0
0
mirror of https://github.com/OpenVPN/openvpn3.git synced 2024-09-20 04:02:15 +02:00
Commit Graph

4093 Commits

Author SHA1 Message Date
Arne Schwabe
e4f22c5567 Remove feature to allow a client to send INFO message
This is an obscure and never used feature to trigger sending
the SSO web auth URL from the client instead of server.

Signed-off-by: Arne Schwabe <arne@openvpn.net>
2023-12-13 16:51:22 +01:00
Arne Schwabe
335daeb454 Ensure Link raw pointer constructor is only used with intrusive pointers
Using the raw pointer constructor only really works if the pointer is
intrusive. Ensure this with a static assert

Signed-off-by: Arne Schwabe <arne@openvpn.net>
2023-12-13 16:51:22 +01:00
Arne Schwabe
247e74a929 Teach build to compile multiple compilation unit
Even though this script is deprecated, it is still used.

Signed-off-by: Arne Schwabe <arne@openvpn.net>
2023-12-13 16:51:22 +01:00
Frank Lichtenheld
130caea570 GHA: copy caching enhancements for coverity scan from OpenVPN 2
Do not run the daily scan if there was no push since the
last run.

Reduces resource usage and notification noise.

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-30 11:53:27 +01:00
Heiko Hund
c5d37c4184
add Doxygen comments to randapi.hpp
Document classes RandomAPI, StrongRandomAPI and WeakRandomAPI

Signed-off-by: Heiko Hund <heiko@openvpn.net>
2023-11-29 22:17:49 +01:00
Charlie Vigue
deaced48bd
Fixed call of virtual from DTOR issue
Removed virtual and changed the only overrider of the virtual to
do the special case

Signed-off-by: Charlie Vigue <charlie.vigue@openvpn.com>
2023-11-29 22:15:46 +01:00
Arne Schwabe
6af5b505f1
Fix --compress initialising the wrong stub method
The option compress is extremely seldom used since there virtually no sense
in using it as all clients that support the compress option also support
pushing compression, so adding a stub only compression method by default
in the configuration does not give any benefit, only downsides.

When compress is in the config *and* the server never pushes any compression
option (even "push compress" is fine), we initialise "comp-lzo no" instead.
And comp-lzo and compress are different compression stub methods (byte swap
vs no byte swap) that are incompatible.

compress without argument in config is extremely seldom used.

Signed-off-by: Arne Schwabe <arne@openvpn.net>
2023-11-29 21:06:37 +01:00
David Sommerseth
48aa1920c7
Sync-up with the released branch (Core v3.8.3)
Some commits targeted for the Core v3.8.3 release did not end up
in the released branch and got lost.  These were already approved
for the Core v3.8.3 release.  This marks the starting point for
the Core v3.8.4 release.

Signed-off-by: David Sommerseth <davids@openvpn.net>
2023-11-29 21:04:37 +01:00
James Yonan
a93d711927 Coverity 11892: in class Stop, address lock-free access to stop_called member
In class Stop, the stop_called member is safe to read
without locking, but make it volatile to document this.

Signed-off-by: James Yonan <james@openvpn.net>
2023-11-24 16:59:07 -07:00
Mark Deric
ecdf041d63
Fix psid cookie older client failure bug [PG-93]
Older clients, 2.5.x and below, send an ACK_V1 packet in response to
the server's HARD_RESET packet whereas 2.6.x clients send a CONTROL_V1
packet.  The code that checked the packet length of the client's
response failed to comprehend the fact the ACK_V1 packet does not
include a packet id field following the peer session id field.  So the
code rejected the ACK_V1 packet as being too short.

The fix was to require packet length only up to and including the peer
session id field.  This works to allow safe parsing for both the
ACK_V1 response and the CONTROL_V1 response.

Signed-off-by: Mark Deric <jmark@openvpn.net>
2023-11-24 21:09:26 +01:00
James Yonan
b928585086
Time: added hash() template method
hash() will return a hash of the raw time.  It's useful
for unordered map/set collections where the key is a tuple
that includes a Time object.

