
2627 {
2628 msg(D_PUSH, "OPTIONS IMPORT: traffic shaper enabled");
2630 }
2631
2632 if (found & OPT_P_SOCKBUF)
2633 {
2634 msg(D_PUSH, "OPTIONS IMPORT: --sndbuf/--rcvbuf options modified");
2635
2636 for (int i = 0; i < c->c1.link_sockets_num; i++)
2637 {
2639 c->options.sndbuf);
2640 }
2641 }
2642
2643 if (found & OPT_P_SOCKFLAGS)
2644 {
2645 msg(D_PUSH, "OPTIONS IMPORT: --socket-flags option modified");
2646 for (int i = 0; i < c->c1.link_sockets_num; i++)
2647 {
2649 }
2650 }
2651
2652 if (found & OPT_P_PERSIST)
2653 {
2654 msg(D_PUSH, "OPTIONS IMPORT: --persist options modified");
2655 }
2656 if (found & OPT_P_UP)
2657 {
2658 msg(D_PUSH, "OPTIONS IMPORT: --ifconfig/up options modified");
2659 }
2660 if (found & OPT_P_ROUTE)
2661 {
2662 msg(D_PUSH, "OPTIONS IMPORT: route options modified");
2663 }
2664 if (found & OPT_P_ROUTE_EXTRAS)
2665 {
2666 msg(D_PUSH, "OPTIONS IMPORT: route-related options modified");
2667 }
2668 if (found & OPT_P_DHCPDNS)
2669 {
2670 msg(D_PUSH, "OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified");
2671 }
2672 if (found & OPT_P_SETENV)
2673 {
2674 msg(D_PUSH, "OPTIONS IMPORT: environment modified");
2675 }
2676
2677 if (found & OPT_P_PEER_ID)
2678 {
2679 msg(D_PUSH_DEBUG, "OPTIONS IMPORT: peer-id set");
2680 c->c2.tls_multi->use_peer_id = true;
2682 }
2683
2684 /* process (potentially) pushed options */
2685 if (c->options.pull)
2686 {
2687 /* On PUSH_UPDATE, NCP related flags are never updated, and so the code
2688 * would assume "no cipher pushed = NCP failed" - so, don't call it on
2689 * updates */
2690 if (!is_update && !check_pull_client_ncp(c, found))
2691 {
2692 return false;
2693 }
2694
2695 /* Check if pushed options are compatible with DCO, if enabled */
2697 {
2698 msg(D_PUSH_ERRORS, "OPTIONS ERROR: pushed options are incompatible "
2699 "with data channel offload. Use --disable-dco to connect to "
2700 "this server");
2701 return false;
2702 }
2703 }
2704
2705 /* Ensure that for epoch data format is only enabled if also data v2
2706 * is enabled */
2708 bool datav2_enabled = c->options.use_peer_id && c->options.peer_id < MAX_PEER_ID;
2709
2710 if (epoch_data && !datav2_enabled)
2711 {
2712 msg(D_PUSH_ERRORS, "OPTIONS ERROR: Epoch key data format tag requires "
2713 "data v2 (peer-id) to be enabled.");
2714 return false;
2715 }
2716
2717
2718 if (found & OPT_P_PUSH_MTU)
2719 {
2720 /* MTU has changed, check that the pushed MTU is small enough to
2721 * be able to change it */
2722 msg(D_PUSH, "OPTIONS IMPORT: tun-mtu set to %d", c->options.ce.tun_mtu);
2723
2724 struct frame *frame = &c->c2.frame;
2725
2727 {
2729 "Server-pushed tun-mtu is too large, please add "
2730 "tun-mtu-max %d in the client configuration",
2731 c->options.ce.tun_mtu);
2732 }
2734 }
2735
2736 return true;
2737}
2738
2739/*
2740 * Possible hold on initialization, holdtime is the
2741 * time OpenVPN would wait without management
2742 */
2743static bool
2744do_hold(int holdtime)
2745{
2746#ifdef ENABLE_MANAGEMENT
2747 if (management)
2748 {
2749 /* block until management hold is released */
2750 if (management_hold(management, holdtime))
2751 {
2752 return true;
2753 }
2754 }
2755#endif
2756 return false;
2757}
2758
2759/*
2760 * Sleep before restart.
2761 */
2762static void
2764{
2765 int sec = 2;
2766 int backoff = 0;
2767
2768 switch (c->mode)
2769 {
2770 case CM_TOP:
2771 sec = 1;
2772 break;
2773
2774 case CM_CHILD_UDP:
2775 case CM_CHILD_TCP:
2777 break;
2778 }
2779
2780#ifdef ENABLE_DEBUG
2781 if (GREMLIN_CONNECTION_FLOOD_LEVEL(c->options.gremlin))
2782 {
2783 sec = 0;
2784 }
2785#endif
2786
2788 {
2789 sec = 10;
2790 }
2791
2792 /* Slow down reconnection after 5 retries per remote -- for TCP client or UDP tls-client only */
2793 if (c->mode == CM_CHILD_TCP || (c->options.ce.proto == PROTO_UDP && c->options.tls_client))
2794 {
2795 backoff = (c->options.unsuccessful_attempts / c->options.connection_list->len) - 4;
2796 if (backoff > 0)
2797 {
2798 /* sec is less than 2^16; we can left shift it by up to 15 bits without overflow */
2799 sec = max_int(sec, 1) << min_int(backoff, 15);
2800 }
2802 {
2803 sec = max_int(sec, c->options.server_backoff_time);
2805 }
2806
2808 {
2810 }
2811 }
2812
2814 {
2816 }
2817 else if (c->persist.restart_sleep_seconds == -1)
2818 {
2819 sec = 0;
2820 }
2822
2823 /* do management hold on context restart, i.e. second, third, fourth, etc. initialization */
2824 if (do_hold(sec))
2825 {
2826 sec = 0;
2827 }
2828
2829 if (sec)
2830 {
2831 msg(D_RESTART, "Restart pause, %d second(s)", sec);
2832 management_sleep(sec);
2833 }
2834}
2835
2836/*
2837 * Do a possible pause on context_2 initialization.
2838 */
2839static void
2841{
2842 if (!c->first_time)
2843 {
2845 }
2846 else
2847 {
2848 do_hold(0); /* do management hold on first context initialization */
2849 }
2850}
2851
2852static size_t
2853get_frame_mtu(struct context *c, const struct options *o)
2854{
2855 size_t mtu;
2856
2857 if (o->ce.link_mtu_defined)
2858 {
2860 /* if we have a link mtu defined we calculate what the old code
2861 * would have come up with as tun-mtu */
2862 size_t overhead = frame_calculate_protocol_header_size(&c->c1.ks.key_type, o, true);
2863 mtu = o->ce.link_mtu - overhead;
2864 }
2865 else
2866 {
2868 mtu = o->ce.tun_mtu;
2869 }
2870
2871 if (mtu < TUN_MTU_MIN)
2872 {
2873 msg(M_WARN, "TUN MTU value (%zu) must be at least %d", mtu, TUN_MTU_MIN);
2874 frame_print(&c->c2.frame, M_FATAL, "MTU is too small");
2875 }
2876 return mtu;
2877}
2878
2879/*
2880 * Finalize MTU parameters based on command line or config file options.
2881 */
2882static void
2883frame_finalize_options(struct context *c, const struct options *o)
2884{
2885 if (!o)
2886 {
2887 o = &c->options;
2888 }
2889
2890 struct frame *frame = &c->c2.frame;
2891
2892 frame->tun_mtu = get_frame_mtu(c, o);
2894
2895 /* max mtu needs to be at least as large as the tun mtu */
2897
2898 /* We always allow at least 1600 MTU packets to be received in our buffer
2899 * space to allow server to push "baby giant" MTU sizes */
2901
2902 size_t payload_size = frame->tun_max_mtu;
2903
2904 /* we need to be also large enough to hold larger control channel packets
2905 * if configured */
2907
2908 /* The extra tun needs to be added to the payload size */
2909 if (o->ce.tun_mtu_defined)
2910 {
2912 }
2913
2914 /* Add 32 byte of extra space in the buffer to account for small errors
2915 * in the calculation */
2916 payload_size += 32;
2917
2918
2919 /* the space that is reserved before the payload to add extra headers to it
2920 * we always reserve the space for the worst case */
2921 size_t headroom = 0;
2922
2923 /* includes IV and packet ID */
2925
2926 /* peer id + opcode */
2927 headroom += 4;
2928
2929 /* socks proxy header */
2931
2932 /* compression header and fragment header (part of the encrypted payload) */
2933 headroom += 1 + 1;
2934
2935 /* Round up headroom to the next multiple of 4 to ensure alignment */
2936 headroom = (headroom + 3) & ~3;
2937
2938 /* Add the headroom to the payloadsize as a received (IP) packet can have
2939 * all the extra headers in it */
2941
2942 /* the space after the payload, this needs some extra buffer space for
2943 * encryption so headroom is probably too much but we do not really care
2944 * the few extra bytes */
2945 size_t tailroom = headroom;
2946
2947#ifdef USE_COMP
2949 "MTU: adding %zu buffer tailroom for compression for %zu "
2950 "bytes of payload",
2951 COMP_EXTRA_BUFFER(payload_size), payload_size);
2952 tailroom += COMP_EXTRA_BUFFER(payload_size);
2953#endif
2954
2958}
2959
2960/*
2961 * Free a key schedule, including OpenSSL components.
2962 */
2963static void
2964key_schedule_free(struct key_schedule *ks, bool free_ssl_ctx)
2965{
2967 if (tls_ctx_initialised(ks->ssl_ctx) && free_ssl_ctx)
2968 {
2969 tls_ctx_free(ks->ssl_ctx);
2970 free(ks->ssl_ctx);
2972 }
2973 CLEAR(*ks);
2974}
2975
2976static void
2977init_crypto_pre(struct context *c, const unsigned int flags)
2978{
2979 if (c->options.engine)
2980 {
2982 }
2983
2984 if (flags & CF_LOAD_PERSISTED_PACKET_ID)
2985 {
2986 /* load a persisted packet-id for cross-session replay-protection */
2987 if (c->options.packet_id_file)
2988 {
2990 }
2991 }
2992
2993#ifdef ENABLE_PREDICTION_RESISTANCE
2994 if (c->options.use_prediction_resistance)
2995 {
2996 rand_ctx_enable_prediction_resistance();
2997 }
2998#endif
2999}
3000
3001
3002static void
3004{
3005 const struct options *options = &c->options;
3007
3008 init_crypto_pre(c, 0);
3009
3011
3012 /* Initialize packet ID tracking */
3014 "STATIC", 0);
3015
3017
3018 /* Init cipher and hash algorithm */
3020 options->test_crypto, true);
3021
3023 "test crypto key");
3024
3025 /* Get key schedule */
3027}
3028
3029/*
3030 * Static Key Mode (using a pre-shared key)
3031 */
3032static void
3033do_init_crypto_static(struct context *c, const unsigned int flags)
3034{
3035 const struct options *options = &c->options;
3037
3038 init_crypto_pre(c, flags);
3039
3040 /* Initialize flags */
3042 {
3044 }
3045
3046 /* Initialize packet ID tracking */
3048 "STATIC", 0);
3052
3054 {
3055 /* Get cipher & hash algorithms */
3057 options->test_crypto, true);
3058
3059 /* Read cipher and hmac keys from shared secret file */
3062 options->key_direction, "Static Key Encryption", "secret", NULL);
3063 }
3064 else
3065 {
3066 msg(M_INFO, "Re-using pre-shared static key");
3067 }
3068
3069 /* Get key schedule */
3071}
3072
3073/*
3074 * Initialize the tls-auth/crypt key context
3075 */
3076static void
3078{
3079 const struct options *options = &c->options;
3080
3081 /* TLS handshake authentication (--tls-auth) */
3083 {
3084 /* Initialize key_type for tls-auth with auth only */
3086 c->c1.ks.tls_auth_key_type.cipher = "none";
3088 if (!md_valid(options->authname))
3089 {
3090 msg(M_FATAL,
3091 "ERROR: tls-auth enabled, but no valid --auth "
3092 "algorithm specified ('%s')",
3093 options->authname);
3094 }
3095
3098 options->ce.key_direction, "Control Channel Authentication",
3099 "tls-auth", &c->c1.ks.original_wrap_keydata);
3100 }
3101
3102 /* TLS handshake encryption+authentication (--tls-crypt) */
3104 {
3108 }
3109
3110 /* tls-crypt with client-specific keys (--tls-crypt-v2) */
3112 {
3113 if (options->tls_server)
3114 {
3118 }
3119 else
3120 {
3124 }
3125 /* We have to ensure that the loaded tls-crypt key is small enough
3126 * to fit into the initial hard reset v3 packet */
3127 int wkc_len = buf_len(&c->c1.ks.tls_crypt_v2_wkc);
3128
3129 /* empty ACK/message id, tls-crypt, Opcode, UDP, ipv6 */
3130 int required_size = 5 + wkc_len + tls_crypt_buf_overhead() + 1 + 8 + 40;
3131
3132 if (required_size > c->options.ce.tls_mtu)
3133 {
3134 msg(M_WARN,
3135 "ERROR: tls-crypt-v2 client key too large to work with "
3136 "requested --max-packet-size %d, requires at least "
3137 "--max-packet-size %d. Packets will ignore requested "
3138 "maximum packet size",
3139 c->options.ce.tls_mtu, required_size);
3140 }
3141 }
3142}
3143
3144/*
3145 * Initialize the persistent component of OpenVPN's TLS mode,
3146 * which is preserved across SIGUSR1 resets.
3147 */
3148static void
3150{
3151 const struct options *options = &c->options;
3152
3154 {
3155 /*
3156 * Initialize the OpenSSL library's global
3157 * SSL context.
3158 */
3159 ASSERT(NULL == c->c1.ks.ssl_ctx);
3162 {
3163 switch (auth_retry_get())
3164 {
3165 case AR_NONE:
3166 msg(M_FATAL, "Error: private key password verification failed");
3167 break;
3168
3169 case AR_INTERACT:
3170 ssl_purge_auth(false);
3171 /* Intentional [[fallthrough]]; */
3172
3173 case AR_NOINTERACT:
3174 /* SOFT-SIGUSR1 -- Password failure error */
3175 register_signal(c->sig, SIGUSR1, "private-key-password-failure");
3176 break;
3177
3178 default:
3179 ASSERT(0);
3180 }
3181 return;
3182 }
3183
3184 /*
3185 * BF-CBC is allowed to be used only when explicitly configured
3186 * as NCP-fallback or when NCP has been disabled or explicitly
3187 * allowed in the in ncp_ciphers list.
3188 * In all other cases do not attempt to initialize BF-CBC as it
3189 * may not even be supported by the underlying SSL library.
3190 *
3191 * Therefore, the key structure has to be initialized when:
3192 * - any non-BF-CBC cipher was selected; or
3193 * - BF-CBC is selected, NCP is enabled and fallback is enabled
3194 * (BF-CBC will be the fallback).
3195 * - BF-CBC is in data-ciphers and we negotiate to use BF-CBC:
3196 * If the negotiated cipher and options->ciphername are the
3197 * same we do not reinit the cipher
3198 *
3199 * Note that BF-CBC will still be part of the OCC string to retain
3200 * backwards compatibility with older clients.
