/* * * ConnMan VPN daemon * * Copyright (C) 2010-2014 BMW Car IT GmbH. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA * */ #ifdef HAVE_CONFIG_H #include #endif #include #include #include #include #include #include #include #define CONNMAN_API_SUBJECT_TO_CHANGE #include #include #include #include #include #include "../vpn-provider.h" #include "vpn.h" #define ARRAY_SIZE(a) (sizeof(a)/sizeof(a[0])) static DBusConnection *connection; struct { const char *cm_opt; const char *ov_opt; char has_value; } ov_options[] = { { "Host", "--remote", 1 }, { "OpenVPN.CACert", "--ca", 1 }, { "OpenVPN.Cert", "--cert", 1 }, { "OpenVPN.Key", "--key", 1 }, { "OpenVPN.MTU", "--mtu", 1 }, { "OpenVPN.NSCertType", "--ns-cert-type", 1 }, { "OpenVPN.Proto", "--proto", 1 }, { "OpenVPN.Port", "--port", 1 }, { "OpenVPN.AuthUserPass", "--auth-user-pass", 1 }, { "OpenVPN.AskPass", "--askpass", 1 }, { "OpenVPN.AuthNoCache", "--auth-nocache", 0 }, { "OpenVPN.TLSRemote", "--tls-remote", 1 }, { "OpenVPN.TLSAuth", NULL, 1 }, { "OpenVPN.TLSAuthDir", NULL, 1 }, { "OpenVPN.Cipher", "--cipher", 1 }, { "OpenVPN.Auth", "--auth", 1 }, { "OpenVPN.CompLZO", "--comp-lzo", 0 }, { "OpenVPN.RemoteCertTls", "--remote-cert-tls", 1 }, { "OpenVPN.ConfigFile", "--config", 1 }, }; struct nameserver_entry { int id; char *nameserver; }; static struct nameserver_entry *ov_append_dns_entries(const char *key, const char *value) { struct nameserver_entry *entry = NULL; gchar **options; if (!g_str_has_prefix(key, "foreign_option_")) return NULL; options = g_strsplit(value, " ", 3); if (options[0] && !strcmp(options[0], "dhcp-option") && options[1] && !strcmp(options[1], "DNS") && options[2]) { entry = g_try_new(struct nameserver_entry, 1); if (!entry) return NULL; entry->nameserver = g_strdup(options[2]); entry->id = atoi(key + 15); /* foreign_option_XXX */ } g_strfreev(options); return entry; } static char *ov_get_domain_name(const char *key, const char *value) { gchar **options; char *domain = NULL; if (!g_str_has_prefix(key, "foreign_option_")) return NULL; options = g_strsplit(value, " ", 3); if (options[0] && !strcmp(options[0], "dhcp-option") && options[1] && !strcmp(options[1], "DOMAIN") && options[2]) { domain = g_strdup(options[2]); } g_strfreev(options); return domain; } static gint cmp_ns(gconstpointer a, gconstpointer b) { struct nameserver_entry *entry_a = (struct nameserver_entry *)a; struct nameserver_entry *entry_b = (struct nameserver_entry *)b; if (entry_a->id < entry_b->id) return -1; if (entry_a->id > entry_b->id) return 1; return 0; } static void free_ns_entry(gpointer data) { struct nameserver_entry *entry = data; g_free(entry->nameserver); g_free(entry); } static int ov_notify(DBusMessage *msg, struct vpn_provider *provider) { DBusMessageIter iter, dict; const char *reason, *key, *value; char *address = NULL, *gateway = NULL, *peer = NULL; struct connman_ipaddress *ipaddress; GSList *nameserver_list = NULL; dbus_message_iter_init(msg, &iter); dbus_message_iter_get_basic(&iter, &reason); dbus_message_iter_next(&iter); if (!provider) { connman_error("No provider found"); return VPN_STATE_FAILURE; } if (strcmp(reason, "up")) return VPN_STATE_DISCONNECT; dbus_message_iter_recurse(&iter, &dict); while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) { struct nameserver_entry *ns_entry = NULL; DBusMessageIter entry; dbus_message_iter_recurse(&dict, &entry); dbus_message_iter_get_basic(&entry, &key); dbus_message_iter_next(&entry); dbus_message_iter_get_basic(&entry, &value); DBG("%s = %s", key, value); if (!strcmp(key, "trusted_ip")) gateway = g_strdup(value); if (!strcmp(key, "ifconfig_local")) address = g_strdup(value); if (!strcmp(key, "ifconfig_remote")) peer = g_strdup(value); if (g_str_has_prefix(key, "route_")) vpn_provider_append_route(provider, key, value); if ((ns_entry = ov_append_dns_entries(key, value))) nameserver_list = g_slist_prepend(nameserver_list, ns_entry); else { char *domain = ov_get_domain_name(key, value); if (domain) { vpn_provider_set_domain(provider, domain); g_free(domain); } } dbus_message_iter_next(&dict); } ipaddress = connman_ipaddress_alloc(AF_INET); if (!ipaddress) { g_slist_free_full(nameserver_list, free_ns_entry); g_free(address); g_free(gateway); g_free(peer); return VPN_STATE_FAILURE; } connman_ipaddress_set_ipv4(ipaddress, address, NULL, gateway); connman_ipaddress_set_peer(ipaddress, peer); vpn_provider_set_ipaddress(provider, ipaddress); if (nameserver_list) { char *nameservers = NULL; GSList *tmp; nameserver_list = g_slist_sort(nameserver_list, cmp_ns); for (tmp = nameserver_list; tmp; tmp = g_slist_next(tmp)) { struct nameserver_entry *ns = tmp->data; if (!nameservers) { nameservers = g_strdup(ns->nameserver); } else { char *str; str = g_strjoin(" ", nameservers, ns->nameserver, NULL); g_free(nameservers); nameservers = str; } } g_slist_free_full(nameserver_list, free_ns_entry); vpn_provider_set_nameservers(provider, nameservers); g_free(nameservers); } g_free(address); g_free(gateway); g_free(peer); connman_ipaddress_free(ipaddress); return VPN_STATE_CONNECT; } static int ov_save(struct vpn_provider *provider, GKeyFile *keyfile) { const char *option; int i; for (i = 0; i < (int)ARRAY_SIZE(ov_options); i++) { if (strncmp(ov_options[i].cm_opt, "OpenVPN.", 8) == 0) { option = vpn_provider_get_string(provider, ov_options[i].cm_opt); if (!option) continue; g_key_file_set_string(keyfile, vpn_provider_get_save_group(provider), ov_options[i].cm_opt, option); } } return 0; } static int task_append_config_data(struct vpn_provider *provider, struct connman_task *task) { const char *option; int i; for (i = 0; i < (int)ARRAY_SIZE(ov_options); i++) { if (!ov_options[i].ov_opt) continue; option = vpn_provider_get_string(provider, ov_options[i].cm_opt); if (!option) continue; if (connman_task_add_argument(task, ov_options[i].ov_opt, ov_options[i].has_value ? option : NULL) < 0) { return -EIO; } } return 0; } static int ov_connect(struct vpn_provider *provider, struct connman_task *task, const char *if_name, vpn_provider_connect_cb_t cb, const char *dbus_sender, void *user_data) { const char *option; int err = 0, fd; option = vpn_provider_get_string(provider, "Host"); if (!option) { connman_error("Host not set; cannot enable VPN"); return -EINVAL; } task_append_config_data(provider, task); option = vpn_provider_get_string(provider, "OpenVPN.ConfigFile"); if (!option) { /* * Set some default options if user has no config file. */ option = vpn_provider_get_string(provider, "OpenVPN.TLSAuth"); if (option) { connman_task_add_argument(task, "--tls-auth", option); option = vpn_provider_get_string(provider, "OpenVPN.TLSAuthDir"); if (option) connman_task_add_argument(task, option, NULL); } connman_task_add_argument(task, "--nobind", NULL); connman_task_add_argument(task, "--persist-key", NULL); connman_task_add_argument(task, "--client", NULL); } connman_task_add_argument(task, "--syslog", NULL); connman_task_add_argument(task, "--script-security", "2"); connman_task_add_argument(task, "--up", SCRIPTDIR "/openvpn-script"); connman_task_add_argument(task, "--up-restart", NULL); connman_task_add_argument(task, "--setenv", NULL); connman_task_add_argument(task, "CONNMAN_BUSNAME", dbus_bus_get_unique_name(connection)); connman_task_add_argument(task, "--setenv", NULL); connman_task_add_argument(task, "CONNMAN_INTERFACE", CONNMAN_TASK_INTERFACE); connman_task_add_argument(task, "--setenv", NULL); connman_task_add_argument(task, "CONNMAN_PATH", connman_task_get_path(task)); connman_task_add_argument(task, "--dev", if_name); connman_task_add_argument(task, "--dev-type", "tun"); connman_task_add_argument(task, "--persist-tun", NULL); connman_task_add_argument(task, "--route-noexec", NULL); connman_task_add_argument(task, "--ifconfig-noexec", NULL); /* * Disable client restarts because we can't handle this at the * moment. The problem is that when OpenVPN decides to switch * from CONNECTED state to RECONNECTING and then to RESOLVE, * it is not possible to do a DNS lookup. The DNS server is * not accessable through the tunnel anymore and so we end up * trying to resolve the OpenVPN servers address. */ connman_task_add_argument(task, "--ping-restart", "0"); fd = fileno(stderr); err = connman_task_run(task, vpn_died, provider, NULL, &fd, &fd); if (err < 0) { connman_error("openvpn failed to start"); err = -EIO; goto done; } done: if (cb) cb(provider, user_data, err); return err; } static struct vpn_driver vpn_driver = { .notify = ov_notify, .connect = ov_connect, .save = ov_save, }; static int openvpn_init(void) { connection = connman_dbus_get_connection(); return vpn_register("openvpn", &vpn_driver, OPENVPN); } static void openvpn_exit(void) { vpn_unregister("openvpn"); dbus_connection_unref(connection); } CONNMAN_PLUGIN_DEFINE(openvpn, "OpenVPN plugin", VERSION, CONNMAN_PLUGIN_PRIORITY_DEFAULT, openvpn_init, openvpn_exit)