Because hash() is a template method, it doesn't introduce
any new dependencies for class Time.

Signed-off-by: James Yonan <james@openvpn.net>
2023-11-24 21:06:18 +01:00
James Yonan
13bae10df5
VPNServerNetblock::Netblock: added override_server_gw() method
By default, the Netblock constructor already sets the server
gateway to the .1 address of the subnet, but the new method
override_server_gw() can now be used to override that
setting.

Signed-off-by: James Yonan <james@openvpn.net>
2023-11-24 21:06:17 +01:00
James Yonan
c93b235260
unitests: added test_time to .gitignore
Signed-off-by: James Yonan <james@openvpn.net>
2023-11-24 21:06:16 +01:00
Heiko Hund
dfe26892b9 remove now unused RandomAPI::is_crypto function
Signed-off-by: Heiko Hund <heiko@openvpn.net>
2023-11-22 16:29:46 +01:00
Heiko Hund
47795ea2d5 remove 'prng' argument from SSLLib::RandomAPI ctor
It was only supported by mbedTLS and is very easily used wrong since it
is just a boolean value. Other TLS stacks were using the regular strength
PRNG no matter what. Also we should not weaken a crypto strength PRNG,
now that we have the StrongRandomAPI type in place. It might give the
wrong sense of strength, when in reality we might reseed a hundred times
less often.

In places where prng was passed as true before, use MTRand now instead.

Signed-off-by: Heiko Hund <heiko@openvpn.net>
2023-11-22 04:49:31 +01:00
Heiko Hund
87d0933b7c require TLS session ticket names use a strong PRNG
RFC 5077 talks about the ticket key_names to be randomly generated to
avoid collision between servers. To enforce unpredictable randomness,
require a strong PRNG to construct such names.

This is a formality, since all users of the class already provide such a
strong randmon number source.

Signed-off-by: Heiko Hund <heiko@openvpn.net>
2023-11-22 04:49:31 +01:00
Heiko Hund
bf6d373c93 require a strong PRNG for temp filename generation
Since predictable names for temporary files can potentially cause a
security issue, require such filenames to be generated with
unpredictable randomness.

Signed-off-by: Heiko Hund <heiko@openvpn.net>
2023-11-22 04:49:31 +01:00
Heiko Hund
e484aceec9 require a strong PRNG for session id generation
Since session ids should always be truly random require a
cryptographically strong random number generator.

Since all places in the codes (besides tests) already pass a strong
random source, this is just a formality.

Signed-off-by: Heiko Hund <heiko@openvpn.net>
2023-11-22 04:49:31 +01:00
Heiko Hund
be3f20dc58 introduce base types for strong and weak RNGs
The need of having to call the assert_crypto() member function to ensure
that a cryptographically strong RNG is used where needed, was reported
as potentially insecure, since calling it manually can easily be missed.

In the commit the two new classes StrongRandomAPI and WeakRandomAPI are
introduced. They are to be used instead of just RandomAPI, unless it
doesn't matter what strength the RNG is.

All the places the assert_crypto() was called were converted to using
StrongRandomAPI instead. Also the RNGs for which assert_crypto() was not
throwing are now inheriting from StrongRandomAPI.

Variable names, which have the StrongRandomAPI type, but were called
prng, are changed to rng instead to follow the source code convention.

Signed-off-by: Heiko Hund <heiko@openvpn.net>
2023-11-22 04:49:31 +01:00
Frank Lichtenheld
dffd6036e0 RC: suppress compiler warnings with GCC 12 and 13
We're pretty sure that these warnings are false positives.
Both are related to destructing MultiCompleteType objects.

