OpenVPN
dco.c
Go to the documentation of this file.
1 /*
2  * OpenVPN -- An application to securely tunnel IP networks
3  * over a single TCP/UDP port, with support for SSL/TLS-based
4  * session authentication and key exchange,
5  * packet encryption, packet authentication, and
6  * packet compression.
7  *
8  * Copyright (C) 2021-2024 Arne Schwabe <arne@rfc2549.org>
9  * Copyright (C) 2021-2024 Antonio Quartulli <a@unstable.cc>
10  * Copyright (C) 2021-2024 OpenVPN Inc <sales@openvpn.net>
11  *
12  * This program is free software; you can redistribute it and/or modify
13  * it under the terms of the GNU General Public License version 2
14  * as published by the Free Software Foundation.
15  *
16  * This program is distributed in the hope that it will be useful,
17  * but WITHOUT ANY WARRANTY; without even the implied warranty of
18  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19  * GNU General Public License for more details.
20  *
21  * You should have received a copy of the GNU General Public License
22  * along with this program (see the file COPYING included with this
23  * distribution); if not, write to the Free Software Foundation, Inc.,
24  * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
25  */
26 
27 #ifdef HAVE_CONFIG_H
28 #include "config.h"
29 #endif
30 
31 #if defined(ENABLE_DCO)
32 
33 #include "syshead.h"
34 #include "crypto.h"
35 #include "dco.h"
36 #include "errlevel.h"
37 #include "multi.h"
38 #include "networking.h"
39 #include "openvpn.h"
40 #include "options.h"
41 #include "ssl_common.h"
42 #include "ssl_ncp.h"
43 #include "tun.h"
44 #include "tun_afunix.h"
45 
46 #if defined(_WIN32)
47 #include "dco_win.h"
48 #endif
49 
50 #ifdef HAVE_LIBCAPNG
51 #include <cap-ng.h>
52 #endif
53 
54 static int
55 dco_install_key(struct tls_multi *multi, struct key_state *ks,
56  const uint8_t *encrypt_key, const uint8_t *encrypt_iv,
57  const uint8_t *decrypt_key, const uint8_t *decrypt_iv,
58  const char *ciphername)
59 
60 {
61  msg(D_DCO_DEBUG, "%s: peer_id=%d keyid=%d, currently %d keys installed",
62  __func__, multi->dco_peer_id, ks->key_id, multi->dco_keys_installed);
63 
64  /* Install a key in the PRIMARY slot only when no other key exist.
65  * From that moment on, any new key will be installed in the SECONDARY
66  * slot and will be promoted to PRIMARY when userspace says so (a swap
67  * will be performed in that case)
68  */
69  dco_key_slot_t slot = OVPN_KEY_SLOT_PRIMARY;
70  if (multi->dco_keys_installed > 0)
71  {
73  }
74 
75  int ret = dco_new_key(multi->dco, multi->dco_peer_id, ks->key_id, slot,
76  encrypt_key, encrypt_iv,
77  decrypt_key, decrypt_iv,
78  ciphername);
79  if ((ret == 0) && (multi->dco_keys_installed < 2))
80  {
81  multi->dco_keys_installed++;
84  }
85 
86  return ret;
87 }
88 
89 int
90 init_key_dco_bi(struct tls_multi *multi, struct key_state *ks,
91  const struct key2 *key2, int key_direction,
92  const char *ciphername, bool server)
93 {
94  struct key_direction_state kds;
95  key_direction_state_init(&kds, key_direction);
96 
97  return dco_install_key(multi, ks,
98  key2->keys[kds.out_key].cipher,
99  key2->keys[(int)server].hmac,
100  key2->keys[kds.in_key].cipher,
101  key2->keys[1 - (int)server].hmac,
102  ciphername);
103 }
104 
113 static struct key_state *
114 dco_get_secondary_key(struct tls_multi *multi, const struct key_state *primary)
115 {
116  for (int i = 0; i < KEY_SCAN_SIZE; ++i)
117  {
118  struct key_state *ks = get_key_scan(multi, i);
119  struct key_ctx_bi *key = &ks->crypto_options.key_ctx_bi;
120 
121  if (ks == primary)
122  {
123  continue;
124  }
125 
126  if (ks->state >= S_GENERATED_KEYS && ks->authenticated == KS_AUTH_TRUE)
127  {
128  ASSERT(key->initialized);
129  return ks;
130  }
131  }
132 
133  return NULL;
134 }
135 
136 bool
137 dco_update_keys(dco_context_t *dco, struct tls_multi *multi)
138 {
139  /* this function checks if keys have to be swapped or erased, therefore it
140  * can't do much if we don't have any key installed
141  */
142  if (multi->dco_keys_installed == 0)
143  {
144  return true;
145  }
146 
147  struct key_state *primary = tls_select_encryption_key(multi);
148  /* no primary key available -> no usable key exists, therefore we should
149  * tell DCO to simply wipe all keys