3201 */
3202 const char *ciphername = options->ciphername;
3203 if (streq(options->ciphername, "BF-CBC")
3206 {
3207 ciphername = "none";
3208 }
3209
3210 /* Do not warn if the cipher is used only in OCC */
3211 bool warn = options->enable_ncp_fallback;
3213
3214 /* initialize tls-auth/crypt/crypt-v2 key */
3216
3217 /* initialise auth-token crypto support */
3219 {
3222 }
3223
3224#if 0 /* was: #if ENABLE_INLINE_FILES -- Note that enabling this code will break restarts */
3226 {
3228 c->options.priv_key_file_inline = NULL;
3229 }
3230#endif
3231 }
3232 else
3233 {
3234 msg(D_INIT_MEDIUM, "Re-using SSL/TLS context");
3235
3236 /*
3237 * tls-auth/crypt key can be configured per connection block, therefore
3238 * we must reload it as it may have changed
3239 */
3241 }
3242}
3243
3244static void
3245do_init_crypto_tls(struct context *c, const unsigned int flags)
3246{
3247 const struct options *options = &c->options;
3248 struct tls_options to;
3249 bool packet_id_long_form;
3250
3253
3254 init_crypto_pre(c, flags);
3255
3256 /* Make sure we are either a TLS client or server but not both */
3258
3259 /* initialize persistent component */
3261 if (IS_SIG(c))
3262 {
3263 return;
3264 }
3265
3266 /* In short form, unique datagram identifier is 32 bits, in long form 64 bits */
3267 packet_id_long_form = cipher_kt_mode_ofb_cfb(c->c1.ks.key_type.cipher);
3268
3269 /* Set all command-line TLS-related options */
3270 CLEAR(to);
3271
3273 {
3275 }
3276
3278 if (packet_id_long_form)
3279 {
3281 }
3282
3283 to.ssl_ctx = c->c1.ks.ssl_ctx;
3284 to.key_type = c->c1.ks.key_type;
3296 {
3297 /* Add 10% jitter to reneg-sec by default (server side only) */
3298 int auto_jitter = options->mode != MODE_SERVER
3299 ? 0
3302 }
3303 else
3304 {
3305 /* Add user-specified jitter to reneg-sec */
3308 - (get_random()
3310 }
3312 to.mode = options->mode;
3313 to.pull = options->pull;
3314 if (options->push_peer_info) /* all there is */
3315 {
3316 to.push_peer_info_detail = 3;
3317 }
3318 else if (options->pull) /* pull clients send some details */
3319 {
3320 to.push_peer_info_detail = 2;
3321 }
3322 else if (options->mode == MODE_SERVER) /* server: no peer info at all */
3323 {
3324 to.push_peer_info_detail = 0;
3325 }
3326 else /* default: minimal info to allow NCP in P2P mode */
3327 {
3328 to.push_peer_info_detail = 1;
3329 }
3330
3331 /* Check if the DCO drivers support the epoch data format */
3332 if (dco_enabled(options))
3333 {
3335 }
3336 else
3337 {
3338 to.data_epoch_supported = true;
3339 }
3340
3341 /* should we not xmit any packets until we get an initial
3342 * response from client? */
3343 if (to.server && c->mode == CM_CHILD_TCP)
3344 {
3345 to.xmit_hold = true;
3346 }
3347
3355 memcpy(to.remote_cert_ku, options->remote_cert_ku, sizeof(to.remote_cert_ku));
3362 to.es = c->c2.es;
3363 to.net_ctx = &c->net_ctx;
3364
3365#ifdef ENABLE_DEBUG
3366 to.gremlin = c->options.gremlin;
3367#endif
3368
3369 to.plugins = c->plugins;
3370
3371#ifdef ENABLE_MANAGEMENT
3372 to.mda_context = &c->c2.mda_context;
3373#endif
3374
3378 to.tmp_dir = options->tmp_dir;
3381 {
3383 }
3391
3393
3394#ifdef ENABLE_MANAGEMENT
3395 to.sci = &options->sc_info;
3396#endif
3397
3398#ifdef USE_COMP
3399 to.comp_options = options->comp;
3400#endif
3401
3403 {
3405 if (to.ekm_size < 16 || to.ekm_size > 4095)
3406 {
3407 to.ekm_size = 0;
3408 }
3409
3411 to.ekm_label_size = strlen(to.ekm_label);
3412 }
3413 else
3414 {
3415 to.ekm_size = 0;
3416 }
3417
3418 /* TLS handshake authentication (--tls-auth) */
3420 {
3421 to.tls_wrap.mode = TLS_WRAP_AUTH;
3422 }
3423
3424 /* TLS handshake encryption (--tls-crypt) */
3426 {
3427 to.tls_wrap.mode = TLS_WRAP_CRYPT;
3428 }
3429
3430 if (to.tls_wrap.mode == TLS_WRAP_AUTH || to.tls_wrap.mode == TLS_WRAP_CRYPT)
3431 {
3436 }
3437
3439 {
3440 to.tls_crypt_v2 = true;
3442
3443 if (options->tls_server)
3444 {
3449 {
3451 }
3452 }
3453 }
3454
3455 /* let the TLS engine know if keys have to be installed in DCO or not */
3457
3458 /*
3459 * Initialize OpenVPN's master TLS-mode object.
3460 */
3461 if (flags & CF_INIT_TLS_MULTI)
3462 {
3463 c->c2.tls_multi = tls_multi_init(&to);
3464 /* inherit the dco context from the tuntap object */
3465 if (c->c1.tuntap)
3466 {
3467 c->c2.tls_multi->dco = &c->c1.tuntap->dco;
3468 }
3469 }
3470
3471 if (flags & CF_INIT_TLS_AUTH_STANDALONE)
3472 {
3475 }
3476}
3477
3478static void
3480{
3481 if (c->c2.tls_multi)
3482 {
3485 frame_print(&c->c2.tls_multi->opt.frame, D_MTU_INFO, "Control Channel MTU parms");
3486
3487 /* Keep the max mtu also in the frame of tls multi so it can access
3488 * it in push_peer_info */
3490 }
3491 if (c->c2.tls_auth_standalone)
3492 {
3494 c->options.ce.tls_mtu);
3495 frame_print(&c->c2.tls_auth_standalone->frame, D_MTU_INFO, "TLS-Auth MTU parms");
3498 }
3499}
3500
3501#if defined(__GNUC__) || defined(__clang__)
3502#pragma GCC diagnostic pop
3503#endif
3504
3505/*
3506 * No encryption or authentication.
3507 */
3508static void
3510{
3512
3513 /* Initialise key_type with auth/cipher "none", so the key_type struct is
3514 * valid */
3515 init_key_type(&c->c1.ks.key_type, "none", "none", c->options.test_crypto, true);
3516
3517 msg(M_WARN, "******* WARNING *******: All encryption and authentication features "
3518 "disabled -- All data will be tunnelled as clear text and will not be "
3519 "protected against man-in-the-middle changes. "
3520 "PLEASE DO RECONSIDER THIS CONFIGURATION!");
3521}
3522
3523static void
3524do_init_crypto(struct context *c, const unsigned int flags)
3525{
3527 {
3528 do_init_crypto_static(c, flags);
3529 }
3530 else if (c->options.tls_server || c->options.tls_client)
3531 {
3532 do_init_crypto_tls(c, flags);
3533 }
3534 else /* no encryption or authentication. */
3535 {
3537 }
3538}
3539
3540static void
3542{
3543 /*
3544 * Adjust frame size based on the --tun-mtu-extra parameter.
3545 */
3547 {
3549 }
3550
3551 /*
3552 * Fill in the blanks in the frame parameters structure,
3553 * make sure values are rational, etc.
3554 */
3555 frame_finalize_options(c, NULL);
3556
3557
3558#if defined(ENABLE_FRAGMENT)
3559 /*
3560 * MTU advisories
3561 */
3562 if (c->options.ce.fragment && c->options.mtu_test)
3563 {
3564 msg(M_WARN,
3565 "WARNING: using --fragment and --mtu-test together may produce an inaccurate MTU test result");
3566 }
3567#endif
3568
3569#ifdef ENABLE_FRAGMENT
3570 if (c->options.ce.fragment > 0 && c->options.ce.mssfix > c->options.ce.fragment)
3571 {
3572 msg(M_WARN,
3573 "WARNING: if you use --mssfix and --fragment, you should "
3574 "set --fragment (%d) larger or equal than --mssfix (%d)",
3576 }
3577 if (c->options.ce.fragment > 0 && c->options.ce.mssfix > 0
3579 {
3580 msg(M_WARN, "WARNING: if you use --mssfix and --fragment, you should "
3581 "use the \"mtu\" flag for both or none of of them.");
3582 }
3583#endif
3584}
3585
3586static void
3588{
3589 const struct options *o = &c->options;
3590
3591 if (o->ping_send_timeout && !o->ping_rec_timeout)
3592 {
3593 msg(M_WARN, "WARNING: --ping should normally be used with --ping-restart or --ping-exit");
3594 }
3595
3596 if (o->username || o->groupname || o->chroot_dir
3597#ifdef ENABLE_SELINUX
3598 || o->selinux_context
3599#endif
3600 )
3601 {
3602 if (!o->persist_tun)
3603 {
3604 msg(M_WARN,
3605 "WARNING: you are using user/group/chroot/setcon without persist-tun -- this may cause restarts to fail");
3606 }
3607 }
3608
3609 if (o->chroot_dir && !(o->username && o->groupname))
3610 {
3611 msg(M_WARN,
3612 "WARNING: you are using chroot without specifying user and group -- this may cause the chroot jail to be insecure");
3613 }
3614
3615 if (o->pull && o->ifconfig_local && c->first_time)
3616 {
3617 msg(M_WARN,
3618 "WARNING: using --pull/--client and --ifconfig together is probably not what you want");
3619 }
3620
3622 {
3623 msg(M_WARN,
3624 "NOTE: when bridging your LAN adapter with the TAP adapter, note that the new bridge adapter will often take on its own IP address that is different from what the LAN adapter was previously set to");
3625 }
3626
3627 if (o->mode == MODE_SERVER)
3628 {
3629 if (o->duplicate_cn && o->client_config_dir)
3630 {
3631 msg(M_WARN,
3632 "WARNING: using --duplicate-cn and --client-config-dir together is probably not what you want");
3633 }
3635 {
3636 msg(M_WARN, "WARNING: --ifconfig-pool-persist will not work with --duplicate-cn");
3637 }
3638 if (!o->keepalive_ping || !o->keepalive_timeout)
3639 {
3640 msg(M_WARN, "WARNING: --keepalive option is missing from server config");
3641 }
3642 }
3643
3644 if (o->tls_server)
3645 {
3647 }
3650 && !(o->verify_hash_depth == 0 && o->verify_hash))
3651 {
3652 msg(M_WARN,
3653 "WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.");
3654 }
3655 if (o->ns_cert_type)
3656 {
3657 msg(M_WARN, "WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.");
3658 }
3659
3660 /* If a script is used, print appropriate warnings */
3661 if (o->user_script_used)
3662 {
3664 {
3665 msg(M_WARN,
3666 "NOTE: the current --script-security setting may allow this configuration to call user-defined scripts");
3667 }
3668 else if (script_security() >= SSEC_PW_ENV)
3669 {
3670 msg(M_WARN,
3671 "WARNING: the current --script-security setting may allow passwords to be passed to scripts via environmental variables");
3672 }
3673 else
3674 {
3675 msg(M_WARN,
3676 "NOTE: starting with " PACKAGE_NAME
3677 " 2.1, '--script-security 2' or higher is required to call user-defined scripts or executables");
3678 }
3679 }
3680}
3681
3682struct context_buffers *
3684{
3685 struct context_buffers *b;
3686
3688
3689 size_t buf_size = BUF_SIZE(frame);
3690
3691 b->read_link_buf = alloc_buf(buf_size);
3692 b->read_tun_buf = alloc_buf(buf_size);
3693
3694 b->aux_buf = alloc_buf(buf_size);
3695
3696 b->encrypt_buf = alloc_buf(buf_size);
3697 b->decrypt_buf = alloc_buf(buf_size);
3698
3699#ifdef USE_COMP
3700 b->compress_buf = alloc_buf(buf_size);
3701 b->decompress_buf = alloc_buf(buf_size);
3702#endif
3703
3704 return b;
3705}
3706
3707void
3709{
3710 if (b)
3711 {
3714 free_buf(&b->aux_buf);
3715
3716#ifdef USE_COMP
3717 free_buf(&b->compress_buf);
3718 free_buf(&b->decompress_buf);
3719#endif
3720
3721 free_buf(&b->encrypt_buf);
3722 free_buf(&b->decrypt_buf);
3723
3724 free(b);
3725 }
3726}
3727
3728/*
3729 * Now that we know all frame parameters, initialize
3730 * our buffers.
3731 */
3732static void
3734{
3736 c->c2.buffers_owned = true;
3737}
3738
3739#ifdef ENABLE_FRAGMENT
3740/*
3741 * Fragmenting code has buffers to initialize
3742 * once frame parameters are known.
3743 */
3744static void
3746{
3748
3749 /*
3750 * Set frame parameter for fragment code. This is necessary because
3751 * the fragmentation code deals with payloads which have already been
3752 * passed through the compression code.
3753 */
3754 c->c2.frame_fragment = c->c2.frame;
3755
3759}
3760#endif
3761
3762/*
3763 * Allocate our socket object.
3764 */
3765static void
3767{
3768 ASSERT(!c->c2.link_sockets);
3769
3771
3772 for (int i = 0; i < c->c1.link_sockets_num; i++)
3773 {
3775 }
3776 c->c2.link_socket_owned = true;
3777}
3778
3779/*
3780 * bind TCP/UDP sockets
3781 */
3782static void
3784{
3785 for (int i = 0; i < c->c1.link_sockets_num; i++)
3786 {
3787 int mode = LS_MODE_DEFAULT;
3788
3789 /* mode allows CM_CHILD_TCP
3790 * instances to inherit acceptable fds
3791 * from a top-level parent */
3792 if (c->options.mode == MODE_SERVER)
3793 {
3794 /* initializing listening socket */
3795 if (c->mode == CM_TOP)
3796 {
3797 mode = LS_MODE_TCP_LISTEN;
3798 }
3799 /* initializing socket to client */
3800 else if (c->mode == CM_CHILD_TCP)
3801 {
3803 }
3804 }
3805
3806 /* init each socket with its specific args */
3807 link_socket_init_phase1(c, i, mode);
3808 }
3809}
3810
3811/*
3812 * finalize TCP/UDP sockets
3813 */
3814static void
3816{
3817 for (int i = 0; i < c->c1.link_sockets_num; i++)
3818 {
3820 }
3821}
3822
3823/*
3824 * Print MTU INFO
3825 */
3826static void
3828{
3829 frame_print(&c->c2.frame, D_MTU_INFO, "Data Channel MTU parms");
3830#ifdef ENABLE_FRAGMENT
3831 if (c->c2.fragment)
3832 {
3833 frame_print(&c->c2.frame_fragment, D_MTU_INFO, "Fragmentation MTU parms");
3834 }
3835#endif
3836}
3837
3838/*
3839 * Get local and remote options compatibility strings.
3840 */
3841static void
3843{
3844 struct gc_arena gc = gc_new();
3845
3847 options_string(&c->options, &c->c2.frame, c->c1.tuntap, &c->net_ctx, false, &gc);
3849 options_string(&c->options, &c->c2.frame, c->c1.tuntap, &c->net_ctx, true, &gc);
3850
3851 msg(D_SHOW_OCC, "Local Options String (VER=%s): '%s'",
3853 msg(D_SHOW_OCC, "Expected Remote Options String (VER=%s): '%s'",
3855
3856 if (c->c2.tls_multi)
3857 {
3860 }
3861
3862 gc_free(&gc);
3863}
3864
3865/*
3866 * These things can only be executed once per program instantiation.
3867 * Set up for possible UID/GID downgrade, but don't do it yet.
3868 * Daemonize if requested.
3869 */
3870static void
3872{
3873 if (c->first_time && !c->c0)
3874 {
3875 struct context_0 *c0;
3876
3877 ALLOC_OBJ_CLEAR_GC(c->c0, struct context_0, &c->gc);
3878 c0 = c->c0;
3879
3880 /* get user and/or group that we want to setuid/setgid to,
3881 * sets also platform_x_state */
3882 bool group_defined = platform_group_get(c->options.groupname, &c0->platform_state_group);
3883 bool user_defined = platform_user_get(c->options.username, &c0->platform_state_user);
3884
3885 c0->uid_gid_specified = user_defined || group_defined;
3886
3887 /* fork the dns script runner to preserve root? */
3888 c->persist.duri.required = user_defined;
3889
3890 /* perform postponed chdir if --daemon */
3891 if (c->did_we_daemonize && c->options.cd_dir == NULL)
3892 {
3893 platform_chdir("/");
3894 }
3895
3896 /* should we change scheduling priority? */
3898 }
3899}
3900
3901/*
3902 * free buffers
3903 */
3904static void
3906{
3907 if (c->c2.buffers_owned)
3908 {
3910 c->c2.buffers = NULL;
3911 c->c2.buffers_owned = false;
3912 }
3913}
3914
3915/*
3916 * close TLS
3917 */
3918static void
3920{
3921 if (c->c2.tls_multi)
3922 {
3923 tls_multi_free(c->c2.tls_multi, true);
3924 c->c2.tls_multi = NULL;
3925 }
3926
3927 /* free options compatibility strings */
3928 free(c->c2.options_string_local);
3929 free(c->c2.options_string_remote);
3930
3932
3933 if (c->c2.pulled_options_state)
3934 {
3937 }
3938
3940}
3941
3942/*
3943 * Free key schedules
3944 */
3945static void
3946do_close_free_key_schedule(struct context *c, bool free_ssl_ctx)
3947{
3948 /*
3949 * always free the tls_auth/crypt key. The key will
3950 * be reloaded from memory (pre-cached)
3951 */
3954 CLEAR(c->c1.ks.tls_wrap_key);
3957
3958 if (!(c->sig->signal_received == SIGUSR1))
3959 {
3960 key_schedule_free(&c->c1.ks, free_ssl_ctx);
3961 }
3962}
3963
3964/*
3965 * Close TCP/UDP connection
3966 */
3967static void
3969{
3970 if (c->c2.link_sockets && c->c2.link_socket_owned)
3971 {
3972 for (int i = 0; i < c->c1.link_sockets_num; i++)
3973 {
3974 /* in dco-win case, link socket is a tun handle which is
3975 * closed in do_close_tun(). Set it to UNDEFINED so
3976 * we won't use WinSock API to close it. */
3977 if (tuntap_is_dco_win(c->c1.tuntap))
3978 {
3980 }
3981
3983 }
3984 c->c2.link_sockets = NULL;
3985 }
3986
3987
3988 /* Preserve the resolved list of remote if the user request to or if we want
3989 * reconnect to the same host again or there are still addresses that need
3990 * to be tried */
3991 if (!(c->sig->signal_received == SIGUSR1
3992 && ((c->options.persist_remote_ip)
3993 || (c->sig->source != SIG_SOURCE_HARD
3995 && c->c1.link_socket_addrs[0].current_remote->ai_next)
3996 || c->options.no_advance)))))
3997 {
3999 }
4000
4001 /* Clear the remote actual address when persist_remote_ip is not in use */
4003 {
4004 for (int i = 0; i < c->c1.link_sockets_num; i++)
4005 {
4007 }
4008 }
4009
4011 {
4012 for (int i = 0; i < c->c1.link_sockets_num; i++)
4013 {
4015 {
4016 freeaddrinfo(c->c1.link_socket_addrs[i].bind_local);
4017 }
4018
4019 c->c1.link_socket_addrs[i].bind_local = NULL;
4020 }
4021 }
4022}
4023
4024/*
4025 * Close packet-id persistence file
4026 */
4027static void
4037
4038#ifdef ENABLE_FRAGMENT
4039/*
4040 * Close fragmentation handler.