GCC 12 (thread_unsafe_refcount):
rc.hpp:322:18: pointer used after ‘void operator delete(void*, std::size_t)’
[-Wuse-after-free]

GCC 13 (thread_safe_refcount, only arm64):
inlined from ‘...thread_safe_refcount::operator--()’ at .../rc.hpp:404:39
atomic_base.h:645:34: ‘long unsigned int __atomic_sub_fetch_8(...)’ writing
8 bytes into a region of size 0 overflows the destination
[-Werror=stringop-overflow=]

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-15 16:58:06 +01:00
Charlie Vigue
cc58225888
Replace call of virtual in CTOR w/ non-virtual
Refactors the call of a virtual member function in the CTOR
by adding a private _impl function, which is non-virtual and
which both the CTOR and the original virtual function
delegate to.

Signed-off-by: Charlie Vigue <charlie.vigue@openvpn.com>
2023-11-10 16:05:46 +01:00
Charlie Vigue
3927b61b33
Changed virtual override to final
It's possible that someone might try to derive from and override
here, and if so the result will be perhaps not as expected. This
change will make it slightly harder to produce an unexpected
call to the wrong vtable dispatch from the ctor.

Signed-off-by: Charlie Vigue <charlie.vigue@openvpn.com>
2023-11-10 16:05:27 +01:00
Frank Lichtenheld
22ba196429
SITNL: revert change of sitnl_send return type, return int
This was changed in commit
ae663c573a ("Using new numeric
conversion tools") to avoid some conversion warnings. But
after understanding the workings of the function better, the
change turns out to have been wrong. Instead the function was
changed to use different intermediate variables for different
purposes.

This change ripples through the whole Netlink/SITNL interface.

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-10 15:45:41 +01:00
Frank Lichtenheld
3b945e62e6
SITNL: document interface and code of sitnl_send function
Past changes make it clear that the interface was not well
understood.

While here, clean up the code to make it easier to understand.

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-10 15:45:40 +01:00
Frank Lichtenheld
1e135e4f05
GeNL: add explicit casts in nl interface
To allow compiling the code with -Wconversion.

Also remove one line of unused code.

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-10 15:45:29 +01:00
David Sommerseth
01a37cea97
Merge OpenVPN 3 Core Library release v3.8.3 to master
Signed-off-by: David Sommerseth <davids@openvpn.net>
2023-11-08 22:04:21 +01:00
Frank Lichtenheld
2413ad0b53
OpenSSLPKI::x509_get_serial: Handle NULL result from BN_bn2dec
The BN_bn2dec() can return NULL if the input is not parseable.
This would cause the conversion of char* to std::string to throw
an exception. Instead check the result and return an empty string
on errors.

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-08 21:27:50 +01:00
Charlie Vigue
e2f3f7509a
numeric_util: Add missing cstdint include
Signed-off-by: Charlie Vigue <charlie.vigue@openvpn.com>
2023-11-08 21:23:31 +01:00
Frank Lichtenheld
f00c816a0f
cryptodc: remove stray ';'
This causes only warnings with -Wpedantic, which we don't
intend to use. But doesn't hurt to fix anyway.

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-08 21:10:22 +01:00
Frank Lichtenheld
9b8797fe5e
CMake: Refine CXX_STANDARD setting
- Set CXX_STANDARD_REQUIRED ON so that we error out early
  if CMake thinks that the compiler does not support the
  used standard.
- Set CXX_EXTENSIONS OFF so that we get less compiler
  specific behavior.

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-08 21:10:21 +01:00
Frank Lichtenheld
268bf42b9e
CMake: accept all NEW policies in released CMake versions
Using the <max> argument to cmake_minimum_required will
set all policies up to <max> to NEW. We might need to
fix some issues arising from that, but this means that
modern CMake can already behave like it wants even with
leaving <min> so that we can support old distros (currently
Debian 10).

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-08 21:10:20 +01:00
Frank Lichtenheld
72275db1d5
client: Switch to UseSWIG instead of manual custom command
On modern CMake this gets us swig dependency management,
which should reduce problems for incremental builds.
Also it is just cleaner.