150  */
151  if (!primary)
152  {
153  msg(D_DCO, "No encryption key found. Purging data channel keys");
154 
155  int ret = dco_del_key(dco, multi->dco_peer_id, OVPN_KEY_SLOT_PRIMARY);
156  if (ret < 0)
157  {
158  msg(D_DCO, "Cannot delete primary key during wipe: %s (%d)", strerror(-ret), ret);
159  return false;
160  }
161 
162  ret = dco_del_key(dco, multi->dco_peer_id, OVPN_KEY_SLOT_SECONDARY);
163  if (ret < 0)
164  {
165  msg(D_DCO, "Cannot delete secondary key during wipe: %s (%d)", strerror(-ret), ret);
166  return false;
167  }
168 
169  multi->dco_keys_installed = 0;
170  return true;
171  }
172 
173  /* if we have a primary key, it must have been installed already (keys
174  * are installed upon generation in the TLS code)
175  */
176  ASSERT(primary->dco_status != DCO_NOT_INSTALLED);
177 
178  struct key_state *secondary = dco_get_secondary_key(multi, primary);
179  /* if the current primary key was installed as secondary in DCO,
180  * this means we have promoted it since installation in DCO, and
181  * we now need to tell DCO to swap keys
182  */
183  if (primary->dco_status == DCO_INSTALLED_SECONDARY)
184  {
185  if (secondary)
186  {
187  msg(D_DCO_DEBUG, "Swapping primary and secondary keys to "
188  "primary-id=%d secondary-id=%d",
189  primary->key_id, secondary->key_id);
190  }
191  else
192  {
193  msg(D_DCO_DEBUG, "Swapping primary and secondary keys to "
194  "primary-id=%d secondary-id=(to be deleted)",
195  primary->key_id);
196  }
197 
198  int ret = dco_swap_keys(dco, multi->dco_peer_id);
199  if (ret < 0)
200  {
201  msg(D_DCO, "Cannot swap keys: %s (%d)", strerror(-ret), ret);
202  return false;
203  }
204 
206  if (secondary)
207  {
208  ASSERT(secondary->dco_status == DCO_INSTALLED_PRIMARY);
209  secondary->dco_status = DCO_INSTALLED_SECONDARY;
210  }
211  }
212 
213  /* if we have no secondary key anymore, inform DCO about it */
214  if (!secondary && multi->dco_keys_installed == 2)
215  {
216  int ret = dco_del_key(dco, multi->dco_peer_id, OVPN_KEY_SLOT_SECONDARY);
217  if (ret < 0)
218  {
219  msg(D_DCO, "Cannot delete secondary key: %s (%d)", strerror(-ret), ret);
220  return false;
221  }
222  multi->dco_keys_installed = 1;
223  }
224 
225  /* all keys that are not installed are set to NOT installed. Include also
226  * keys that might even be considered as active keys to be sure*/
227  for (int i = 0; i < TM_SIZE; ++i)
228  {
229  for (int j = 0; j < KS_SIZE; j++)
230  {
231  struct key_state *ks = &multi->session[i].key[j];
232  if (ks != primary && ks != secondary)
233  {
235  }
236  }
237  }
238  return true;
239 }
240 
241 static bool
242 dco_check_option_ce(const struct connection_entry *ce, int msglevel, int mode)
243 {
244  if (ce->fragment)
245  {
246  msg(msglevel, "Note: --fragment disables data channel offload.");
247  return false;
248  }
249 
250  if (ce->http_proxy_options)
251  {
252  msg(msglevel, "Note: --http-proxy disables data channel offload.");
253  return false;
254  }
255 
256  if (ce->socks_proxy_server)
257  {
258  msg(msglevel, "Note: --socks-proxy disables data channel offload.");
259  return false;
260  }
261 
262 #if defined(TARGET_FREEBSD)
263  if (!proto_is_udp(ce->proto))
264  {
265  msg(msglevel, "NOTE: TCP transport disables data channel offload on FreeBSD.");
266  return false;
267  }
268 #endif
269 
270 #if defined(_WIN32)
271  if (!proto_is_udp(ce->proto) && mode == MODE_SERVER)
272  {
273  msg(msglevel, "NOTE: TCP transport disables data channel offload on Windows in server mode.");
274  return false;
275  }
276 
277  if (!ce->remote && !dco_win_supports_multipeer())
278  {
279  msg(msglevel, "NOTE: --remote is not defined. This DCO version doesn't support multipeer. Disabling Data Channel Offload");
280  return false;
281  }
282 
283  if ((mode == MODE_SERVER) && (ce->local_list->len > 1))
284  {
285  msg(msglevel, "NOTE: multiple --local options defined, disabling data channel offload");
286  return false;
287  }
288 #endif
289 
290  return true;
291 }
292 
293 bool
294 dco_check_startup_option(int msglevel, const struct options *o)
295 {
296  /* check if no dev name was specified at all. In the case,
297  * later logic will most likely stop OpenVPN, so no need to
298  * print any message here.