4041 */
4042static void
4044{
4045 if (c->c2.fragment)
4046 {
4048 c->c2.fragment = NULL;
4049 }
4050}
4051#endif
4052
4053/*
4054 * Open and close our event objects.
4055 */
4056
4057static void
4058do_event_set_init(struct context *c, bool need_us_timeout)
4059{
4060 unsigned int flags = 0;
4061
4063
4064 flags |= EVENT_METHOD_FAST;
4065
4066 if (need_us_timeout)
4067 {
4068 flags |= EVENT_METHOD_US_TIMEOUT;
4069 }
4070
4071 c->c2.event_set = event_set_init(&c->c2.event_set_max, flags);
4072 c->c2.event_set_owned = true;
4073}
4074
4075static void
4077{
4078 if (c->c2.event_set && c->c2.event_set_owned)
4079 {
4081 c->c2.event_set = NULL;
4082 c->c2.event_set_owned = false;
4083 }
4084}
4085
4086/*
4087 * Open and close --status file
4088 */
4089
4090static void
4092{
4093 if (!c->c1.status_output)
4094 {
4095 c->c1.status_output =
4098 c->c1.status_output_owned = true;
4099 }
4100}
4101
4102static void
4104{
4105 if (!(c->sig->signal_received == SIGUSR1))
4106 {
4108 {
4110 c->c1.status_output = NULL;
4111 c->c1.status_output_owned = false;
4112 }
4113 }
4114}
4115
4116/*
4117 * Handle ifconfig-pool persistence object.
4118 */
4119static void
4130
4131static void
4133{
4134 if (!(c->sig->signal_received == SIGUSR1))
4135 {
4137 {
4139 c->c1.ifconfig_pool_persist = NULL;
4141 }
4142 }
4143}
4144
4145/*
4146 * Inherit environmental variables
4147 */
4148
4149static void
4150do_inherit_env(struct context *c, const struct env_set *src)
4151{
4152 c->c2.es = env_set_create(NULL);
4153 c->c2.es_owned = true;
4154 env_set_inherit(c->c2.es, src);
4155}
4156
4157static void
4159{
4160 if (c->c2.es && c->c2.es_owned)
4161 {
4162 env_set_destroy(c->c2.es);
4163 c->c2.es = NULL;
4164 c->c2.es_owned = false;
4165 }
4166}
4167
4168static void
4170{
4171 if (c->options.tls_exit)
4172 {
4174 }
4175 else
4176 {
4178 }
4179}
4180
4181#ifdef ENABLE_PLUGIN
4182
4183void
4185{
4186 if (c->options.plugin_list && !c->plugins)
4187 {
4189 c->plugins_owned = true;
4190 }
4191}
4192
4193void
4194open_plugins(struct context *c, const bool import_options, int init_point)
4195{
4196 if (c->plugins && c->plugins_owned)
4197 {
4198 if (import_options)
4199 {
4200 struct plugin_return pr, config;
4201 plugin_return_init(&pr);
4202 plugin_list_open(c->plugins, c->options.plugin_list, &pr, c->c2.es, init_point);
4203 plugin_return_get_column(&pr, &config, "config");
4204 if (plugin_return_defined(&config))
4205 {
4206 int i;
4207 for (i = 0; i < config.n; ++i)
4208 {
4209 unsigned int option_types_found = 0;
4210 if (config.list[i] && config.list[i]->value)
4211 {
4213 &c->options, config.list[i]->value, D_IMPORT_ERRORS | M_OPTERR,
4214 OPT_P_DEFAULT & ~OPT_P_PLUGIN, &option_types_found, c->es);
4215 }
4216 }
4217 }
4218 plugin_return_free(&pr);
4219 }
4220 else
4221 {
4222 plugin_list_open(c->plugins, c->options.plugin_list, NULL, c->c2.es, init_point);
4223 }
4224 }
4225}
4226
4227static void
4229{
4230 if (c->plugins && c->plugins_owned && !(c->sig->signal_received == SIGUSR1))
4231 {
4233 c->plugins = NULL;
4234 c->plugins_owned = false;
4235 }
4236}
4237
4238static void
4239do_inherit_plugins(struct context *c, const struct context *src)
4240{
4241 if (!c->plugins && src->plugins)
4242 {
4244 c->plugins_owned = true;
4245 }
4246}
4247
4248#endif /* ifdef ENABLE_PLUGIN */
4249
4250#ifdef ENABLE_MANAGEMENT
4251
4252static void
4253management_callback_status_p2p(void *arg, const int version, struct status_output *so)
4254{
4255 struct context *c = (struct context *)arg;
4256 print_status(c, so);
4257}
4258
4259void
4260management_show_net_callback(void *arg, const msglvl_t msglevel)
4261{
4262#ifdef _WIN32
4263 show_routes(msglevel);
4264 show_adapters(msglevel);
4265 msg(msglevel, "END");
4266#else
4267 msg(msglevel, "ERROR: Sorry, this command is currently only implemented on Windows");
4268#endif
4269}
4270
4271#ifdef TARGET_ANDROID
4272int
4273management_callback_network_change(void *arg, bool samenetwork)
4274{
4275 /* Check if the client should translate the network change to a SIGUSR1 to
4276 * reestablish the connection or just reprotect the socket
4277 *
4278 * At the moment just assume that, for all settings that use pull (not
4279 * --static) and are not using peer-id reestablishing the connection is
4280 * required (unless the network is the same)
4281 *
4282 * The function returns -1 on invalid fd and -2 if the socket cannot be
4283 * reused. On the -2 return value the man_network_change function triggers
4284 * a SIGUSR1 to force a reconnect.
4285 */
4286
4287 int socketfd = -1;
4288 struct context *c = (struct context *)arg;
4289 if (!c->c2.link_sockets || !c->c2.link_sockets[0])
4290 {
4291 return -1;
4292 }
4293 if (c->c2.link_sockets[0]->sd == SOCKET_UNDEFINED)
4294 {
4295 return -1;
4296 }
4297
4298 /* On some newer Android handsets, changing to a different network
4299 * often does not trigger a TCP reset but continue using the old
4300 * connection (e.g. using mobile connection when WiFi becomes available */
4301 struct link_socket_info *lsi = get_link_socket_info(c);
4302 if (lsi && proto_is_tcp(lsi->proto) && !samenetwork)
4303 {
4304 return -2;
4305 }
4306
4307 socketfd = c->c2.link_sockets[0]->sd;
4308 if (!c->options.pull || c->c2.tls_multi->use_peer_id || samenetwork)
4309 {
4310 return socketfd;
4311 }
4312 else
4313 {
4314 return -2;
4315 }
4316}
4317#endif /* ifdef TARGET_ANDROID */
4318
4319#endif /* ifdef ENABLE_MANAGEMENT */
4320
4321void
4323{
4324#ifdef ENABLE_MANAGEMENT
4325 if (management)
4326 {
4327 struct management_callback cb;
4328 CLEAR(cb);
4329 cb.arg = c;
4335#ifdef TARGET_ANDROID
4336 cb.network_change = management_callback_network_change;
4337#endif
4341 }
4342#endif
4343}
4344
4345#ifdef ENABLE_MANAGEMENT
4346
4347void
4349{
4350 if (!management)
4351 {
4353 }
4354}
4355
4356bool
4358{
4359 /* initialize management layer */
4360 if (management)
4361 {
4362 if (c->options.management_addr)
4363 {
4364 unsigned int flags = c->options.management_flags;
4365 if (c->options.mode == MODE_SERVER)
4366 {
4367 flags |= MF_SERVER;
4368 }
4369 if (management_open(
4375 {
4377 NULL);
4378 }
4379
4380 /* initial management hold, called early, before first context initialization */
4381 do_hold(0);
4382 if (IS_SIG(c))
4383 {
4384 msg(M_WARN, "Signal received from management interface, exiting");
4385 return false;
4386 }
4387 }
4388 else
4389 {
4391 }
4392 }
4393 return true;
4394}
4395
4396void
4398{
4399 if (management)
4400 {
4402 management = NULL;
4403 }
4404}
4405
4406#endif /* ifdef ENABLE_MANAGEMENT */
4407
4408
4409void
4411{
4412#ifdef ENABLE_MANAGEMENT
4413 if (management)
4414 {
4416 }
4417#endif
4418}
4419
4420void
4422{
4423#ifdef ENABLE_MANAGEMENT
4424 if (management)
4425 {
4427 }
4428#endif
4429}
4430
4431/*
4432 * Initialize a tunnel instance.
4433 */
4434static void
4435init_instance(struct context *c, const struct env_set *env, const unsigned int flags)
4436{
4437 const struct options *options = &c->options;
4438 const bool child = (c->mode == CM_CHILD_TCP || c->mode == CM_CHILD_UDP);
4439
4440 /* init garbage collection level */
4441 gc_init(&c->c2.gc);
4442
4443 /* inherit environmental variables */
4444 if (env)
4445 {
4446 do_inherit_env(c, env);
4447 }
4448
4449 if (c->mode == CM_P2P)
4450 {
4452 }
4453
4454 /* possible sleep or management hold if restart */
4455 if (c->mode == CM_P2P || c->mode == CM_TOP)
4456 {
4458 if (IS_SIG(c))
4459 {
4460 goto sig;
4461 }
4462 }
4463
4465 {
4466 do_preresolve(c);
4467 if (IS_SIG(c))
4468 {
4469 goto sig;
4470 }
4471 }
4472
4473 /* Resets all values to the initial values from the config where needed */
4474 pre_connect_restore(&c->options, &c->c2.gc);
4475
4476 /* map in current connection entry */
4478
4479 /* should we disable paging? */
4480 if (c->first_time && options->mlock)
4481 {
4482 platform_mlockall(true);
4483 }
4484
4485 /* get passwords if undefined */
4486 if (auth_retry_get() == AR_INTERACT)
4487 {
4489 }
4490
4491 /* initialize context level 2 --verb/--mute parms */
4493
4494 /* set error message delay for non-server modes */
4495 if (c->mode == CM_P2P)
4496 {
4498 }
4499
4500 /* warn about inconsistent options */
4501 if (c->mode == CM_P2P || c->mode == CM_TOP)
4502 {
4504 }
4505
4506#ifdef ENABLE_PLUGIN
4507 /* initialize plugins */
4508 if (c->mode == CM_P2P || c->mode == CM_TOP)
4509 {
4510 open_plugins(c, false, OPENVPN_PLUGIN_INIT_PRE_DAEMON);
4511 }
4512#endif
4513
4514 /* should we throw a signal on TLS errors? */
4516
4517 /* open --status file */
4518 if (c->mode == CM_P2P || c->mode == CM_TOP)
4519 {
4521 }
4522
4523 /* open --ifconfig-pool-persist file */
4524 if (c->mode == CM_TOP)
4525 {
4527 }
4528
4529 /* reset OCC state */
4530 if (c->mode == CM_P2P || child)
4531 {
4532 c->c2.occ_op = occ_reset_op();
4533 }
4534
4535 /* our wait-for-i/o objects, different for posix vs. win32 */
4536 if (c->mode == CM_P2P || c->mode == CM_TOP)
4537 {
4539 }
4540 else if (c->mode == CM_CHILD_TCP)
4541 {
4542 do_event_set_init(c, false);
4543 }
4544
4545 /* initialize HTTP or SOCKS proxy object at scope level 2 */
4546 init_proxy(c);
4547
4548 /* allocate our socket object */
4549 if (c->mode == CM_P2P || c->mode == CM_TOP || c->mode == CM_CHILD_TCP)
4550 {
4552 }
4553
4554#ifdef ENABLE_FRAGMENT
4555 /* initialize internal fragmentation object */
4556 if (options->ce.fragment && (c->mode == CM_P2P || child))
4557 {
4558 c->c2.fragment = fragment_init(&c->c2.frame);
4559 }
4560#endif
4561
4562 /* init crypto layer */
4563 {
4564 unsigned int crypto_flags = 0;
4565 if (c->mode == CM_TOP)
4566 {
4567 crypto_flags = CF_INIT_TLS_AUTH_STANDALONE;
4568 }
4569 else if (c->mode == CM_P2P)
4570 {
4572 }
4573 else if (child)
4574 {
4575 crypto_flags = CF_INIT_TLS_MULTI;
4576 }
4577 do_init_crypto(c, crypto_flags);
4578 if (IS_SIG(c) && !child)
4579 {
4580 goto sig;
4581 }
4582 }
4583
4584#ifdef USE_COMP
4585 /* initialize compression library. */
4586 if (comp_enabled(&options->comp) && (c->mode == CM_P2P || child))
4587 {
4588 c->c2.comp_context = comp_init(&options->comp);
4589 }
4590#endif
4591
4592 /* initialize MTU variables */
4593 do_init_frame(c);
4594
4595 /* initialize TLS MTU variables */
4597
4598 /* init workspace buffers whose size is derived from frame size */
4599 if (c->mode == CM_P2P || c->mode == CM_CHILD_TCP)
4600 {
4601 do_init_buffers(c);
4602 }
4603
4604#ifdef ENABLE_FRAGMENT
4605 /* initialize internal fragmentation capability with known frame size */
4606 if (options->ce.fragment && (c->mode == CM_P2P || child))
4607 {
4609 }
4610#endif
4611
4612 /* bind the TCP/UDP socket */
4613 if (c->mode == CM_P2P || c->mode == CM_TOP || c->mode == CM_CHILD_TCP)
4614 {
4616 }
4617
4618 /* initialize tun/tap device object,
4619 * open tun/tap device, ifconfig, run up script, etc. */
4620 if (!(options->up_delay || PULL_DEFINED(options)) && (c->mode == CM_P2P || c->mode == CM_TOP))
4621 {
4622 int error_flags = 0;
4623 c->c2.did_open_tun = do_open_tun(c, &error_flags);
4624 }
4625
4626 /* print MTU info */
4628
4629 /* get local and remote options compatibility strings */
4630 if (c->mode == CM_P2P || child)
4631 {
4633 }
4634
4635 /* initialize output speed limiter */
4636 if (c->mode == CM_P2P)
4637 {
4639 }
4640
4641 /* do one-time inits, and possibly become a daemon here */
4643
4644#ifdef ENABLE_PLUGIN
4645 /* initialize plugins */
4646 if (c->mode == CM_P2P || c->mode == CM_TOP)
4647 {
4648 open_plugins(c, false, OPENVPN_PLUGIN_INIT_POST_DAEMON);
4649 }
4650#endif
4651
4652 /* initialise connect timeout timer */
4654
4655 /* finalize the TCP/UDP socket */
4656 if (c->mode == CM_P2P || c->mode == CM_TOP || c->mode == CM_CHILD_TCP)
4657 {
4659
4660
4661 /* Update dynamic frame calculation as exact transport socket information
4662 * (IP vs IPv6) may be only available after socket phase2 has finished.
4663 * This is only needed for --static or no crypto, NCP will recalculate this
4664 * in tls_session_update_crypto_params (P2MP) */
4665 for (int i = 0; i < c->c1.link_sockets_num; i++)
4666 {
4668 &c->c2.link_sockets[i]->info);
4669 }
4670 }
4671
4672 /*
4673 * Actually do UID/GID downgrade, and chroot, if requested.
4674 * May be delayed by --client, --pull, or --up-delay.