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-08 21:10:19 +01:00
Frank Lichtenheld
cb06f9e330
SplitLines/UserPass: Review fixes
Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-08 21:05:06 +01:00
Frank Lichtenheld
1cf9556fe0
SplitLines: Add doxygen documentation
Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-08 21:05:06 +01:00
Frank Lichtenheld
59a1d2398e
test_splitlines: New UT for SplitLines
Also enable UserPass UT that now passes with new
SplitLines.

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-08 21:05:05 +01:00
Frank Lichtenheld
4620b1f8cd
SplitLines: throw on error
Except in the next() interface which allows for more
fine-grained error control.

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-08 21:05:04 +01:00
Frank Lichtenheld
34c06c2f7a
UserPass: add doxygen documentation
Based on the understanding from the unittest.

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-08 21:05:03 +01:00
Frank Lichtenheld
3eaac582d0
HTTPProxyTransport: Simplify parsing of http-proxy-user-pass
Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-08 21:05:02 +01:00
Frank Lichtenheld
079fb4dd4d
UserPass: Add unittest
Fixed one issue while at it, with parse() not clearing
the username and password arguments.

The general issue that overflow doesn't throw is reflected in
a disabled test. This will need to be fixed in SplitLines,
probably.

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-08 21:05:01 +01:00
Frank Lichtenheld
185182e1be
UserPass: rename one overload of parse to parse_file
This really has very different implications than the
others overloads. So make it distinct.

I would also rename the others to parse_opt, but feel
that causes too much churn in the code. parse_file has
only one use in our own code base.

Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
2023-11-08 21:04:41 +01:00
David Sommerseth
7b145649c7
Release: OpenVPN 3 Core Library, version 3.8.3
Signed-off-by: David Sommerseth <davids@openvpn.net>
2023-11-08 12:59:24 +01:00
Lev Stipakov
97b3c0a594 Add route tables manipulation functionality
This adds two routines:

  AWS::Route::create_route_table

This creates route table in given VPC and
assigns "Name" tag to it with provided value.

  AWS::Route::get_route_table_by_name

This searches for route table with given "Name"
tag and either returns route table id or empty string
if route table doesn't exist.

These routines are used by Linux client AWS addon.

Signed-off-by: Lev Stipakov <lev@openvpn.net>
2023-10-26 12:12:58 +00:00
Arne Schwabe
384c749754
Add ifconfig, topology and route-gateway to push only options
Signed-off-by: Arne Schwabe <arne@openvpn.net>
2023-10-25 22:35:48 +02:00
Arne Schwabe
66da32a859
Add block-outside-dns and tun-mtu-extra to ignore and warn list
Signed-off-by: Arne Schwabe <arne@openvpn.net>
2023-10-25 22:35:47 +02:00
Arne Schwabe
89d382853e
Allow key-method 2 in OpenVPN3 client configs
Also this is a very rare option to be used today as it was for compatibility
with OpenVPN 1.x we should still not error out when it is present.

Signed-off-by: Arne Schwabe <arne@openvpn.net>
2023-10-25 22:35:46 +02:00
Arne Schwabe
0be01b8859
Do not warn twice about options in settings_feature_not_implemented_warn
Signed-off-by: Arne Schwabe <arne@openvpn.net>
2023-10-25 22:35:45 +02:00
Arne Schwabe
bf5df01ac8
Add no-iv to the removed options that we cannot support anymore
Signed-off-by: Arne Schwabe <arne@openvpn.net>
2023-10-25 22:35:44 +02:00
Arne Schwabe
153c80cfef
Add route-delay to ignored but warned options
Signed-off-by: Arne Schwabe <arne@openvpn.net>
2023-10-25 22:35:43 +02:00
Arne Schwabe
181dafdb0d
Add unsupported option name in error message
Signed-off-by: Arne Schwabe <arne@openvpn.net>
2023-10-25 22:35:43 +02:00
Arne Schwabe
11ec627a93
Allow ovpn::string::join to work also with other contains than std::vector
Signed-off-by: Arne Schwabe <arne@openvpn.net>
2023-10-25 22:35:42 +02:00