299  */
300  if (!o->dev)
301  {
302  return false;
303  }
304 
305  if (!o->tls_client && !o->tls_server)
306  {
307  msg(msglevel, "No tls-client or tls-server option in configuration "
308  "detected. Disabling data channel offload.");
309  return false;
310  }
311 
312  if (dev_type_enum(o->dev, o->dev_type) != DEV_TYPE_TUN)
313  {
314  msg(msglevel, "Note: dev-type not tun, disabling data channel offload.");
315  return false;
316  }
317 
318  if (is_tun_afunix(o->dev_node))
319  {
320  msg(msglevel, "Note: afunix tun type selected, disabling data channel offload");
321  return false;
322  }
323 
324  if (is_dev_type(o->dev, o->dev_type, "null"))
325  {
326  msg(msglevel, "Note: null tun type selected, disabling data channel offload");
327  return false;
328  }
329 
330  if (o->connection_list)
331  {
332  const struct connection_list *l = o->connection_list;
333  for (int i = 0; i < l->len; ++i)
334  {
335  if (!dco_check_option_ce(l->array[i], msglevel, o->mode))
336  {
337  return false;
338  }
339  }
340  }
341  else
342  {
343  if (!dco_check_option_ce(&o->ce, msglevel, o->mode))
344  {
345  return false;
346  }
347  }
348 
349 #if defined(_WIN32)
350  if ((o->mode == MODE_SERVER) && !dco_win_supports_multipeer())
351  {
352  msg(msglevel, "--mode server is set. This DCO version doesn't support multipeer. Disabling Data Channel Offload");
353  return false;
354  }
355 
358  {
359  msg(msglevel, "--windows-driver is set to '%s'. Disabling Data Channel Offload",
361  return false;
362  }
363 
364  if ((o->mode == MODE_SERVER) && o->ce.local_list->len > 1)
365  {
366  msg(msglevel, "multiple --local options defined, disabling data channel offload");
367  return false;
368  }
369 
370 #elif defined(TARGET_LINUX)
371  /* if the device name is fixed, we need to check if an interface with this
372  * name already exists. IF it does, it must be a DCO interface, otherwise
373  * DCO has to be disabled in order to continue.
374  */
375  if (tun_name_is_fixed(o->dev))
376  {
377  char iftype[IFACE_TYPE_LEN_MAX];
378  /* we pass NULL as net_ctx because using DCO on Linux implies that we
379  * are using SITNL and the latter does not need any context. This way we
380  * don't need to have the net_ctx percolate all the way here
381  */
382  int ret = net_iface_type(NULL, o->dev, iftype);
383  if ((ret == 0) && (strcmp(iftype, "ovpn-dco") != 0))
384  {
385  msg(msglevel, "Interface %s exists and is non-DCO. Disabling data channel offload",
386  o->dev);
387  return false;
388  }
389  else if ((ret < 0) && (ret != -ENODEV))
390  {
391  msg(msglevel, "Cannot retrieve type of device %s: %s (%d)", o->dev,
392  strerror(-ret), ret);
393  }
394  }
395 #endif /* if defined(_WIN32) */
396 
397 #if defined(HAVE_LIBCAPNG)
398  /* DCO can't operate without CAP_NET_ADMIN. To retain it when switching user
399  * we need CAP_SETPCAP. CAP_NET_ADMIN also needs to be part of the permitted set
400  * of capabilities in order to retain it.
401  */
402  if (o->username)
403  {
404  if (!capng_have_capability(CAPNG_EFFECTIVE, CAP_SETPCAP))
405  {
406  msg(msglevel, "--user specified but lacking CAP_SETPCAP. "
407  "Cannot retain CAP_NET_ADMIN. Disabling data channel offload");
408  return false;
409  }
410  if (!capng_have_capability(CAPNG_PERMITTED, CAP_NET_ADMIN))
411  {
412  msg(msglevel, "--user specified but not permitted to retain CAP_NET_ADMIN. "
413  "Disabling data channel offload");
414  return false;
415  }
416  }
417 #endif /* if defined(HAVE_LIBCAPNG) */
418 
419  if (o->mode == MODE_SERVER && o->topology != TOP_SUBNET)
420  {
421  msg(msglevel, "Note: NOT using '--topology subnet' disables data channel offload.");
422  return false;
423  }
424 
426  {
427  msg(msglevel, "Note: --management-query-proxy disables data channel offload.");
428  return false;
429  }
430 
431  /* now that all options have been confirmed to be supported, check
432  * if DCO is truly available on the system
433  */
434  return dco_available(msglevel);
435 }
436 
437 bool
438 dco_check_option(int msglevel, const struct options *o)
439 {
440  /* At this point the ciphers have already been normalised */
441  if (o->enable_ncp_fallback
443  {
444  msg(msglevel, "Note: --data-ciphers-fallback with cipher '%s' "