4675 */
4677
4678 /* initialize timers */
4679 if (c->mode == CM_P2P || child)
4680 {
4681 do_init_timers(c, false);
4682 }
4683
4684#ifdef ENABLE_PLUGIN
4685 /* initialize plugins */
4686 if (c->mode == CM_P2P || c->mode == CM_TOP)
4687 {
4688 open_plugins(c, false, OPENVPN_PLUGIN_INIT_POST_UID_CHANGE);
4689 }
4690#endif
4691
4692#if PORT_SHARE
4693 /* share OpenVPN port with foreign (such as HTTPS) server */
4694 if (c->first_time && (c->mode == CM_P2P || c->mode == CM_TOP))
4695 {
4696 init_port_share(c);
4697 }
4698#endif
4699
4700 /* Check for signals */
4701 if (IS_SIG(c))
4702 {
4703 goto sig;
4704 }
4705
4706 return;
4707
4708sig:
4709 if (!c->sig->signal_text)
4710 {
4711 c->sig->signal_text = "init_instance";
4712 }
4713 close_context(c, -1, flags);
4714 return;
4715}
4716
4717/*
4718 * Initialize a tunnel instance, handle pre and post-init
4719 * signal settings.
4720 */
4721void
4722init_instance_handle_signals(struct context *c, const struct env_set *env, const unsigned int flags)
4723{
4725 init_instance(c, env, flags);
4727
4728 /*
4729 * This is done so that signals thrown during
4730 * initialization can bring us back to
4731 * a management hold.
4732 */
4733 if (IS_SIG(c))
4734 {
4735 remap_signal(c);
4737 }
4738}
4739
4740/*
4741 * Close a tunnel instance.
4742 */
4743void
4745{
4746 /* close event objects */
4748
4749 if (c->mode == CM_P2P || c->mode == CM_CHILD_TCP || c->mode == CM_CHILD_UDP
4750 || c->mode == CM_TOP)
4751 {
4752#ifdef USE_COMP
4753 if (c->c2.comp_context)
4754 {
4755 comp_uninit(c->c2.comp_context);
4756 c->c2.comp_context = NULL;
4757 }
4758#endif
4759
4760 /* free buffers */
4762
4763 /* close peer for DCO if enabled, needs peer-id so must be done before
4764 * closing TLS contexts */
4765 dco_remove_peer(c);
4766
4767 /* close TLS */
4768 do_close_tls(c);
4769
4770 /* free key schedules */
4771 do_close_free_key_schedule(c, (c->mode == CM_P2P || c->mode == CM_TOP));
4772
4773 /* close TCP/UDP connection */
4775
4776 /* close TUN/TAP device */
4777 do_close_tun(c, false);
4778
4779#ifdef ENABLE_MANAGEMENT
4780 if (management)
4781 {
4783 }
4784#endif
4785
4786#ifdef ENABLE_PLUGIN
4787 /* call plugin close functions and unload */
4789#endif
4790
4791 /* close packet-id persistence file */
4793
4794 /* close --status file */
4796
4797#ifdef ENABLE_FRAGMENT
4798 /* close fragmentation handler */
4800#endif
4801
4802 /* close --ifconfig-pool-persist obj */
4804
4805 /* free up environmental variable store */
4807
4808 /* close HTTP or SOCKS proxy */
4809 uninit_proxy(c);
4810
4811 /* garbage collect */
4812 gc_free(&c->c2.gc);
4813 }
4814}
4815
4816void
4817inherit_context_child(struct context *dest, const struct context *src, struct link_socket *sock)
4818{
4819 CLEAR(*dest);
4820
4821 /* proto_is_dgram will ASSERT(0) if proto is invalid */
4823
4824 dest->gc = gc_new();
4825
4826 ALLOC_OBJ_CLEAR_GC(dest->sig, struct signal_info, &dest->gc);
4827
4828 /* c1 init */
4830 dest->c1.link_sockets_num = 1;
4832
4833 dest->c1.ks.key_type = src->c1.ks.key_type;
4834 /* inherit SSL context */
4835 dest->c1.ks.ssl_ctx = src->c1.ks.ssl_ctx;
4836 dest->c1.ks.tls_wrap_key = src->c1.ks.tls_wrap_key;
4839 /* inherit pre-NCP ciphers */
4840 dest->options.ciphername = src->options.ciphername;
4841 dest->options.authname = src->options.authname;
4842
4843 /* inherit auth-token */
4844 dest->c1.ks.auth_token_key = src->c1.ks.auth_token_key;
4845
4846 /* options */
4847 dest->options = src->options;
4848 dest->options.ce.proto = sock->info.proto;
4849 options_detach(&dest->options);
4850
4851 dest->c2.event_set = src->c2.event_set;
4852
4853 if (dest->mode == CM_CHILD_TCP)
4854 {
4855 /*
4856 * The CM_TOP context does the socket listen(),
4857 * and the CM_CHILD_TCP context does the accept().
4858 */
4859 dest->c2.accept_from = sock;
4860 }
4861
4862#ifdef ENABLE_PLUGIN
4863 /* inherit plugins */
4864 do_inherit_plugins(dest, src);
4865#endif
4866
4867 /* context init */
4868
4869 /* inherit tun/tap interface object now as it may be required
4870 * to initialize the DCO context in init_instance()
4871 */
4872 dest->c1.tuntap = src->c1.tuntap;
4873
4874 /* UDP inherits some extra things which TCP does not */
4875 if (dest->mode == CM_CHILD_UDP)
4876 {
4877 ASSERT(!dest->c2.link_sockets);
4878 ASSERT(dest->options.ce.local_list);
4879
4880 /* inherit buffers */
4881 dest->c2.buffers = src->c2.buffers;
4882
4883 ALLOC_ARRAY_GC(dest->c2.link_sockets, struct link_socket *, 1, &dest->gc);
4884
4885 /* inherit parent link_socket and tuntap */
4886 dest->c2.link_sockets[0] = sock;
4887
4888 ALLOC_ARRAY_GC(dest->c2.link_socket_infos, struct link_socket_info *, 1, &dest->gc);
4889 ALLOC_OBJ_GC(dest->c2.link_socket_infos[0], struct link_socket_info, &dest->gc);
4890 *dest->c2.link_socket_infos[0] = sock->info;
4891
4892 /* locally override some link_socket_info fields */
4893 dest->c2.link_socket_infos[0]->lsa = &dest->c1.link_socket_addrs[0];
4895 }
4896
4898 if (IS_SIG(dest))
4899 {
4900 return;
4901 }
4902}
4903
4904void
4905inherit_context_top(struct context *dest, const struct context *src)
4906{
4907 /* copy parent */
4908 *dest = *src;
4909
4910 /*
4911 * CM_TOP_CLONE will prevent close_instance from freeing or closing
4912 * resources owned by the parent.
4913 *
4914 * Also note that CM_TOP_CLONE context objects are
4915 * closed by multi_top_free in multi.c.
4916 */
4917 dest->mode = CM_TOP_CLONE;
4918
4919 dest->first_time = false;
4920 dest->c0 = NULL;
4921
4922 options_detach(&dest->options);
4923 gc_detach(&dest->gc);
4924 gc_detach(&dest->c2.gc);
4925
4926 /* detach plugins */
4927 dest->plugins_owned = false;
4928
4929 dest->c2.tls_multi = NULL;
4930
4931 /* detach c1 ownership */
4932 dest->c1.tuntap_owned = false;
4933 dest->c1.status_output_owned = false;
4934 dest->c1.ifconfig_pool_persist_owned = false;
4935
4936 /* detach c2 ownership */
4937 dest->c2.event_set_owned = false;
4938 dest->c2.link_socket_owned = false;
4939 dest->c2.buffers_owned = false;
4940 dest->c2.es_owned = false;
4941
4942 dest->c2.event_set = NULL;
4943 do_event_set_init(dest, false);
4944
4945#ifdef USE_COMP
4946 dest->c2.comp_context = NULL;
4947#endif
4948}
4949
4950void
4951close_context(struct context *c, int sig, unsigned int flags)
4952{
4953 ASSERT(c);
4954 ASSERT(c->sig);
4955
4956 if (sig >= 0)
4957 {
4958 register_signal(c->sig, sig, "close_context");
4959 }
4960
4961 if (c->sig->signal_received == SIGUSR1)
4962 {
4963 if ((flags & CC_USR1_TO_HUP)
4964 || (c->sig->source == SIG_SOURCE_HARD && (flags & CC_HARD_USR1_TO_HUP)))
4965 {
4966 register_signal(c->sig, SIGHUP, "close_context usr1 to hup");
4967 }
4968 }
4969
4970 if (!(flags & CC_NO_CLOSE))
4971 {
4972 close_instance(c);
4973 }
4974
4975 if (flags & CC_GC_FREE)
4976 {
4977 context_gc_free(c);
4978 }
4979}
4980
4981/* Write our PID to a file */
4982void
4983write_pid_file(const char *filename, const char *chroot_dir)
4984{
4985 if (filename)
4986 {
4987 unsigned int pid = 0;
4988 FILE *fp = platform_fopen(filename, "w");
4989 if (!fp)
4990 {
4991 msg(M_ERR, "Open error on pid file %s", filename);
4992 return;
4993 }
4994
4995 pid = platform_getpid();
4996 fprintf(fp, "%u\n", pid);
4997 if (fclose(fp))
4998 {
4999 msg(M_ERR, "Close error on pid file %s", filename);
5000 }
5001
5002 /* remember file name so it can be deleted "out of context" later */
5003 /* (the chroot case is more complex and not handled today) */
5004 if (!chroot_dir)
5005 {
5006 saved_pid_file_name = strdup(filename);
5008 {
5009 msg(M_FATAL, "Failed allocate memory saved_pid_file_name");
5010 }
5011 }
5012 }
5013}
5014
5015/* remove PID file on exit, called from openvpn_exit() */
5016void
5018{
5020 {
5022 }
5023}
5024
5025
5026/*
5027 * Do a loopback test
5028 * on the crypto subsystem.
5029 */
5030void
5032{
5033 /* print version number */
5034 msg(M_INFO, "%s", title_string);
5035 const struct options *options = &c->options;
5036
5039 context_init_1(c);
5042
5044
5046
5047 key_schedule_free(&c->c1.ks, true);
5049
5050 context_gc_free(c);
5051}
void argv_msg(const msglvl_t msglevel, const struct argv *a)
Write the arguments stored in a struct argv via the msg() command.
Definition argv.c:242
void argv_parse_cmd(struct argv *argres, const char *cmdstr)
Parses a command string, tokenizes it and puts each element into a separate struct argv argument slot...
Definition argv.c:481
void argv_free(struct argv *a)
Frees all memory allocations allocated by the struct argv related functions.
Definition argv.c:101
bool argv_printf(struct argv *argres, const char *format,...)
printf() variant which populates a struct argv.
Definition argv.c:438
bool argv_printf_cat(struct argv *argres, const char *format,...)
printf() inspired argv concatenation.
Definition argv.c:462
struct argv argv_new(void)
Allocates a new struct argv and ensures it is initialised.
Definition argv.c:87
void auth_token_write_server_key_file(const char *filename)
Generate a auth-token server secret key, and write to file.
Definition auth_token.c:118
void auth_token_init_secret(struct key_ctx *key_ctx, const char *key_file, bool key_inline)
Loads an HMAC secret from a file or if no file is present generates a epheremal secret for the run ti...
Definition auth_token.c:124
void free_buf(struct buffer *buf)
Definition buffer.c:184
void buf_clear(struct buffer *buf)
Definition buffer.c:163
bool buf_printf(struct buffer *buf, const char *format,...)
Definition buffer.c:241
void string_clear(char *str)
Definition buffer.c:690
struct buffer alloc_buf_gc(size_t size, struct gc_arena *gc)
Definition buffer.c:89
struct buffer alloc_buf(size_t size)
Definition buffer.c:63
char * string_alloc(const char *str, struct gc_arena *gc)
Definition buffer.c:648
static void gc_detach(struct gc_arena *a)
Definition buffer.h:1011
#define BSTR(buf)
Definition buffer.h:128
#define ALLOC_ARRAY_GC(dptr, type, n, gc)
Definition buffer.h:1075
#define ALLOC_ARRAY_CLEAR_GC(dptr, type, n, gc)
Definition buffer.h:1086
static void gc_init(struct gc_arena *a)
Definition buffer.h:1004
static void buf_set_write(struct buffer *buf, uint8_t *data, int size)
Definition buffer.h:331
static int buf_len(const struct buffer *buf)
Definition buffer.h:253
#define ALLOC_OBJ_CLEAR_GC(dptr, type, gc)
Definition buffer.h:1101
#define ALLOC_OBJ_GC(dptr, type, gc)
Definition buffer.h:1096
static void strncpynt(char *dest, const char *src, size_t maxlen)
Definition buffer.h:361
static void check_malloc_return(void *p)
Definition buffer.h:1107
static void gc_free(struct gc_arena *a)
Definition buffer.h:1025
#define ALLOC_OBJ_CLEAR(dptr, type)
Definition buffer.h:1064
static struct gc_arena gc_new(void)
Definition buffer.h:1017
#define PUSH_BUNDLE_SIZE
Definition common.h:89
bool check_compression_settings_valid(struct compress_options *info, msglvl_t msglevel)
Checks if the compression settings are valid.
Definition comp.c:162
char * basename(char *filename)
int daemon(int nochdir, int noclose)
void free_key_ctx_bi(struct key_ctx_bi *ctx)
Definition crypto.c:1100
long int get_random(void)
Definition crypto.c:1736
void init_key_type(struct key_type *kt, const char *ciphername, const char *authname, bool tls_mode, bool warn)
Initialize a key_type structure with.
Definition crypto.c:875
int write_key_file(const int nkeys, const char *filename)
Write nkeys 1024-bits keys to file.
Definition crypto.c:1556
unsigned int crypto_max_overhead(void)
Return the worst-case OpenVPN crypto overhead (in bytes)
Definition crypto.c:850
void test_crypto(struct crypto_options *co, struct frame *frame)
Definition crypto.c:1199
void generate_test_crypto_random_key(const struct key_type *key_type, struct key_ctx_bi *ctx, const char *key_name)
Generate a random key and initialise ctx to be used the in the crypto random test.
Definition crypto.c:1329
void crypto_read_openvpn_key(const struct key_type *key_type, struct key_ctx_bi *ctx, const char *key_file, bool key_inline, const int key_direction, const char *key_name, const char *opt_name, struct key2 *keydata)
Definition crypto.c:1290
void free_key_ctx(struct key_ctx *ctx)
Definition crypto.c:1081
#define CO_PACKET_ID_LONG_FORM
Bit-flag indicating whether to use OpenVPN's long packet ID format.
Definition crypto.h:347
#define CO_USE_TLS_KEY_MATERIAL_EXPORT
Bit-flag indicating that data channel key derivation is done using TLS keying material export [RFC570...
Definition crypto.h:359
#define CO_USE_DYNAMIC_TLS_CRYPT
Bit-flag indicating that renegotiations are using tls-crypt with a TLS-EKM derived key.
Definition crypto.h:375
#define CO_EPOCH_DATA_KEY_FORMAT
Bit-flag indicating the epoch the data format.
Definition crypto.h:379
#define CO_MUTE_REPLAY_WARNINGS
Bit-flag indicating not to display replay warnings.
Definition crypto.h:356
#define CO_FORCE_TLSCRYPTV2_COOKIE
Bit-flag indicating that we do not allow clients that do not support resending the wrapped client key...
Definition crypto.h:367
#define CO_USE_CC_EXIT_NOTIFY
Bit-flag indicating that explicit exit notifies should be sent via the control channel instead of usi...
Definition crypto.h:371
static bool key_ctx_bi_defined(const struct key_ctx_bi *key)
Definition crypto.h:653
void show_available_engines(void)
bool cipher_kt_mode_aead(const char *ciphername)
Check if the supplied cipher is a supported AEAD mode cipher.
void show_available_ciphers(void)
bool md_valid(const char *digest)
Return if a message digest parameters is valid given the name of the digest.
bool cipher_kt_mode_ofb_cfb(const char *ciphername)
Check if the supplied cipher is a supported OFB or CFB mode cipher.
const char * md_kt_name(const char *mdname)
Retrieve a string describing the digest digest (e.g.
const char * cipher_kt_name(const char *ciphername)
Retrieve a normalised string describing the cipher (e.g.
void crypto_init_lib_engine(const char *engine_name)
void md_ctx_cleanup(md_ctx_t *ctx)
void show_available_digests(void)
void md_ctx_free(md_ctx_t *ctx)
#define DCO_DEFAULT_METRIC
Definition dco.h:47
static bool dco_supports_epoch_data(struct context *c)
Definition dco.h:387
static void dco_remove_peer(struct context *c)
Definition dco.h:348
static bool dco_check_pull_options(msglvl_t msglevel, const struct options *o)
Definition dco.h:286
static bool ovpn_dco_init(struct context *c)
Definition dco.h:292
static int dco_p2p_add_new_peer(struct context *c)
Definition dco.h:335
void run_dns_up_down(bool up, struct options *o, const struct tuntap *tt, struct dns_updown_runner_info *duri)
Invokes the action associated with bringing DNS up or down.