445  "disables data channel offload.", o->ciphername);
446  return false;
447  }
448 
449 #if defined(USE_COMP)
450  if (o->comp.alg != COMP_ALG_UNDEF
451  || o->comp.flags & COMP_F_ALLOW_ASYM)
452  {
453  msg(msglevel, "Note: '--allow-compression' is not set to 'no', disabling data channel offload.");
454 
455  if (o->mode == MODE_SERVER && !(o->comp.flags & COMP_F_MIGRATE))
456  {
457  /* We can end up here from the multi.c call, only print the
458  * note if it is not already enabled */
459  msg(msglevel, "Consider using the '--compress migrate' option.");
460  }
461  return false;
462  }
463 #endif
464 
465  struct gc_arena gc = gc_new();
466  char *tmp_ciphers = string_alloc(o->ncp_ciphers, &gc);
467  const char *token;
468  while ((token = strsep(&tmp_ciphers, ":")))
469  {
471  {
472  msg(msglevel, "Note: cipher '%s' in --data-ciphers is not supported "
473  "by ovpn-dco, disabling data channel offload.", token);
474  gc_free(&gc);
475  return false;
476  }
477  }
478  gc_free(&gc);
479 
480  return true;
481 }
482 
483 bool
484 dco_check_pull_options(int msglevel, const struct options *o)
485 {
486  if (!o->use_peer_id)
487  {
488  msg(msglevel, "OPTIONS IMPORT: Server did not request DATA_V2 packet "
489  "format required for data channel offload");
490  return false;
491  }
492  return true;
493 }
494 
495 int
496 dco_p2p_add_new_peer(struct context *c)
497 {
498  if (!dco_enabled(&c->options))
499  {
500  return 0;
501  }
502 
503  struct link_socket *sock = c->c2.link_sockets[0];
504 
506 
507  struct sockaddr *remoteaddr = &sock->info.lsa->actual.dest.addr.sa;
508  struct tls_multi *multi = c->c2.tls_multi;
509 #ifdef TARGET_FREEBSD
510  /* In Linux in P2P mode the kernel automatically removes an existing peer
511  * when adding a new peer. FreeBSD needs to explicitly be told to do that */
512  if (c->c2.tls_multi->dco_peer_id != -1)
513  {
515  c->c2.tls_multi->dco_peer_id = -1;
516  }
517 #endif
518  int ret = dco_new_peer(&c->c1.tuntap->dco, multi->peer_id, sock->sd, NULL,
519  proto_is_dgram(sock->info.proto) ? remoteaddr : NULL,
520  NULL, NULL);
521  if (ret < 0)
522  {
523  return ret;
524  }
525 
526  c->c2.tls_multi->dco_peer_id = multi->peer_id;
527 
528  return 0;
529 }
530 
531 void
532 dco_remove_peer(struct context *c)
533 {
534  if (!dco_enabled(&c->options))
535  {
536  return;
537  }
538 
539  if (c->c1.tuntap && c->c2.tls_multi && c->c2.tls_multi->dco_peer_id != -1)
540  {
542  c->c2.tls_multi->dco_peer_id = -1;
543  }
544 }
545 
546 static bool
547 dco_multi_get_localaddr(struct multi_context *m, struct multi_instance *mi,
548  struct sockaddr_storage *local)
549 {
550 #if ENABLE_IP_PKTINFO
551  struct context *c = &mi->context;
552 
554  {
555  return false;
556  }
557 
558  struct link_socket_actual *actual = &c->c2.link_socket_infos[0]->lsa->actual;
559 
560  switch (actual->dest.addr.sa.sa_family)
561  {
562  case AF_INET:
563  {
564  struct sockaddr_in *sock_in4 = (struct sockaddr_in *)local;
565 #if defined(HAVE_IN_PKTINFO) && defined(HAVE_IPI_SPEC_DST)
566  sock_in4->sin_addr = actual->pi.in4.ipi_spec_dst;
567 #elif defined(IP_RECVDSTADDR)
568  sock_in4->sin_addr = actual->pi.in4;
569 #else
570  /* source IP not available on this platform */
571  return false;
572 #endif
573  sock_in4->sin_family = AF_INET;
574  break;
575  }
576 
577  case AF_INET6:
578  {
579  struct sockaddr_in6 *sock_in6 = (struct sockaddr_in6 *)local;
580  sock_in6->sin6_addr = actual->pi.in6.ipi6_addr;
581  sock_in6->sin6_family = AF_INET6;
582  break;
583  }
584 
585  default:
586  ASSERT(false);
587  }
588 
589  return true;
590 #else /* if ENABLE_IP_PKTINFO */
591  return false;
592 #endif /* if ENABLE_IP_PKTINFO */
593 }
594 
595 int
597 {
598  struct context *c = &mi->context;
599 
600  int peer_id = c->c2.tls_multi->peer_id;
601  struct sockaddr *remoteaddr, *localaddr = NULL;
602  struct sockaddr_storage local = { 0 };
603  int sd = c->c2.link_sockets[0]->sd;
604 
605 
606  if (c->mode == CM_CHILD_TCP)
607  {
608  /* the remote address will be inferred from the TCP socket endpoint */
609  remoteaddr = NULL;
610  }
611  else
612  {
614  remoteaddr = &c->c2.link_socket_infos[0]->lsa->actual.dest.addr.sa;
615  }
616 
617  /* In server mode we need to fetch the remote addresses from the push config */
618  struct in_addr vpn_ip4 = { 0 };
619  struct in_addr *vpn_addr4 = NULL;
620  if (c->c2.push_ifconfig_defined)
621  {
622  vpn_ip4.s_addr = htonl(c->c2.push_ifconfig_local);
623  vpn_addr4 = &vpn_ip4;
624  }
625 
626  struct in6_addr *vpn_addr6 = NULL;
628  {
629  vpn_addr6 = &c->c2.push_ifconfig_ipv6_local;
630  }
631 
632  if (dco_multi_get_localaddr(m, mi, &local))
633  {
634  localaddr = (struct sockaddr *)&local;
635  }
636 
637  int ret = dco_new_peer(&c->c1.tuntap->dco, peer_id, sd, localaddr,
638  remoteaddr, vpn_addr4, vpn_addr6);
639  if (ret < 0)
640  {
641  return ret;
642  }
643 
644  c->c2.tls_multi->dco_peer_id = peer_id;
645 
646  return 0;
647 }
648 
649 void
650 dco_install_iroute(struct multi_context *m, struct multi_instance *mi,
651  struct mroute_addr *addr)
652 {
653 #if defined(TARGET_LINUX) || defined(TARGET_FREEBSD) || defined(_WIN32)
654  if (!dco_enabled(&m->top.options))
655  {
656  return;
657  }
658 
659  int addrtype = (addr->type & MR_ADDR_MASK);
660 
661  /* If we do not have local IP addr to install, skip the route */
662  if ((addrtype == MR_ADDR_IPV6 && !mi->context.c2.push_ifconfig_ipv6_defined)
663  || (addrtype == MR_ADDR_IPV4 && !mi->context.c2.push_ifconfig_defined))
664  {
665  return;
666  }
667 
668  struct context *c = &mi->context;
669  if (addrtype == MR_ADDR_IPV6)
670  {
671 #if defined(_WIN32)
672  dco_win_add_iroute_ipv6(&c->c1.tuntap->dco, addr->v6.addr, addr->netbits, c->c2.tls_multi->peer_id);
673 #else
674  net_route_v6_add(&m->top.net_ctx, &addr->v6.addr, addr->netbits,
677 #endif
678  }
679  else if (addrtype == MR_ADDR_IPV4)
680  {
681 #if defined(_WIN32)
682  dco_win_add_iroute_ipv4(&c->c1.tuntap->dco, addr->v4.addr, addr->netbits, c->c2.tls_multi->peer_id);
683 #else
684  in_addr_t dest = htonl(addr->v4.addr);
685  net_route_v4_add(&m->top.net_ctx, &dest, addr->netbits,
688 #endif
689  }
690 #endif /* if defined(TARGET_LINUX) || defined(TARGET_FREEBSD) || defined(_WIN32) */
691 }
692 
693 void
694 dco_delete_iroutes(struct multi_context *m, struct multi_instance *mi)
695 {
696 #if defined(TARGET_LINUX) || defined(TARGET_FREEBSD) || defined(_WIN32)
697  if (!dco_enabled(&m->top.options))
698  {
699  return;
700  }
702 
703  struct context *c = &mi->context;
704 
706  {
707  for (const struct iroute *ir = c->options.iroutes;
708  ir;
709  ir = ir->next)
710  {
711 #if defined(_WIN32)
712  dco_win_del_iroute_ipv4(&c->c1.tuntap->dco, htonl(ir->network), ir->netbits);
713 #else
714  net_route_v4_del(&m->top.net_ctx, &ir->network, ir->netbits,
716  0, DCO_IROUTE_METRIC);
717 #endif
718  }
719  }
720 
722  {
723  for (const struct iroute_ipv6 *ir6 = c->options.iroutes_ipv6;
724  ir6;
725  ir6 = ir6->next)
726  {
727 #if defined(_WIN32)
728  dco_win_del_iroute_ipv6(&c->c1.tuntap->dco, ir6->network, ir6->netbits);
729 #else
730  net_route_v6_del(&m->top.net_ctx, &ir6->network, ir6->netbits,
732  0, DCO_IROUTE_METRIC);
733 #endif
734  }
735  }
736 #endif /* if defined(TARGET_LINUX) || defined(TARGET_FREEBSD) || defined(_WIN32) */
737 }
738 
739 #endif /* defined(ENABLE_DCO) */
local_list::len
int len
Definition: options.h:191
S_GENERATED_KEYS
#define S_GENERATED_KEYS
The data channel keys have been generated The TLS session is fully authenticated when reaching this s...
Definition: ssl_common.h:102
MR_ADDR_MASK
#define MR_ADDR_MASK
Definition: mroute.h:64
dco_check_option
static bool dco_check_option(int msglevel, const struct options *o)
Definition: dco.h:282
multi_instance
Server-mode state structure for one single VPN tunnel.
Definition: multi.h:103
iroute
Definition: route.h:241
D_DCO_DEBUG
#define D_DCO_DEBUG
Definition: errlevel.h:118
key_state::dco_status
enum dco_key_status dco_status
Definition: ssl_common.h:263
compress_options::alg
int alg
Definition: comp.h:68
options::use_peer_id
bool use_peer_id
Definition: options.h:701
dco_new_key
int dco_new_key(dco_context_t *dco, unsigned int peerid, int keyid, dco_key_slot_t slot, const uint8_t *encrypt_key, const uint8_t *encrypt_iv, const uint8_t *decrypt_key, const uint8_t *decrypt_iv, const char *ciphername)
Definition: dco_win.c:525
options::enable_ncp_fallback
bool enable_ncp_fallback
If defined fall back to ciphername if NCP fails.