Definition dns.c:859
void env_set_destroy(struct env_set *es)
Definition env_set.c:166
void setenv_int(struct env_set *es, const char *name, int value)
Definition env_set.c:291
void setenv_str(struct env_set *es, const char *name, const char *value)
Definition env_set.c:307
void env_set_inherit(struct env_set *es, const struct env_set *src)
Definition env_set.c:262
struct env_set * env_set_create(struct gc_arena *gc)
Definition env_set.c:156
#define D_MTU_DEBUG
Definition errlevel.h:125
#define D_SHOW_OCC
Definition errlevel.h:150
#define D_PUSH
Definition errlevel.h:82
#define D_SHOW_NET
Definition errlevel.h:131
#define P2P_ERROR_DELAY_MS
Definition errlevel.h:40
#define D_RESTART
Definition errlevel.h:81
#define D_IMPORT_ERRORS
Definition errlevel.h:63
#define D_CLOSE
Definition errlevel.h:72
#define D_PUSH_DEBUG
Definition errlevel.h:149
#define D_DCO
Definition errlevel.h:93
#define D_HANDSHAKE
Definition errlevel.h:71
#define D_GENKEY
Definition errlevel.h:78
#define D_MTU_INFO
Definition errlevel.h:104
#define D_PUSH_ERRORS
Definition errlevel.h:66
#define D_INIT_MEDIUM
Definition errlevel.h:103
#define D_TLS_ERRORS
Definition errlevel.h:58
#define D_READ_WRITE
Definition errlevel.h:166
#define M_INFO
Definition errlevel.h:54
#define D_LOG_RW
Definition errlevel.h:109
#define D_ROUTE
Definition errlevel.h:79
#define D_LINK_ERRORS
Definition errlevel.h:56
struct event_set * event_set_init(int *maxevents, unsigned int flags)
Definition event.c:1187
#define EVENT_METHOD_FAST
Definition event.h:79
#define EVENT_METHOD_US_TIMEOUT
Definition event.h:78
static void event_free(struct event_set *es)
Definition event.h:159
bool send_control_channel_string(struct context *c, const char *str, msglvl_t msglevel)
Definition forward.c:398
Interface functions to the internal and external multiplexers.
static struct link_socket_info * get_link_socket_info(struct context *c)
Definition forward.h:337
struct tls_auth_standalone * tls_auth_standalone_init(struct tls_options *tls_options, struct gc_arena *gc)
Definition ssl.c:1186
void tls_init_control_channel_frame_parameters(struct frame *frame, int tls_mtu)
Definition ssl.c:141
void tls_multi_free(struct tls_multi *multi, bool clear)
Cleanup a tls_multi structure and free associated memory allocations.
Definition ssl.c:1238
struct tls_multi * tls_multi_init(struct tls_options *tls_options)
Allocate and initialize a tls_multi structure.
Definition ssl.c:1157
void tls_multi_init_finalize(struct tls_multi *multi, int tls_mtu)
Finalize initialization of a tls_multi structure.
Definition ssl.c:1172
void tls_auth_standalone_free(struct tls_auth_standalone *tas)
Frees a standalone tls-auth verification object.
Definition ssl.c:1211
#define TM_ACTIVE
Active tls_session.
Definition ssl_common.h:544
void tls_multi_init_set_options(struct tls_multi *multi, const char *local, const char *remote)
Definition ssl.c:1227
void fragment_frame_init(struct fragment_master *f, const struct frame *frame)
Allocate internal packet buffers for a fragment_master structure.
Definition fragment.c:125
struct fragment_master * fragment_init(struct frame *frame)
Allocate and initialize a fragment_master structure.
Definition fragment.c:92
void fragment_free(struct fragment_master *f)
Free a fragment_master structure and its internal packet buffers.
Definition fragment.c:116
void tls_crypt_init_key(struct key_ctx_bi *key, struct key2 *keydata, const char *key_file, bool key_inline, bool tls_server)
Initialize a key_ctx_bi structure for use with --tls-crypt.
Definition tls_crypt.c:61
void tls_crypt_v2_init_server_key(struct key_ctx *key_ctx, bool encrypt, const char *key_file, bool key_inline)
Initialize a tls-crypt-v2 server key (used to encrypt/decrypt client keys).
Definition tls_crypt.c:339
void tls_crypt_v2_write_client_key_file(const char *filename, const char *b64_metadata, const char *server_key_file, bool server_key_inline)
Generate a tls-crypt-v2 client key, and write to file.
Definition tls_crypt.c:698
void tls_crypt_v2_write_server_key_file(const char *filename)
Generate a tls-crypt-v2 server key, and write to file.
Definition tls_crypt.c:692
int tls_crypt_buf_overhead(void)
Returns the maximum overhead (in bytes) added to the destination buffer by tls_crypt_wrap().
Definition tls_crypt.c:55
void tls_crypt_v2_init_client_key(struct key_ctx_bi *key, struct key2 *original_key, struct buffer *wkc_buf, const char *key_file, bool key_inline)
Initialize a tls-crypt-v2 client key.
Definition tls_crypt.c:316
void uninit_management_callback(void)
Definition init.c:4410
static void uninit_proxy(struct context *c)
Definition init.c:726
bool open_management(struct context *c)
Definition init.c:4357
static void do_init_first_time(struct context *c)
Definition init.c:3871
static void do_init_route_list(const struct options *options, struct route_list *route_list, const struct link_socket_info *link_socket_info, struct env_set *es, openvpn_net_ctx_t *ctx)
Definition init.c:1437
static void do_init_tls_wrap_key(struct context *c)
Definition init.c:3077
static bool management_callback_remote_cmd(void *arg, const char **p)
Definition init.c:363
bool do_genkey(const struct options *options)
Definition init.c:1004
static void next_connection_entry(struct context *c)
Definition init.c:514
static bool can_preserve_tun(struct tuntap *tt)
Definition init.c:1748
static void do_init_crypto_test(struct context *c)
Definition init.c:3003
void initialization_sequence_completed(struct context *c, const unsigned int flags)
Definition init.c:1528
void open_plugins(struct context *c, const bool import_options, int init_point)
Definition init.c:4194
static void tls_print_deferred_options_results(struct context *c)
Prints the results of options imported for the data channel.
Definition init.c:2181
static const char * saved_pid_file_name
Definition init.c:61
void init_verb_mute(struct context *c, unsigned int flags)
Definition init.c:932
static void do_uid_gid_chroot(struct context *c, bool no_delay)
Definition init.c:1186
const char * format_common_name(struct context *c, struct gc_arena *gc)
Definition init.c:1262
static void do_close_link_socket(struct context *c)
Definition init.c:3968
static unsigned int management_callback_remote_entry_count(void *arg)
Definition init.c:319
static void do_signal_on_tls_errors(struct context *c)
Definition init.c:4169
static void do_init_crypto_static(struct context *c, const unsigned int flags)
Definition init.c:3033
static void key_schedule_free(struct key_schedule *ks, bool free_ssl_ctx)
Definition init.c:2964
static void do_init_tun(struct context *c)
Definition init.c:1703
static void do_option_warnings(struct context *c)
Definition init.c:3587
static void do_link_socket_addr_new(struct context *c)
Definition init.c:732
void close_instance(struct context *c)
Definition init.c:4744
static void do_init_route_ipv6_list(const struct options *options, struct route_ipv6_list *route_ipv6_list, const struct link_socket_info *link_socket_info, struct env_set *es, openvpn_net_ctx_t *ctx)
Definition init.c:1476
static void do_init_frame(struct context *c)
Definition init.c:3541
void persist_client_stats(struct context *c)
Definition init.c:4421
void inherit_context_top(struct context *dest, const struct context *src)
Definition init.c:4905
static bool ce_management_query_proxy(struct context *c)
Definition init.c:246
static void do_init_crypto(struct context *c, const unsigned int flags)
Definition init.c:3524
static void do_init_frame_tls(struct context *c)
Definition init.c:3479
static void do_init_traffic_shaper(struct context *c)
Definition init.c:1403
static bool route_noexec_enabled(const struct options *o, const struct tuntap *tt)
Determine if external route commands should be executed based on configured options and backend drive...
Definition init.c:1638
static bool ifconfig_noexec_enabled(const struct context *c)
Determines if ifconfig execution should be disabled because of a.
Definition init.c:1815
static void clear_remote_addrlist(struct link_socket_addr *lsa, bool free)
Definition init.c:500
static void do_print_data_channel_mtu_parms(struct context *c)
Definition init.c:3827
void init_plugins(struct context *c)
Definition init.c:4184
void free_context_buffers(struct context_buffers *b)
Definition init.c:3708
static void init_crypto_pre(struct context *c, const unsigned int flags)
Definition init.c:2977
static void do_init_timers(struct context *c, bool deferred)
Definition init.c:1320
static void context_clear(struct context *c)
Definition init.c:75
static void context_clear_1(struct context *c)
Definition init.c:81
#define CF_LOAD_PERSISTED_PACKET_ID
Definition init.c:66
static void do_alloc_route_list(struct context *c)
Definition init.c:1419
static void do_close_status_output(struct context *c)
Definition init.c:4103
static void do_event_set_init(struct context *c, bool need_us_timeout)
Definition init.c:4058
static struct context * static_context
Definition init.c:60
static void do_init_fragment(struct context *c)
Definition init.c:3745
#define CF_INIT_TLS_MULTI
Definition init.c:67
void context_init_1(struct context *c)
Definition init.c:739
void do_test_crypto(struct context *c)
Definition init.c:5031
void pre_setup(const struct options *options)
Definition init.c:1273
static void do_link_socket_new(struct context *c)
Definition init.c:3766
static void do_close_free_key_schedule(struct context *c, bool free_ssl_ctx)
Definition init.c:3946
static bool management_callback_proxy_cmd(void *arg, const char **p)
Definition init.c:200
static void del_wfp_block(struct context *c, unsigned long adapter_index)
Remove any WFP block filters previously added.
Definition init.c:1796
void reset_coarse_timers(struct context *c)
Definition init.c:1296
static void do_open_ifconfig_pool_persist(struct context *c)
Definition init.c:4120
static void do_close_ifconfig_pool_persist(struct context *c)
Definition init.c:4132
static void do_close_tun(struct context *c, bool force)
Definition init.c:2031
void init_management(void)
Definition init.c:4348
void uninit_static(void)
Definition init.c:914
void init_instance_handle_signals(struct context *c, const struct env_set *env, const unsigned int flags)
Definition init.c:4722
bool do_update(struct context *c, unsigned int option_types_found)
A simplified version of the do_up() function.
Definition init.c:2467
static void do_init_crypto_tls(struct context *c, const unsigned int flags)
Definition init.c:3245
void write_pid_file(const char *filename, const char *chroot_dir)
Definition init.c:4983
void context_gc_free(struct context *c)
Definition init.c:790
static void socket_restart_pause(struct context *c)
Definition init.c:2763
static void do_open_status_output(struct context *c)
Definition init.c:4091
void init_options_dev(struct options *options)
Definition init.c:955
static void do_close_free_buf(struct context *c)
Definition init.c:3905
void init_query_passwords(const struct context *c)
Query for private key and auth-user-pass username/passwords.
Definition init.c:644
bool do_deferred_options(struct context *c, const unsigned int found, const bool is_update)
Definition init.c:2581
void inherit_context_child(struct context *dest, const struct context *src, struct link_socket *sock)
Definition init.c:4817
static void do_compute_occ_strings(struct context *c)
Definition init.c:3842
void context_clear_2(struct context *c)
Definition init.c:87
static void do_close_fragment(struct context *c)
Definition init.c:4043
static void update_options_ce_post(struct options *options)
Definition init.c:182
static void do_init_crypto_none(struct context *c)
Definition init.c:3509
static void management_callback_status_p2p(void *arg, const int version, struct status_output *so)
Definition init.c:4253
void remove_pid_file(void)
Definition init.c:5017
static void add_delim_if_non_empty(struct buffer *buf, const char *header)
Helper function for tls_print_deferred_options_results Adds the ", " delimitor if there already some ...
Definition init.c:2167
bool print_openssl_info(const struct options *options)
Definition init.c:966
void close_context(struct context *c, int sig, unsigned int flags)
Definition init.c:4951
static bool ce_management_query_remote(struct context *c)
Definition init.c:413
static void open_tun_backend(struct context *c)
Definition init.c:1823
static void do_close_event_set(struct context *c)
Definition init.c:4076
bool do_persist_tuntap(struct options *options, openvpn_net_ctx_t *ctx)
Definition init.c:1085
static bool do_hold(int holdtime)
Definition init.c:2744
bool do_up(struct context *c, bool pulled_options, unsigned int option_types_found)
Definition init.c:2332
void tun_abort(void)
Definition init.c:2135
static void do_init_server_poll_timeout(struct context *c)
Definition init.c:1307
static void do_close_plugins(struct context *c)
Definition init.c:4228
static void do_init_socket_phase1(struct context *c)
Definition init.c:3783
static void init_instance(struct context *c, const struct env_set *env, const unsigned int flags)
Definition init.c:4435
bool init_static(void)
Definition init.c:828
static void do_init_crypto_tls_c1(struct context *c)
Definition init.c:3149
static void frame_finalize_options(struct context *c, const struct options *o)
Definition init.c:2883
static void uninit_proxy_dowork(struct context *c)
Definition init.c:671
static bool options_hash_changed_or_zero(const struct sha256_digest *a, const struct sha256_digest *b)
Helper for do_up().
Definition init.c:2154
static void add_wfp_block(struct context *c)
Add WFP filters to block traffic to local networks.
Definition init.c:1770
static void do_close_tun_simple(struct context *c)
Definition init.c:2001
static void do_inherit_plugins(struct context *c, const struct context *src)
Definition init.c:4239
static void run_up_down(const char *command, const struct plugin_list *plugins, int plugin_type, const char *arg, DWORD adapter_index, const char *dev_type, int tun_mtu, const char *ifconfig_local, const char *ifconfig_remote, const char *context, const char *signal_text, const char *script_type, struct env_set *es)
Definition init.c:107
static void do_init_socket_phase2(struct context *c)
Definition init.c:3815
bool possibly_become_daemon(const struct options *options)
Definition init.c:1144
static bool management_callback_remote_entry_get(void *arg, unsigned int index, char **remote)
Definition init.c:329
static void init_connection_list(struct context *c)
Definition init.c:474
static void init_proxy_dowork(struct context *c)
Definition init.c:688
static void do_close_packet_id(struct context *c)
Definition init.c:4028
static void do_startup_pause(struct context *c)
Definition init.c:2840
static size_t get_frame_mtu(struct context *c, const struct options *o)
Definition init.c:2853
static bool do_deferred_p2p_ncp(struct context *c)
Definition init.c:2536
#define CF_INIT_TLS_AUTH_STANDALONE
Definition init.c:68
unsigned int pull_permission_mask(const struct context *c)
Definition init.c:2520
static bool do_deferred_options_part2(struct context *c)
This function is expected to be invoked after open_tun() was performed.
Definition init.c:2309
static void do_env_set_destroy(struct context *c)
Definition init.c:4158
static void do_init_buffers(struct context *c)
Definition init.c:3733
static void init_proxy(struct context *c)
Definition init.c:720
void init_management_callback_p2p(struct context *c)
Definition init.c:4322
static bool management_callback_send_cc_message(void *arg, const char *command, const char *parameters)
This method sends a custom control channel message.
Definition init.c:296
bool do_route(const struct options *options, struct route_list *route_list, struct route_ipv6_list *route_ipv6_list, const struct tuntap *tt, const struct plugin_list *plugins, struct env_set *es, openvpn_net_ctx_t *ctx)
Definition init.c:1649
static void do_inherit_env(struct context *c, const struct env_set *src)
Definition init.c:4150
void context_clear_all_except_first_time(struct context *c)
Definition init.c:93
struct context_buffers * init_context_buffers(const struct frame *frame)
Definition init.c:3683
static bool do_open_tun(struct context *c, int *error_flags)
Definition init.c:1845
static void do_close_tls(struct context *c)
Definition init.c:3919
void close_management(void)
Definition init.c:4397
void management_show_net_callback(void *arg, const msglvl_t msglevel)
Definition init.c:4260
#define ISC_ERRORS
Definition init.h:120
#define CC_GC_FREE
Definition init.h:109
#define IVM_LEVEL_2
Definition init.h:45
#define ISC_ROUTE_ERRORS
Definition init.h:122
#define IVM_LEVEL_1
Definition init.h:44
#define CC_USR1_TO_HUP
Definition init.h:110
#define BASE_N_EVENTS
Definition init.h:32
#define CC_HARD_USR1_TO_HUP
Definition init.h:111
#define ISC_SERVER
Definition init.h:121
#define CC_NO_CLOSE
Definition init.h:112
static int min_int(int x, int y)
Definition integer.h:105
static int max_int(int x, int y)
Definition integer.h:92
static SERVICE_STATUS status
Definition interactive.c:51
void interval_init(struct interval *top, int horizon, int refresh)
Definition interval.c:34
static void event_timeout_init(struct event_timeout *et, interval_t n, const time_t last)
Initialises a timer struct.
Definition interval.h:172
static void event_timeout_clear(struct event_timeout *et)
Clears the timeout and reset all values to 0.