Definition: options.h:574
gc_new
static struct gc_arena gc_new(void)
Definition: buffer.h:1025
DEV_TYPE_TUN
#define DEV_TYPE_TUN
Definition: proto.h:36
context_2::tls_multi
struct tls_multi * tls_multi
TLS state structure for this VPN tunnel.
Definition: openvpn.h:323
networking.h
IFACE_TYPE_LEN_MAX
#define IFACE_TYPE_LEN_MAX
Definition: networking.h:26
connection_entry::socks_proxy_server
const char * socks_proxy_server
Definition: options.h:121
tls_item_in_cipher_list
bool tls_item_in_cipher_list(const char *item, const char *list)
Return true iff item is present in the colon-separated zero-terminated cipher list.
Definition: ssl_ncp.c:210
context_1::tuntap
struct tuntap * tuntap
Tun/tap virtual network interface.
Definition: openvpn.h:171
TM_SIZE
#define TM_SIZE
Size of the tls_multi.session array.
Definition: ssl_common.h:539
context
Contains all state information for one tunnel.
Definition: openvpn.h:473
tls_multi::session
struct tls_session session[TM_SIZE]
Array of tls_session objects representing control channel sessions with the remote peer.
Definition: ssl_common.h:690
options::topology
int topology
Definition: options.h:320
options::dev_type
const char * dev_type
Definition: options.h:317
context_2::push_ifconfig_ipv6_local
struct in6_addr push_ifconfig_ipv6_local
Definition: openvpn.h:435
options::iroutes
struct iroute * iroutes
Definition: options.h:511
options::tls_client
bool tls_client
Definition: options.h:593
context_2::push_ifconfig_defined
bool push_ifconfig_defined
Definition: openvpn.h:428
openvpn.h
context_2::push_ifconfig_local
in_addr_t push_ifconfig_local
Definition: openvpn.h:430
options::mode
int mode
Definition: options.h:260
options::ce
struct connection_entry ce
Definition: options.h:288
TOP_SUBNET
#define TOP_SUBNET
Definition: proto.h:44
proto_is_dgram
static bool proto_is_dgram(int proto)
Return if the protocol is datagram (UDP)
Definition: socket.h:597
key_direction_state_init
void key_direction_state_init(struct key_direction_state *kds, int key_direction)
Definition: crypto.c:1705
mroute_addr::netbits
uint8_t netbits
Definition: mroute.h:82
options.h
key::hmac
uint8_t hmac[MAX_HMAC_KEY_LENGTH]
Key material for HMAC operations.
Definition: crypto.h:155
connection_entry::local_list
struct local_list * local_list
Definition: options.h:106
context::mode
int mode
Role of this context within the OpenVPN process.
Definition: openvpn.h:487
MODE_SERVER
#define MODE_SERVER
Definition: options.h:259
tls_multi
Security parameter state for a single VPN tunnel.
Definition: ssl_common.h:596
options::tls_server
bool tls_server
Definition: options.h:592
key_state::authenticated
enum ks_auth_state authenticated
Definition: ssl_common.h:251
connection_entry
Definition: options.h:104
tls_multi::dco
dco_context_t * dco
Definition: ssl_common.h:707
key_state
Security parameter state of one TLS and data channel key session.
Definition: ssl_common.h:199
KEY_SCAN_SIZE
#define KEY_SCAN_SIZE
Definition: ssl_common.h:555
key
Container for unidirectional cipher and HMAC key material.
Definition: crypto.h:151
iroute::next
struct iroute * next
Definition: route.h:244
MF_QUERY_PROXY
#define MF_QUERY_PROXY
Definition: manage.h:42
options::windows_driver
enum tun_driver_type windows_driver
Definition: options.h:698
tuntap::actual_name
char * actual_name
Definition: tun.h:205
key_state::crypto_options
struct crypto_options crypto_options
Definition: ssl_common.h:229
dco_win_add_iroute_ipv4
void dco_win_add_iroute_ipv4(dco_context_t *dco, in_addr_t dst, unsigned int netbits, unsigned int peer_id)
Definition: dco_win.c:828
TUNNEL_TYPE
#define TUNNEL_TYPE(tt)
Definition: tun.h:182
connection_list::len
int len
Definition: options.h:198
dco_get_supported_ciphers
const char * dco_get_supported_ciphers(void)
Definition: dco_win.c:799
context::c2
struct context_2 c2
Level 2 context.
Definition: openvpn.h:514
MR_ADDR_IPV6
#define MR_ADDR_IPV6
Definition: mroute.h:63
key_ctx_bi
Container for two sets of OpenSSL cipher and/or HMAC contexts for both sending and receiving directio...
Definition: crypto.h:278
string_alloc
char * string_alloc(const char *str, struct gc_arena *gc)
Definition: buffer.c:649
options::dev
const char * dev
Definition: options.h:316
ASSERT
#define ASSERT(x)
Definition: error.h:195
D_DCO
#define D_DCO
Definition: errlevel.h:94
get_key_scan
static struct key_state * get_key_scan(struct tls_multi *multi, int index)
gets an item of key_state objects in the order they should be scanned by data channel modules.
Definition: ssl_common.h:714
CM_CHILD_TCP
#define CM_CHILD_TCP
Definition: openvpn.h:486
multi_context::top
struct context top
Storage structure for process-wide configuration.
Definition: multi.h:202
connection_list
Definition: options.h:195
tun.h
openvpn_sockaddr::sa
struct sockaddr sa
Definition: socket.h:69
key_direction_state
Key ordering of the key2.keys array.
Definition: crypto.h:257
COMP_F_MIGRATE
#define COMP_F_MIGRATE
Definition: comp.h:42
options::ncp_ciphers
const char * ncp_ciphers
Definition: options.h:578
options::comp
struct compress_options comp
Definition: options.h:411
tls_session::key
struct key_state key[KS_SIZE]
Definition: ssl_common.h:515
mroute_addr::v6
struct mroute_addr::@2::@6 v6
COMP_ALG_UNDEF
#define COMP_ALG_UNDEF
Definition: comp.h:47
context::options
struct options options
Options loaded from command line or configuration file.
Definition: openvpn.h:475
MR_ADDR_IPV4
#define MR_ADDR_IPV4
Definition: mroute.h:62
options
Definition: options.h:249
crypto.h
tls_multi::dco_peer_id
int dco_peer_id
This is the handle that DCO uses to identify this session with the kernel.
Definition: ssl_common.h:705
is_tun_afunix
static bool is_tun_afunix(const char *devnode)
Checks whether a –dev-node parameter specifies a AF_UNIX device.
Definition: tun_afunix.h:69
DCO_INSTALLED_SECONDARY
@ DCO_INSTALLED_SECONDARY
Definition: ssl_common.h:178
WINDOWS_DRIVER_TAP_WINDOWS6
@ WINDOWS_DRIVER_TAP_WINDOWS6
Definition: tun.h:47
multi.h
dco_context_t
void * dco_context_t
Definition: dco.h:267
errlevel.h
dco_p2p_add_new_peer
static int dco_p2p_add_new_peer(struct context *c)
Definition: dco.h:344
OVPN_KEY_SLOT_PRIMARY
@ OVPN_KEY_SLOT_PRIMARY
Definition: ovpn_dco_freebsd.h:48
compress_options::flags
unsigned int flags
Definition: comp.h:69
dco_available
bool dco_available(int msglevel)
Definition: dco_win.c:601
KS_AUTH_TRUE
@ KS_AUTH_TRUE
Key state is authenticated.
Definition: ssl_common.h:151
DCO_IROUTE_METRIC
#define DCO_IROUTE_METRIC
Definition: dco.h:47
dco_remove_peer
static void dco_remove_peer(struct context *c)
Definition: dco.h:357
tun_afunix.h
proto_is_udp
static bool proto_is_udp(int proto)
Returns if the protocol being used is UDP.
Definition: socket.h:586
tls_multi::dco_keys_installed
int dco_keys_installed
Definition: ssl_common.h:697
dco_win_add_iroute_ipv6
void dco_win_add_iroute_ipv6(dco_context_t *dco, struct in6_addr dst, unsigned int netbits, unsigned int peer_id)
Definition: dco_win.c:847
mroute_addr::v4
struct mroute_addr::@2::@5 v4
dco_win_del_iroute_ipv4
void dco_win_del_iroute_ipv4(dco_context_t *dco, in_addr_t dst, unsigned int netbits)
Definition: dco_win.c:866
dco_delete_iroutes
static void dco_delete_iroutes(struct multi_context *m, struct multi_instance *mi)
Definition: dco.h:374
DCO_INSTALLED_PRIMARY
@ DCO_INSTALLED_PRIMARY
Definition: ssl_common.h:177
key_state::state
int state
Definition: ssl_common.h:201
mroute_addr
Definition: mroute.h:78
syshead.h
options::management_flags
unsigned int management_flags
Definition: options.h:459
dco_new_peer
int dco_new_peer(dco_context_t *dco, unsigned int peerid, int sd, struct sockaddr *localaddr, struct sockaddr *remoteaddr, struct in_addr *vpn_ipv4, struct in6_addr *vpn_ipv6)
Definition: dco_win.c:414
connection_list::array
struct connection_entry ** array
Definition: options.h:200
print_tun_backend_driver
const char * print_tun_backend_driver(enum tun_driver_type driver)
Return a string representation of the tun backed driver type.
Definition: tun.c:59
dco_check_startup_option
static bool dco_check_startup_option(int msglevel, const struct options *o)
Definition: dco.h:288
context_2::link_sockets
struct link_socket ** link_sockets
Definition: openvpn.h:237
gc_arena
Garbage collection arena used to keep track of dynamically allocated memory.
Definition: buffer.h:116
key_state::key_id
int key_id
Key id for this key_state, inherited from struct tls_session.
Definition: ssl_common.h:209
iroute_ipv6::next
struct iroute_ipv6 * next
Definition: route.h:250
dco_del_peer
int dco_del_peer(dco_context_t *dco, unsigned int peerid)
Definition: dco_win.c:465
connection_entry::http_proxy_options
struct http_proxy_options * http_proxy_options
Definition: options.h:120
context_2::link_socket_infos
struct link_socket_info ** link_socket_infos
Definition: openvpn.h:238
dco_win_supports_multipeer
bool dco_win_supports_multipeer(void)
Definition: dco_win.c:821
dco_win_del_iroute_ipv6
void dco_win_del_iroute_ipv6(dco_context_t *dco, struct in6_addr dst, unsigned int netbits)
Definition: dco_win.c:885
multi_context
Main OpenVPN server state structure.