Definition interval.h:153
int set_lladdr(openvpn_net_ctx_t *ctx, const char *ifname, const char *lladdr, const struct env_set *es)
Definition lladdr.c:17
void management_pre_tunnel_close(struct management *man)
Definition manage.c:3093
void management_notify_client_close(struct management *management, struct man_def_auth_context *mdac, const struct env_set *es)
Definition manage.c:3011
void management_clear_callback(struct management *man)
Definition manage.c:2765
bool management_hold(struct management *man, int holdtime)
Definition manage.c:3818
struct management * management_init(void)
Definition manage.c:2695
void management_event_loop_n_seconds(struct management *man, int sec)
Definition manage.c:3447
void management_close(struct management *man)
Definition manage.c:2748
void management_set_state(struct management *man, const int state, const char *detail, const in_addr_t *tun_local_ip, const struct in6_addr *tun_local_ip6, const struct openvpn_sockaddr *local, const struct openvpn_sockaddr *remote)
Definition manage.c:2774
bool management_open(struct management *man, const char *addr, const char *port, const char *pass_file, const char *client_user, const char *client_group, const int log_history_cache, const int echo_buffer_size, const int state_buffer_size, const int remap_sigusr1, const unsigned int flags)
Definition manage.c:2709
void management_notify_generic(struct management *man, const char *str)
Definition manage.c:2925
void man_persist_client_stats(struct management *man, struct context *c)
Definition manage.c:4212
void management_set_callback(struct management *man, const struct management_callback *cb)
Definition manage.c:2758
void management_up_down(struct management *man, const char *updown, const struct env_set *es)
Definition manage.c:2909
void management_sleep(const int n)
A sleep function that services the management layer for n seconds rather than doing nothing.
Definition manage.c:4124
void management_post_tunnel_open(struct management *man, const in_addr_t tun_local_ip)
Definition manage.c:3070
static bool management_query_remote_enabled(const struct management *man)
Definition manage.h:425
#define OPENVPN_STATE_CONNECTING
Definition manage.h:449
static bool management_query_proxy_enabled(const struct management *man)
Definition manage.h:431
#define OPENVPN_STATE_CONNECTED
Definition manage.h:452
#define MF_SERVER
Definition manage.h:27
void set_std_files_to_null(bool stdin_only)
Definition misc.c:55
#define GET_USER_PASS_MANAGEMENT
Definition misc.h:110
#define GET_USER_PASS_NEED_OK
Definition misc.h:113
static bool get_user_pass(struct user_pass *up, const char *auth_file, const char *prefix, const unsigned int flags)
Retrieves the user credentials from various sources depending on the flags.
Definition misc.h:150
void frame_calculate_dynamic(struct frame *frame, struct key_type *kt, const struct options *options, struct link_socket_info *lsi)
Set the –mssfix option.
Definition mss.c:317
size_t frame_calculate_protocol_header_size(const struct key_type *kt, const struct options *options, bool occ)
Calculates the size of the OpenVPN protocol header.
Definition mtu.c:61
void frame_print(const struct frame *frame, msglvl_t msglevel, const char *prefix)
Definition mtu.c:190
#define TUN_MTU_MAX_MIN
Definition mtu.h:74
#define BUF_SIZE(f)
Definition mtu.h:183
#define TUN_MTU_MIN
Definition mtu.h:59
#define SOCKS_UDPv4_HEADROOM
Definition mtu.h:101
static const char * np(const char *str)
Definition multi-auth.c:146
void * openvpn_net_ctx_t
Definition networking.h:38
#define OCC_MTU_LOAD_INTERVAL_SECONDS
Definition occ.h:61
static int occ_reset_op(void)
Definition occ.h:101
#define OCC_INTERVAL_SECONDS
Definition occ.h:45
#define CLEAR(x)
Definition basic.h:32
void error_reset(void)
Definition error.c:155
bool set_mute_cutoff(const int cutoff)
Definition error.c:117
void set_check_status(unsigned int info_level, unsigned int verbose_level)
Definition error.c:609
void reset_check_status(void)
Definition error.c:602
bool set_debug_level(const int level, const unsigned int flags)
Definition error.c:101
#define M_OPTERR
Definition error.h:101
static bool check_debug_level(msglvl_t level)
Definition error.h:251
#define SDL_CONSTRAIN
Definition error.h:201
#define M_NOPREFIX
Definition error.h:98
#define M_USAGE
Definition error.h:107
#define M_FATAL
Definition error.h:90
static void set_check_status_error_delay(unsigned int milliseconds)
Definition error.h:315
#define M_NONFATAL
Definition error.h:91
#define M_ERR
Definition error.h:106
#define msg(flags,...)
Definition error.h:152
unsigned int msglvl_t
Definition error.h:77
#define ASSERT(x)
Definition error.h:219
#define M_WARN
Definition error.h:92
#define TLS_MODE(c)
Definition openvpn.h:539
static void packet_id_persist_init(struct packet_id_persist *p)
Definition openvpn.h:86
#define CM_P2P
Definition openvpn.h:479
#define CM_TOP_CLONE
Definition openvpn.h:481
#define CM_CHILD_TCP
Definition openvpn.h:483
#define CM_CHILD_UDP
Definition openvpn.h:482
#define MAX_PEER_ID
Definition openvpn.h:550
#define CM_TOP
Definition openvpn.h:480
void options_detach(struct options *o)
Definition options.c:1551
void pre_connect_restore(struct options *o, struct gc_arena *gc)
Definition options.c:3154
const char * options_string_version(const char *s, struct gc_arena *gc)
Definition options.c:4695
const char title_string[]
Definition options.c:72
int auth_retry_get(void)
Definition options.c:4786
void notnull(const char *arg, const char *description)
Definition options.c:4926
char * options_string(const struct options *o, const struct frame *frame, struct tuntap *tt, openvpn_net_ctx_t *ctx, bool remote, struct gc_arena *gc)
Definition options.c:4345
#define MODE_POINT_TO_POINT
Definition options.h:263
#define OPT_P_UP
Definition options.h:730
#define CE_MAN_QUERY_REMOTE_QUERY
Definition options.h:156
#define OPT_P_NCP
Negotiable crypto parameters.
Definition options.h:741
#define OPT_P_ECHO
Definition options.h:749
#define MODE_SERVER
Definition options.h:264
#define streq(x, y)
Definition options.h:724
#define OPT_P_EXPLICIT_NOTIFY
Definition options.h:748
#define CE_MAN_QUERY_REMOTE_SKIP
Definition options.h:159
#define AR_INTERACT
Definition options.h:969
#define OPT_P_SHAPER
Definition options.h:735
static bool dco_enabled(const struct options *o)
Returns whether the current configuration has dco enabled.
Definition options.h:990
#define OPT_P_SOCKFLAGS
Definition options.h:755
#define SHAPER_DEFINED(opt)
Definition options.h:772
#define CE_MAN_QUERY_REMOTE_MOD
Definition options.h:158
#define CE_MAN_QUERY_PROXY
Definition options.h:154
#define OPT_P_MESSAGES
Definition options.h:740
#define OPT_P_SETENV
Definition options.h:734
#define OPT_P_SOCKBUF
Definition options.h:754
void options_string_import(struct options *options, const char *config, const msglvl_t msglevel, const unsigned int permission_mask, unsigned int *option_types_found, struct env_set *es)
#define CE_MAN_QUERY_REMOTE_MASK
Definition options.h:160
#define OPT_P_PLUGIN
Definition options.h:753
#define OPT_P_TIMER
Definition options.h:736
#define PING_RESTART
Definition options.h:355
#define RH_PORT_LEN
Definition options.h:233
#define OPT_P_DEFAULT
Definition options.h:762
#define CE_MAN_QUERY_REMOTE_SHIFT
Definition options.h:161
#define OPT_P_DHCPDNS
Definition options.h:732
#define OPT_P_PULL_MODE
Definition options.h:752
@ GENKEY_AUTH_TOKEN
Definition options.h:242
@ GENKEY_SECRET
Definition options.h:239
@ GENKEY_TLS_CRYPTV2_SERVER
Definition options.h:241
@ GENKEY_TLS_CRYPTV2_CLIENT
Definition options.h:240
#define OPT_P_PUSH_MTU
Definition options.h:759
#define AR_NONE
Definition options.h:968
#define AR_NOINTERACT
Definition options.h:970
#define RH_HOST_LEN
Definition options.h:231
#define OPT_P_PERSIST
Definition options.h:737
#define MAX_PARMS
Definition options.h:51
#define PING_UNDEF
Definition options.h:353
#define CE_MAN_QUERY_REMOTE_ACCEPT
Definition options.h:157
#define PULL_DEFINED(opt)
Definition options.h:764
#define ROUTE_OPTION_FLAGS(o)
Definition options.h:767
#define PING_EXIT
Definition options.h:354
#define OPT_P_COMP
Definition options.h:739
#define OPT_P_ROUTE_EXTRAS
Definition options.h:751
#define OPT_P_PEER_ID
Definition options.h:757
#define OPT_P_ROUTE
Definition options.h:731
#define CE_DISABLED
Definition options.h:153
time_t now
Definition otime.c:33
static void update_time(void)
Definition otime.h:84
void time_test(void)
void packet_id_persist_save(struct packet_id_persist *p)
Definition packet_id.c:508
void packet_id_persist_load_obj(const struct packet_id_persist *p, struct packet_id *pid)
Definition packet_id.c:549
void packet_id_init(struct packet_id *p, int seq_backtrack, int time_backtrack, const char *name, int unit)
Definition packet_id.c:96
void packet_id_persist_close(struct packet_id_persist *p)
Definition packet_id.c:450
void packet_id_free(struct packet_id *p)
Definition packet_id.c:126
void packet_id_persist_load(struct packet_id_persist *p, const char *filename)
Definition packet_id.c:464
#define PRE_PULL_INITIAL_PING_RESTART
Definition ping.h:32
unsigned int platform_getpid(void)
Definition platform.c:333
const char * platform_create_temp_file(const char *directory, const char *prefix, struct gc_arena *gc)
Create a temporary file in directory, returns the filename of the created file.
Definition platform.c:540
void platform_user_group_set(const struct platform_state_user *user_state, const struct platform_state_group *group_state, struct context *c)
Definition platform.c:218
void platform_nice(int niceval)
Definition platform.c:311
bool platform_user_get(const char *username, struct platform_state_user *state)
Definition platform.c:80
bool platform_unlink(const char *filename)
Definition platform.c:487
FILE * platform_fopen(const char *path, const char *mode)
Definition platform.c:500
int platform_chdir(const char *dir)
Definition platform.c:392
void platform_mlockall(bool print_msg)
Definition platform.c:344
void platform_chroot(const char *path)
Definition platform.c:54
bool platform_group_get(const char *groupname, struct platform_state_group *state)
Definition platform.c:124
void plugin_list_close(struct plugin_list *pl)
Definition plugin.c:869
void plugin_return_free(struct plugin_return *pr)
Definition plugin.c:986
struct plugin_list * plugin_list_inherit(const struct plugin_list *src)
Definition plugin.c:690
struct plugin_list * plugin_list_init(const struct plugin_option_list *list)
Definition plugin.c:764
void plugin_return_get_column(const struct plugin_return *src, struct plugin_return *dest, const char *colname)
Definition plugin.c:972
bool plugin_defined(const struct plugin_list *pl, const int type)
Definition plugin.c:904
void plugin_list_open(struct plugin_list *pl, const struct plugin_option_list *list, struct plugin_return *pr, const struct env_set *es, const int init_point)
Definition plugin.c:774
static void plugin_return_init(struct plugin_return *pr)
Definition plugin.h:163
static int plugin_call(const struct plugin_list *pl, const int type, const struct argv *av, struct plugin_return *pr, struct env_set *es)
Definition plugin.h:195
static bool plugin_return_defined(const struct plugin_return *pr)
Definition plugin.h:157
struct ifconfig_pool_persist * ifconfig_pool_persist_init(const char *filename, int refresh_freq)
Definition pool.c:538
void ifconfig_pool_persist_close(struct ifconfig_pool_persist *persist)
Definition pool.c:560
#define TOP_NET30
Definition proto.h:41
#define DEV_TYPE_TUN
Definition proto.h:35
#define TOP_P2P
Definition proto.h:42
void http_proxy_close(struct http_proxy_info *hp)
Definition proxy.c:553
struct http_proxy_info * http_proxy_new(const struct http_proxy_options *o)
Definition proxy.c:488
struct http_proxy_options * init_http_proxy_options_once(struct http_proxy_options **hpo, struct gc_arena *gc)
Definition proxy.c:45
#define PAR_NCT
Definition proxy.h:51
#define PAR_ALL
Definition proxy.h:50
bool add_routes(struct route_list *rl, struct route_ipv6_list *rl6, const struct tuntap *tt, unsigned int flags, const struct env_set *es, openvpn_net_ctx_t *ctx)
Definition route.c:1103
void setenv_routes_ipv6(struct env_set *es, const struct route_ipv6_list *rl6)
Definition route.c:1406
bool block_local_needed(const struct route_list *rl)
Get the decision whether to block traffic to local networks while the VPN is connected.
Definition route.c:598
bool init_route_ipv6_list(struct route_ipv6_list *rl6, const struct route_ipv6_option_list *opt6, const char *remote_endpoint, int default_metric, const struct in6_addr *remote_host_ipv6, struct env_set *es, openvpn_net_ctx_t *ctx)
Definition route.c:752
void add_route_ipv6_to_option_list(struct route_ipv6_option_list *l, const char *prefix, const char *gateway, const char *metric, int table_id)
Definition route.c:509
bool init_route_list(struct route_list *rl, const struct route_option_list *opt, const char *remote_endpoint, int default_metric, in_addr_t remote_host, struct env_set *es, openvpn_net_ctx_t *ctx)
Definition route.c:606
void delete_routes(struct route_list *rl, struct route_ipv6_list *rl6, const struct tuntap *tt, unsigned int flags, const struct env_set *es, openvpn_net_ctx_t *ctx)
Definition route.c:1168
void show_routes(msglvl_t msglevel)
Definition route.c:3076
void setenv_routes(struct env_set *es, const struct route_list *rl)
Definition route.c:1369
static int route_did_redirect_default_gateway(const struct route_list *rl)
Definition route.h:426
#define RG_REROUTE_GW
Definition route.h:91
int script_security(void)
Definition run_command.c:42
#define S_FATAL
Definition run_command.h:50
#define SSEC_SCRIPTS
allow calling of built-in programs and user-defined scripts
Definition run_command.h:35
static int openvpn_run_script(const struct argv *a, const struct env_set *es, const unsigned int flags, const char *hook)
Will run a script and return the exit code of the script if between 0 and 255, -1 otherwise.
Definition run_command.h:89
#define SSEC_PW_ENV
allow calling of built-in programs and user-defined scripts that may receive a password as an environ...
Definition run_command.h:38
void shaper_msg(struct shaper *s)
Definition shaper.c:87
static void shaper_init(struct shaper *s, int bytes_per_second)
Definition shaper.h:85
void post_init_signal_catch(void)
Definition sig.c:421
void print_status(struct context *c, struct status_output *so)
Definition sig.c:478
void pre_init_signal_catch(void)
Definition sig.c:392
void remap_signal(struct context *c)
Definition sig.c:588
const char * signal_description(const int signum, const char *sigtext)
Definition sig.c:105
void restore_signal_state(void)
Definition sig.c:460
void register_signal(struct signal_info *si, int signum, const char *signal_text)
Register a soft signal in the signal_info struct si respecting priority.
Definition sig.c:228
#define IS_SIG(c)
Definition sig.h:47
#define SIG_SOURCE_HARD
Definition sig.h:30
void link_socket_init_phase1(struct context *c, int sock_index, int mode)
Definition socket.c:1357
void link_socket_init_phase2(struct context *c, struct link_socket *sock)
Definition socket.c:1700
void link_socket_update_buffer_sizes(struct link_socket *sock, int rcvbuf, int sndbuf)
Definition socket.c:567
const struct in6_addr * link_socket_current_remote_ipv6(const struct link_socket_info *info)
Definition socket.c:2003
void link_socket_close(struct link_socket *sock)
Definition socket.c:1810
in_addr_t link_socket_current_remote(const struct link_socket_info *info)
Definition socket.c:1969
void do_preresolve(struct context *c)
Definition socket.c:330
struct link_socket * link_socket_new(void)
Definition socket.c:1343
bool link_socket_update_flags(struct link_socket *sock, unsigned int sockflags)
Definition socket.c:553
#define LS_MODE_TCP_ACCEPT_FROM
Definition socket.h:181
#define LS_MODE_DEFAULT
Definition socket.h:179
#define LS_MODE_TCP_LISTEN
Definition socket.h:180
const char * proto2ascii(int proto, sa_family_t af, bool display_form)
const char * print_in_addr_t(in_addr_t addr, unsigned int flags, struct gc_arena *gc)
#define IA_EMPTY_IF_UNDEF
Definition socket_util.h:89
static bool proto_is_udp(int proto)
Returns if the protocol being used is UDP.
@ PROTO_UDP
@ PROTO_TCP
@ PROTO_TCP_CLIENT
static bool proto_is_tcp(int proto)
returns if the proto is a TCP variant (tcp-server, tcp-client or tcp)
static bool proto_is_dgram(int proto)
Return if the protocol is datagram (UDP)
static bool addr_defined(const struct openvpn_sockaddr *addr)
struct socks_proxy_info * socks_proxy_new(const char *server, const char *port, const char *authfile)
Definition socks.c:51
void socks_proxy_close(struct socks_proxy_info *sp)
Definition socks.c:78
void ssl_purge_auth(const bool auth_user_pass_only)
Definition ssl.c:381
struct tls_root_ctx * init_ssl(const struct options *options, bool in_chroot)
Build master SSL context object that serves for the whole of OpenVPN instantiation.
Definition ssl.c:511
void pem_password_setup(const char *auth_file)
Definition ssl.c:248
void init_ssl_lib(void)
Definition ssl.c:225
bool tls_session_update_crypto_params(struct tls_multi *multi, struct tls_session *session, struct options *options, struct frame *frame, struct frame *frame_fragment, struct link_socket_info *lsi, dco_context_t *dco)
Update TLS session crypto parameters (cipher and auth) and derive data channel keys based on the supp...
Definition ssl.c:1639
void free_ssl_lib(void)
Definition ssl.c:233
void auth_user_pass_setup(const char *auth_file, bool is_inline, const struct static_challenge_info *sci)
Definition ssl.c:293
void enable_auth_user_pass(void)
Definition ssl.c:287
void show_available_tls_ciphers(const char *cipher_list, const char *cipher_list_tls13, const char *tls_cert_profile)
Definition ssl.c:4099
#define TLS_MULTI_HORIZON
Definition ssl.h:61
#define TLS_MULTI_REFRESH
Definition ssl.h:60
void tls_ctx_free(struct tls_root_ctx *ctx)
Frees the library-specific TLSv1 context.
void show_available_curves(void)
Show the available elliptic curves in the crypto library.
bool tls_ctx_initialised(struct tls_root_ctx *ctx)
Checks whether the given TLS context is initialised.
@ CAS_CONNECT_DONE
Definition ssl_common.h:593
@ CAS_RECONNECT_PENDING
session has already successful established (CAS_CONNECT_DONE) but has a reconnect and needs to redo s...
Definition ssl_common.h:592
bool check_pull_client_ncp(struct context *c, const unsigned int found)
Checks whether the cipher negotiation is in an acceptable state and we continue to connect or should ...
Definition ssl_ncp.c:310
bool tls_item_in_cipher_list(const char *item, const char *list)
Return true iff item is present in the colon-separated zero-terminated cipher list.
Definition ssl_ncp.c:206
const char * get_p2p_ncp_cipher(struct tls_session *session, const char *peer_info, struct gc_arena *gc)
Determines the best common cipher from both peers IV_CIPHER lists.
Definition ssl_ncp.c:355
Control Channel SSL/Data dynamic negotiation Module This file is split from ssl.h to be able to unit ...
hmac_ctx_t * session_id_hmac_init(void)
Definition ssl_pkt.c:448
const char * tls_common_name(const struct tls_multi *multi, const bool null)
Returns the common name field for the given tunnel.
Definition ssl_verify.c:107
Control Channel Verification Module.
#define VERIFY_X509_NONE
Definition ssl_verify.h:68
#define NS_CERT_CHECK_SERVER
Do not perform Netscape certificate type verification.
Definition ssl_verify.h:252
void status_printf(struct status_output *so, const char *format,...)
Definition status.c:217
struct status_output * status_open(const char *filename, const int refresh_freq, const int msglevel, const struct virtual_output *vout, const unsigned int flags)
Definition status.c:59
bool status_close(struct status_output *so)
Definition status.c:178
#define STATUS_OUTPUT_WRITE
Definition status.h:51
Definition argv.h:35
Wrapper structure for dynamically allocated memory.
Definition buffer.h:60
int len
Length in bytes of the actual content within the allocated memory.
Definition buffer.h:65
Definition options.h:107
struct local_list * local_list
Definition options.h:108
int tun_mtu_max
Definition options.h:129
int connect_retry_seconds
Definition options.h:119
bool tls_crypt_v2_force_cookie
Definition options.h:179
int link_mtu
Definition options.h:134
bool link_mtu_defined
Definition options.h:135
int tun_mtu_extra
Definition options.h:132
int connect_retry_seconds_max
Definition options.h:120
int mssfix
Definition options.h:144
const char * tls_crypt_file
Definition options.h:170
const char * tls_crypt_v2_file
Definition options.h:175
bool tun_mtu_extra_defined
Definition options.h:133
const char * remote
Definition options.h:114
const char * socks_proxy_port
Definition options.h:124
bool mssfix_encap
Definition options.h:146
struct http_proxy_options * http_proxy_options
Definition options.h:122
bool tls_crypt_file_inline
Definition options.h:171
bool tls_auth_file_inline
Definition options.h:166
bool tun_mtu_defined
Definition options.h:131
int tls_mtu
Definition options.h:136
int explicit_exit_notification
Definition options.h:150
const char * socks_proxy_authfile
Definition options.h:125
const char * remote_port
Definition options.h:113
bool fragment_encap
Definition options.h:142
const char * socks_proxy_server
Definition options.h:123
int fragment
Definition options.h:141
int proto
Definition options.h:109
sa_family_t af
Definition options.h:110
const char * tls_auth_file
Definition options.h:165
int tun_mtu
Definition options.h:127
int key_direction
Definition options.h:167
bool tls_crypt_v2_file_inline
Definition options.h:176
unsigned int flags
Definition options.h:162
struct connection_entry ** array
Definition options.h:204
Level 0 context containing information related to the OpenVPN process.
Definition openvpn.h:137
struct platform_state_group platform_state_group
Definition openvpn.h:143
struct platform_state_user platform_state_user
Definition openvpn.h:142
bool uid_gid_chroot_set
Definition openvpn.h:141
bool uid_gid_specified
Definition openvpn.h:139
struct key_schedule ks
Definition openvpn.h:164
struct ifconfig_pool_persist * ifconfig_pool_persist
Definition openvpn.h:197
bool http_proxy_owned
Definition openvpn.h:190
struct status_output * status_output
Definition openvpn.h:185
struct route_list * route_list
List of routing information.
Definition openvpn.h:177
struct link_socket_addr * link_socket_addrs
Local and remote addresses on the external network.
Definition openvpn.h:159
struct sha256_digest pulled_options_digest_save
Hash of option strings received from the remote OpenVPN server.
Definition openvpn.h:201
int link_sockets_num
Definition openvpn.h:158
bool status_output_owned
Definition openvpn.h:186
struct route_ipv6_list * route_ipv6_list
Definition openvpn.h:182
struct packet_id_persist pid_persist
Definition openvpn.h:170
struct http_proxy_info * http_proxy
Definition openvpn.h:189
bool socks_proxy_owned
Definition openvpn.h:194
bool tuntap_owned
Whether the tun/tap interface should be cleaned up when this context is cleaned up.
Definition openvpn.h:173
bool ifconfig_pool_persist_owned
Definition openvpn.h:198
struct socks_proxy_info * socks_proxy
Definition openvpn.h:193
struct tuntap * tuntap
Tun/tap virtual network interface.
Definition openvpn.h:172
char * options_string_local
Definition openvpn.h:296
struct fragment_master * fragment
Definition openvpn.h:252
bool do_up_ran
Definition openvpn.h:411
char * options_string_remote
Definition openvpn.h:297
struct event_timeout route_wakeup_expire
Definition openvpn.h:384
bool did_open_tun
Definition openvpn.h:387
md_ctx_t * pulled_options_state
Definition openvpn.h:441
bool es_owned
Definition openvpn.h:421
struct man_def_auth_context mda_context
Definition openvpn.h:450
hmac_ctx_t * session_id_hmac
the HMAC we use to generate and verify our syn cookie like session ids from the server.
Definition openvpn.h:338
const struct link_socket * accept_from
Definition openvpn.h:242
struct tls_auth_standalone * tls_auth_standalone
TLS state structure required for the initial authentication of a client's connection attempt.
Definition openvpn.h:326
int occ_op
Definition openvpn.h:299
struct env_set * es
Definition openvpn.h:420
bool link_socket_owned
Definition openvpn.h:240
struct tls_multi * tls_multi
TLS state structure for this VPN tunnel.
Definition openvpn.h:323
struct frame frame
Definition openvpn.h:248
struct frame frame_fragment
Definition openvpn.h:253
struct crypto_options crypto_options
Security parameters and crypto state used by the Data Channel Crypto module to process data channel p...
Definition openvpn.h:349
bool buffers_owned
Definition openvpn.h:368
struct link_socket ** link_sockets
Definition openvpn.h:237
struct link_socket_info ** link_socket_infos
Definition openvpn.h:238
bool log_rw
Definition openvpn.h:380
int event_set_max
Definition openvpn.h:231
struct gc_arena gc
Garbage collection arena for allocations done in the level 2 scope of this context_2 structure.
Definition openvpn.h:225
struct sha256_digest pulled_options_digest
Definition openvpn.h:442
struct event_set * event_set
Definition openvpn.h:230
struct context_buffers * buffers
Definition openvpn.h:367
struct event_timeout route_wakeup
Definition openvpn.h:383
int tls_exit_signal
Definition openvpn.h:347
bool event_set_owned
Definition openvpn.h:232
struct buffer read_link_buf
Definition openvpn.h:113
struct buffer encrypt_buf
Definition openvpn.h:100
struct buffer read_tun_buf
Definition openvpn.h:114
struct buffer decrypt_buf
Definition openvpn.h:101
struct buffer aux_buf
Definition openvpn.h:97
int restart_sleep_seconds
Definition openvpn.h:122
struct dns_updown_runner_info duri
Definition openvpn.h:123
Contains all state information for one tunnel.
Definition openvpn.h:471
int mode
Role of this context within the OpenVPN process.
Definition openvpn.h:484
struct context_0 * c0
Level 0 context.
Definition openvpn.h:512
bool did_we_daemonize
Whether demonization has already taken place.
Definition openvpn.h:507
bool first_time
True on the first iteration of OpenVPN's main loop.
Definition openvpn.h:475
struct signal_info * sig
Internal error signaling object.
Definition openvpn.h:500
openvpn_net_ctx_t net_ctx
Networking API opaque context.
Definition openvpn.h:498
struct plugin_list * plugins
List of plug-ins.
Definition openvpn.h:502
struct context_2 c2
Level 2 context.
Definition openvpn.h:514
struct env_set * es
Set of environment variables.
Definition openvpn.h:496
struct options options
Options loaded from command line or configuration file.
Definition openvpn.h:472
bool plugins_owned
Whether the plug-ins should be cleaned up when this context is cleaned up.
Definition openvpn.h:503
struct gc_arena gc
Garbage collection arena for allocations done in the scope of this context structure.
Definition openvpn.h:492
struct context_1 c1
Level 1 context.
Definition openvpn.h:513
struct context_persist persist
Persistent context.
Definition openvpn.h:510
unsigned int flags
Bit-flags determining behavior of security operation functions.
Definition crypto.h:386
struct packet_id_persist * pid_persist
Persistent packet ID state for keeping state between successive OpenVPN process startups.
Definition crypto.h:342
struct key_ctx_bi key_ctx_bi
OpenSSL cipher and HMAC contexts for both sending and receiving directions.
Definition crypto.h:294
struct packet_id packet_id
Current packet ID state for both sending and receiving directions.
Definition crypto.h:333
Packet geometry parameters.
Definition mtu.h:108
int tun_mtu
the (user) configured tun-mtu.
Definition mtu.h:142
int payload_size
the maximum size that a payload that our buffers can hold from either tun device or network link.
Definition mtu.h:113
int tun_max_mtu
the maximum tun-mtu size the buffers are are sized for.
Definition mtu.h:152
int extra_tun
Maximum number of bytes in excess of the tun/tap MTU that might be read from or written to the virtua...
Definition mtu.h:156
int headroom
the headroom in the buffer, this is choosen to allow all potential header to be added before the pack...
Definition mtu.h:119
struct frame::@8 buf
int tailroom
the tailroom in the buffer.
Definition mtu.h:123
Garbage collection arena used to keep track of dynamically allocated memory.
Definition buffer.h:116
const char * port
Definition proxy.h:47
const char * server
Definition proxy.h:46
struct buffer tls_crypt_v2_wkc
Wrapped client key.
Definition openvpn.h:72
struct key2 original_wrap_keydata
original tls-crypt key preserved to xored into the tls_crypt renegotiation key
Definition openvpn.h:70
struct key_type key_type
Definition openvpn.h:57
struct key_ctx auth_token_key
Definition openvpn.h:73
struct key_type tls_auth_key_type
Definition openvpn.h:66
struct key_ctx_bi tls_wrap_key
Definition openvpn.h:67
struct key_ctx_bi static_key
Definition openvpn.h:60
struct tls_root_ctx * ssl_ctx
Definition openvpn.h:63
struct key_ctx tls_crypt_v2_server_key
Definition openvpn.h:71
const char * cipher
const name of the cipher
Definition crypto.h:142
const char * digest
Message digest static parameters.
Definition crypto.h:143
const char * special_state_msg
Definition manage.h:232
void(* status)(void *arg, const int version, struct status_output *so)
Definition manage.h:178
bool(* remote_entry_get)(void *arg, unsigned int index, char **remote)
Definition manage.h:198
unsigned int(* remote_entry_count)(void *arg)
Definition manage.h:197
bool(* send_cc_message)(void *arg, const char *message, const char *parameter)
Definition manage.h:184
bool(* proxy_cmd)(void *arg, const char **p)
Definition manage.h:192
void(* show_net)(void *arg, const msglvl_t msglevel)
Definition manage.h:179
unsigned int flags
Definition manage.h:176
bool(* remote_cmd)(void *arg, const char **p)
Definition manage.h:193
struct man_persist persist
Definition manage.h:333
union openvpn_sockaddr::@27 addr
struct sockaddr sa
Definition socket_util.h:42
struct sockaddr_in in4
Definition socket_util.h:43
struct sockaddr_in6 in6
Definition socket_util.h:44
int rcvbuf
Definition options.h:412
bool resolve_in_advance
Definition options.h:367
bool route_nopull
Definition options.h:436
const char * genkey_extra_data
Definition options.h:289
struct compress_options comp
Definition options.h:409
bool persist_config
Definition options.h:277
struct connection_list * connection_list
Definition options.h:294
const char * management_port
Definition options.h:446
const char * ifconfig_ipv6_remote
Definition options.h:330
int server_backoff_time
Definition options.h:309
int auth_token_renewal
Definition options.h:544
const char * tmp_dir
Definition options.h:465
bool push_peer_info
Definition options.h:682
bool daemon
Definition options.h:390
int route_default_metric
Definition options.h:428
int renegotiate_seconds_min
Definition options.h:648
const char * auth_token_secret_file
Definition options.h:545
unsigned int imported_protocol_flags
Definition options.h:721
const char * tls_export_peer_cert_dir
Definition options.h:613
bool crl_file_inline
Definition options.h:617
const char * down_script
Definition options.h:385
hash_algo_type verify_hash_algo
Definition options.h:623
int replay_time
Definition options.h:584
int management_state_buffer_size
Definition options.h:450
bool duplicate_cn
Definition options.h:526
int management_echo_buffer_size
Definition options.h:449
bool show_net_up
Definition options.h:695
bool verify_hash_no_ca
Definition options.h:625
bool use_peer_id
Definition options.h:701
unsigned remote_cert_ku[MAX_PARMS]
Definition options.h:620
bool server_bridge_defined
Definition options.h:480
const char * keying_material_exporter_label
Definition options.h:705
const char * status_file
Definition options.h:405
unsigned int ssl_flags
Definition options.h:626
bool route_noexec
Definition options.h:429
bool ifconfig_nowarn
Definition options.h:332
const char * remote_cert_eku
Definition options.h:621
int tls_timeout
Definition options.h:642
bool test_crypto
Definition options.h:586
bool up_delay
Definition options.h:388
bool server_bridge_proxy_dhcp
Definition options.h:478
const char * authname
Definition options.h:579
const char * exit_event_name
Definition options.h:693
const char * ifconfig_ipv6_local
Definition options.h:328
int replay_window
Definition options.h:583
int mute
Definition options.h:399
bool auth_user_pass_verify_script_via_file
Definition options.h:540
const char * dev_type
Definition options.h:322
int persist_mode
Definition options.h:278
int ifconfig_pool_persist_refresh_freq
Definition options.h:492
bool show_digests
Definition options.h:282
const char * up_script
Definition options.h:384
int ce_advance_count
Definition options.h:305
bool single_session
Definition options.h:680
struct remote_host_store * rh_store
Definition options.h:315
int verify_hash_depth
Definition options.h:624
bool route_delay_defined
Definition options.h:432
const char * packet_id_file
Definition options.h:585
const char * tls_crypt_v2_file
Definition options.h:670
int management_log_history_cache
Definition options.h:448
uint32_t peer_id
Definition options.h:702
struct route_option_list * routes
Definition options.h:433
int keepalive_timeout
Definition options.h:342
bool block_outside_dns
Definition options.h:697
bool tls_exit
Definition options.h:684
bool show_engines
Definition options.h:283
HANDLE msg_channel
Definition options.h:692
const char * key_pass_file
Definition options.h:280
bool mute_replay_warnings
Definition options.h:582
unsigned int unsuccessful_attempts
Definition options.h:303
int handshake_window
Definition options.h:652
const char * ifconfig_local
Definition options.h:326
char * x509_username_field[MAX_PARMS]
Definition options.h:655
struct connection_entry ce
Definition options.h:293
bool user_script_used
Definition options.h:386
bool show_tls_ciphers
Definition options.h:284
struct tuntap_options tuntap_options
Definition options.h:370
struct verify_hash_list * verify_hash
Definition options.h:622
const char * tls_cert_profile
Definition options.h:610
int64_t renegotiate_packets
Definition options.h:646
unsigned int management_flags
Definition options.h:458
const char * route_default_gateway
Definition options.h:425
bool exit_event_initial_state
Definition options.h:694
struct static_challenge_info sc_info
Definition options.h:566
bool auth_token_call_auth
Definition options.h:542
int topology
Definition options.h:325
bool disable_dco
Definition options.h:373
const char * ncp_ciphers
Definition options.h:578
bool genkey
Definition options.h:286
const char * ciphername
Definition options.h:573
const char * auth_user_pass_file
Definition options.h:559
int tls_crypt_v2_max_age
Definition options.h:677
const char * username
Definition options.h:376
struct plugin_option_list * plugin_list
Definition options.h:461
int auth_token_lifetime
Definition options.h:543
int ns_cert_type
Definition options.h:619
const char * tls_crypt_v2_verify_script
Definition options.h:675
int mode
Definition options.h:265
bool tls_server
Definition options.h:592
const char * auth_user_pass_verify_script
Definition options.h:539
int connect_retry_max
Definition options.h:292
bool pull
Definition options.h:555
bool show_curves
Definition options.h:285
const char * route_ipv6_default_gateway
Definition options.h:426
bool tls_client
Definition options.h:593
bool auth_token_generate
Definition options.h:541
bool priv_key_file_inline
Definition options.h:604
const char * tls_verify
Definition options.h:612
const char * crl_file
Definition options.h:616
int ping_rec_timeout_action
Definition options.h:356
bool auth_user_pass_file_inline
Definition options.h:560
bool show_ciphers
Definition options.h:281
bool enable_ncp_fallback
If defined fall back to ciphername if NCP fails.