Definition: multi.h:163
dco_enabled
static bool dco_enabled(const struct options *o)
Returns whether the current configuration has dco enabled.
Definition: options.h:930
dco.h
tls_select_encryption_key
struct key_state * tls_select_encryption_key(struct tls_multi *multi)
Selects the primary encryption that should be used to encrypt data of an outgoing packet.
Definition: ssl.c:4048
dco_del_key
int dco_del_key(dco_context_t *dco, unsigned int peerid, dco_key_slot_t slot)
Definition: dco_win.c:566
dco_swap_keys
int dco_swap_keys(dco_context_t *dco, unsigned int peer_id)
Definition: dco_win.c:575
dco_update_keys
static bool dco_update_keys(dco_context_t *dco, struct tls_multi *multi)
Definition: dco.h:337
connection_entry::remote
const char * remote
Definition: options.h:112
tuntap::dco
dco_context_t dco
Definition: tun.h:249
iroute_ipv6
Definition: route.h:247
gc_free
static void gc_free(struct gc_arena *a)
Definition: buffer.h:1033
is_dev_type
bool is_dev_type(const char *dev, const char *dev_type, const char *match_type)
Definition: tun.c:471
mroute_addr::type
uint8_t type
Definition: mroute.h:81
options::connection_list
struct connection_list * connection_list
Definition: options.h:289
WINDOWS_DRIVER_WINTUN
@ WINDOWS_DRIVER_WINTUN
Definition: tun.h:48
key::cipher
uint8_t cipher[MAX_CIPHER_KEY_LENGTH]
Key material for cipher operations.
Definition: crypto.h:153
crypto_options::key_ctx_bi
struct key_ctx_bi key_ctx_bi
OpenSSL cipher and HMAC contexts for both sending and receiving directions.
Definition: crypto.h:293
options::sockflags
unsigned int sockflags
Definition: options.h:422
options::username
const char * username
Definition: options.h:375
strsep
char * strsep(char **stringp, const char *delim)
Definition: compat-strsep.c:36
config.h
ssl_ncp.h
ssl_common.h
connection_entry::fragment
int fragment
Definition: options.h:139
tls_multi::peer_id
uint32_t peer_id
Definition: ssl_common.h:681
init_key_dco_bi
static int init_key_dco_bi(struct tls_multi *multi, struct key_state *ks, const struct key2 *key2, int key_direction, const char *ciphername, bool server)
Definition: dco.h:329
key2
Container for bidirectional cipher and HMAC key material.
Definition: crypto.h:238
connection_entry::proto
int proto
Definition: options.h:107
OVPN_KEY_SLOT_SECONDARY
@ OVPN_KEY_SLOT_SECONDARY
Definition: ovpn_dco_freebsd.h:49
dco_multi_add_new_peer
static int dco_multi_add_new_peer(struct multi_context *m, struct multi_instance *mi)
Definition: dco.h:362
DCO_NOT_INSTALLED
@ DCO_NOT_INSTALLED
Definition: ssl_common.h:176
context_2::push_ifconfig_ipv6_defined
bool push_ifconfig_ipv6_defined
Definition: openvpn.h:434
options::iroutes_ipv6
struct iroute_ipv6 * iroutes_ipv6
Definition: options.h:512
COMP_F_ALLOW_ASYM
#define COMP_F_ALLOW_ASYM
Definition: comp.h:43
tun_name_is_fixed
bool tun_name_is_fixed(const char *dev)
Definition: tun.c:1852
SF_USE_IP_PKTINFO
#define SF_USE_IP_PKTINFO
Definition: socket.h:221
KS_SIZE
#define KS_SIZE
Size of the tls_session.key array.
Definition: ssl_common.h:459
key2::keys
struct key keys[2]
Two unidirectional sets of key material.
Definition: crypto.h:242
options::ciphername
const char * ciphername
Definition: options.h:573
options::dev_node
const char * dev_node
Definition: options.h:318
msg
#define msg(flags,...)
Definition: error.h:144
dco_install_iroute
static void dco_install_iroute(struct multi_context *m, struct multi_instance *mi, struct mroute_addr *addr)
Definition: dco.h:368
dco_check_pull_options
static bool dco_check_pull_options(int msglevel, const struct options *o)
Definition: dco.h:294
dco_win.h
multi_instance::context
struct context context
The context structure storing state for this VPN tunnel.
Definition: multi.h:144
openvpn_sockaddr::addr
union openvpn_sockaddr::@20 addr
context::c1
struct context_1 c1
Level 1 context.
Definition: openvpn.h:513
dev_type_enum
int dev_type_enum(const char *dev, const char *dev_type)
Definition: tun.c:489
gc
struct gc_arena gc
Definition: test_ssl.c:155
context::net_ctx
openvpn_net_ctx_t net_ctx
Networking API opaque context.
Definition: openvpn.h:498