Definition options.h:574
const char * route_predown_script
Definition options.h:424
int route_delay_window
Definition options.h:431
bool mlock
Definition options.h:339
int sndbuf
Definition options.h:413
struct gc_arena gc
Definition options.h:256
bool down_pre
Definition options.h:387
bool persist_tun
Definition options.h:358
int route_default_table_id
Definition options.h:427
bool auth_token_secret_file_inline
Definition options.h:546
const char * config
Definition options.h:260
int keying_material_exporter_length
Definition options.h:706
bool mtu_test
Definition options.h:337
int verify_x509_type
Definition options.h:614
const char * cipher_list_tls13
Definition options.h:608
int status_file_update_freq
Definition options.h:407
const char * management_client_user
Definition options.h:452
const char * cipher_list
Definition options.h:607
bool ccd_exclusive
Definition options.h:505
const char * genkey_filename
Definition options.h:288
const struct x509_track * x509_track
Definition options.h:686
const char * chroot_dir
Definition options.h:378
bool log
Definition options.h:394
bool shared_secret_file_inline
Definition options.h:570
int renegotiate_seconds
Definition options.h:647
int ping_rec_timeout
Definition options.h:350
unsigned int sockflags
Definition options.h:420
const char * engine
Definition options.h:580
const char * management_addr
Definition options.h:445
const char * verify_x509_name
Definition options.h:615
int ping_send_timeout
Definition options.h:349
int route_delay
Definition options.h:430
const char * dev_node
Definition options.h:323
const char * client_crresponse_script
Definition options.h:503
struct route_ipv6_option_list * routes_ipv6
Definition options.h:434
int key_direction
Definition options.h:572
bool persist_remote_ip
Definition options.h:360
bool up_restart
Definition options.h:389
int keepalive_ping
Definition options.h:341
bool no_advance
Definition options.h:298
bool tls_crypt_v2_file_inline
Definition options.h:671
const char * groupname
Definition options.h:377
const char * cd_dir
Definition options.h:379
int nice
Definition options.h:397
int transition_window
Definition options.h:658
const char * ifconfig_remote_netmask
Definition options.h:327
const char * lladdr
Definition options.h:324
int verbosity
Definition options.h:398
enum tun_driver_type windows_driver
Definition options.h:698
int remap_sigusr1
Definition options.h:392
int64_t renegotiate_bytes
Definition options.h:645
const char * route_script
Definition options.h:423
const char * management_user_pass
Definition options.h:447
const char * shared_secret_file
Definition options.h:569
bool ifconfig_noexec
Definition options.h:331
const char * dev
Definition options.h:321
const char * management_client_group
Definition options.h:453
const char * client_config_dir
Definition options.h:504
enum genkey_type genkey_type
Definition options.h:287
bool advance_next_remote
Definition options.h:301
const char * ifconfig_pool_persist_filename
Definition options.h:491
int ifconfig_ipv6_netbits
Definition options.h:329
bool persist_local_ip
Definition options.h:359
struct openvpn_plugin_string_list * list[MAX_PLUGINS]
Definition plugin.h:106
char port[RH_PORT_LEN]
Definition options.h:234
char host[RH_HOST_LEN]
Definition options.h:232
struct gc_arena gc
Definition route.h:256
unsigned int flags
Definition route.h:113
struct gc_arena * gc
Definition route.h:115
struct gc_arena gc
Definition route.h:240
Wrapper struct to pass around SHA256 digests.
Definition crypto.h:133
const char * signal_text
Definition sig.h:44
volatile int signal_received
Definition sig.h:42
volatile int source
Definition sig.h:43
unsigned int flags
Definition status.h:52
struct frame frame
Definition ssl_pkt.h:81
struct buffer workbuf
Definition ssl_pkt.h:80
struct tls_wrap_ctx tls_wrap
Definition ssl_pkt.h:79
dco_context_t * dco
Definition ssl_common.h:725
char * peer_info
A multi-line string of general-purpose info received from peer over control channel.
Definition ssl_common.h:672
enum multi_status multi_state
Definition ssl_common.h:632
struct tls_options opt
Definition ssl_common.h:616
struct tls_session session[TM_SIZE]
Array of tls_session objects representing control channel sessions with the remote peer.
Definition ssl_common.h:711
uint32_t peer_id
Definition ssl_common.h:699
bool use_peer_id
Definition ssl_common.h:700
int64_t renegotiate_bytes
Definition ssl_common.h:345
struct key_ctx auth_token_key
Definition ssl_common.h:407
unsigned int auth_token_renewal
Definition ssl_common.h:405
struct env_set * es
Definition ssl_common.h:413
unsigned int auth_token_lifetime
Definition ssl_common.h:404
struct tls_wrap_ctx tls_wrap
TLS handshake wrapping state.
Definition ssl_common.h:387
size_t ekm_label_size
Definition ssl_common.h:451
unsigned int crypto_flags
Definition ssl_common.h:368
unsigned remote_cert_ku[MAX_PARMS]
Definition ssl_common.h:359
interval_t packet_timeout
Definition ssl_common.h:344
const char * auth_user_pass_file
Definition ssl_common.h:397
const char * client_crresponse_script
Definition ssl_common.h:393
const struct static_challenge_info * sci
Definition ssl_common.h:443
openvpn_net_ctx_t * net_ctx
Definition ssl_common.h:414
const char * tmp_dir
Definition ssl_common.h:395
interval_t renegotiate_seconds
Definition ssl_common.h:350
struct frame frame
Definition ssl_common.h:389
int64_t renegotiate_packets
Definition ssl_common.h:346
bool auth_user_pass_file_inline
Definition ssl_common.h:398
int verify_hash_depth
Definition ssl_common.h:362
const struct plugin_list * plugins
Definition ssl_common.h:415
const char * client_config_dir_exclusive
Definition ssl_common.h:410
bool tls_crypt_v2
Definition ssl_common.h:382
const char * export_peer_cert_dir
Definition ssl_common.h:396
char * x509_username_field[MAX_PARMS]
Definition ssl_common.h:365
int tls_crypt_v2_max_age
Definition ssl_common.h:384
const char * verify_command
Definition ssl_common.h:353
struct verify_hash_list * verify_hash
Definition ssl_common.h:361
const char * ekm_label
Definition ssl_common.h:450
size_t ekm_size
Definition ssl_common.h:452
int transition_window
Definition ssl_common.h:342
const char * config_ciphername
Definition ssl_common.h:373
int verify_x509_type
Definition ssl_common.h:354
bool single_session
Definition ssl_common.h:328
bool data_epoch_supported
whether our underlying data channel supports new data channel features (epoch keys with AEAD tag at t...
Definition ssl_common.h:380
const char * verify_x509_name
Definition ssl_common.h:355
bool crl_file_inline
Definition ssl_common.h:357
const struct x509_track * x509_track
Definition ssl_common.h:440
bool verify_hash_no_ca
Definition ssl_common.h:363
struct man_def_auth_context * mda_context
Definition ssl_common.h:437
const char * tls_crypt_v2_verify_script
Definition ssl_common.h:383
bool auth_user_pass_verify_script_via_file
Definition ssl_common.h:394
const char * config_ncp_ciphers
Definition ssl_common.h:374
unsigned int ssl_flags
Definition ssl_common.h:434
bool auth_token_generate
Generate auth-tokens on successful user/pass auth,seet via options->auth_token_generate.
Definition ssl_common.h:400
struct key_type key_type
Definition ssl_common.h:314
int push_peer_info_detail
The detail of info we push in peer info.
Definition ssl_common.h:341
struct tls_root_ctx * ssl_ctx
Definition ssl_common.h:311
hash_algo_type verify_hash_algo
Definition ssl_common.h:364
bool auth_token_call_auth
always call normal authentication
Definition ssl_common.h:403
const char * crl_file
Definition ssl_common.h:356
int handshake_window
Definition ssl_common.h:343
bool dco_enabled
Whether keys have to be installed in DCO or not.
Definition ssl_common.h:454
const char * auth_user_pass_verify_script
Definition ssl_common.h:392
const char * remote_cert_eku
Definition ssl_common.h:360
int replay_window
Definition ssl_common.h:370
Security parameter state of a single session within a VPN tunnel.
Definition ssl_common.h:489
struct crypto_options opt
Crypto state.
Definition ssl_common.h:283
enum tls_wrap_ctx::@28 mode
Control channel wrapping mode.
struct buffer work
Work buffer (only for –tls-crypt)
Definition ssl_common.h:284
struct key_ctx tls_crypt_v2_server_key
Decrypts client keys.
Definition ssl_common.h:285
const struct buffer * tls_crypt_v2_wkc
Wrapped client key, sent to server.
Definition ssl_common.h:286
struct key2 original_wrap_keydata
original key data to be xored in to the key for dynamic tls-crypt.
Definition ssl_common.h:299
HANDLE msg_channel
Definition tun.h:88
Definition tun.h:183
in_addr_t local
Definition tun.h:210
DWORD adapter_index
Definition tun.h:234
enum tun_driver_type backend_driver
The backend driver that used for this tun/tap device.
Definition tun.h:193
struct tuntap_options options
Definition tun.h:205
struct in6_addr local_ipv6
Definition tun.h:213
dco_context_t dco
Definition tun.h:249
char * actual_name
Definition tun.h:207
in_addr_t remote_netmask
Definition tun.h:211
char password[USER_PASS_LEN]
Definition misc.h:68
char username[USER_PASS_LEN]
Definition misc.h:67
#define SIGHUP
Definition syshead.h:55
#define srandom
Definition syshead.h:44
#define SOCKET_UNDEFINED
Definition syshead.h:443
#define SIGTERM
Definition syshead.h:59
#define SIGUSR1
Definition syshead.h:57
uint32_t in_addr_t
Definition syshead.h:52
struct env_set * es
struct gc_arena gc
Definition test_ssl.c:131
void open_tun(const char *dev, const char *dev_type, const char *dev_node, struct tuntap *tt, openvpn_net_ctx_t *ctx)
Definition tun.c:5981
int dev_type_enum(const char *dev, const char *dev_type)
Definition tun.c:521
void fork_register_dns_action(struct tuntap *tt)
Definition tun.c:5369
struct tuntap * init_tun(const char *dev, const char *dev_type, int topology, const char *ifconfig_local_parm, const char *ifconfig_remote_netmask_parm, const char *ifconfig_ipv6_local_parm, int ifconfig_ipv6_netbits_parm, const char *ifconfig_ipv6_remote_parm, struct addrinfo *local_public, struct addrinfo *remote_public, const bool strict_warn, struct env_set *es, openvpn_net_ctx_t *ctx, struct tuntap *tt)
Definition tun.c:830
bool is_dev_type(const char *dev, const char *dev_type, const char *match_type)
Definition tun.c:503
void do_ifconfig(struct tuntap *tt, const char *ifname, int tun_mtu, const struct env_set *es, openvpn_net_ctx_t *ctx)
do_ifconfig - configure the tunnel interface
Definition tun.c:1566
const char * dev_type_string(const char *dev, const char *dev_type)
Definition tun.c:540
void close_tun(struct tuntap *tt, openvpn_net_ctx_t *ctx)
Definition tun.c:6132
void show_adapters(msglvl_t msglevel)
Definition tun.c:4634
void warn_on_use_of_common_subnets(openvpn_net_ctx_t *ctx)
Definition tun.c:670
void init_tun_post(struct tuntap *tt, const struct frame *frame, const struct tuntap_options *options)
Definition tun.c:954
const char * guess_tuntap_dev(const char *dev, const char *dev_type, const char *dev_node, struct gc_arena *gc)
Definition tun.c:560
void do_ifconfig_setenv(const struct tuntap *tt, struct env_set *es)
Definition tun.c:786
void undo_ifconfig(struct tuntap *tt, openvpn_net_ctx_t *ctx)
undo_ifconfig - undo configuration of the tunnel interface
Definition tun.c:1655
void tun_standby_init(struct tuntap *tt)
Definition tun.c:5287
const char * print_tun_backend_driver(enum tun_driver_type driver)
Return a string representation of the tun backed driver type.
Definition tun.c:59
#define IFCONFIG_AFTER_TUN_OPEN
Definition tun.h:351
#define IFCONFIG_BEFORE_TUN_OPEN
Definition tun.h:350
static bool tuntap_is_dco_win(struct tuntap *tt)
Definition tun.h:534
@ DRIVER_NULL
Definition tun.h:52
@ DRIVER_GENERIC_TUNTAP
Definition tun.h:47
@ DRIVER_AFUNIX
using an AF_UNIX socket to pass packets from/to an external program.
Definition tun.h:51
@ DRIVER_DCO
Definition tun.h:53
#define ROUTE_AFTER_TUN
Definition tun.h:382
static int ifconfig_order(struct tuntap *tt)
Definition tun.h:356
static void open_tun_null(struct tuntap *tt)
Definition tun.h:636
static int route_order(struct tuntap *tt)
Definition tun.h:386
#define ROUTE_BEFORE_TUN
Definition tun.h:381
static bool is_tun_type_set(const struct tuntap *tt)
Definition tun.h:630
void open_tun_afunix(struct options *o, int mtu, struct tuntap *tt, struct env_set *orig_env)
Opens an AF_UNIX based tun device.
Definition tun_afunix.c:76
void close_tun_afunix(struct tuntap *tt)
Closes the socket used for the AF_UNIX based device.
Definition tun_afunix.c:128
static bool is_tun_afunix(const char *devnode)
Checks whether a –dev-node parameter specifies a AF_UNIX device.
Definition tun_afunix.h:61
void win32_signal_open(struct win32_signal *ws, int force, const char *exit_event_name, bool exit_event_initial_state)
Definition win32.c:452
bool win_wfp_block(const NET_IFINDEX index, const HANDLE msg_channel, BOOL dns_only)
Definition win32.c:1203
void window_title_generate(const char *title)
Definition win32.c:723
void window_title_save(struct window_title *wt)
Definition win32.c:697
bool win_wfp_uninit(const NET_IFINDEX index, const HANDLE msg_channel)
Definition win32.c:1252
void init_win32(void)
Definition win32.c:107
#define WSO_MODE_CONSOLE
Definition win32.h:159
#define WSO_FORCE_SERVICE
Definition win32.h:173
#define WSO_FORCE_CONSOLE
Definition win32.h:174