OpenVPN
interactive.c
Go to the documentation of this file.
1 /*
2  * OpenVPN -- An application to securely tunnel IP networks
3  * over a single TCP/UDP port, with support for SSL/TLS-based
4  * session authentication and key exchange,
5  * packet encryption, packet authentication, and
6  * packet compression.
7  *
8  * Copyright (C) 2012-2024 Heiko Hund <heiko.hund@sophos.com>
9  *
10  * This program is free software; you can redistribute it and/or modify
11  * it under the terms of the GNU General Public License version 2
12  * as published by the Free Software Foundation.
13  *
14  * This program is distributed in the hope that it will be useful,
15  * but WITHOUT ANY WARRANTY; without even the implied warranty of
16  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17  * GNU General Public License for more details.
18  *
19  * You should have received a copy of the GNU General Public License along
20  * with this program; if not, write to the Free Software Foundation, Inc.,
21  * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
22  */
23 
24 
25 #include "service.h"
26 
27 #include <ws2tcpip.h>
28 #include <iphlpapi.h>
29 #include <userenv.h>
30 #include <accctrl.h>
31 #include <aclapi.h>
32 #include <stdio.h>
33 #include <sddl.h>
34 #include <shellapi.h>
35 #include <mstcpip.h>
36 #include <inttypes.h>
37 
38 #include <versionhelpers.h>
39 
40 #include "openvpn-msg.h"
41 #include "validate.h"
42 #include "wfp_block.h"
43 #include "ring_buffer.h"
44 
45 #define IO_TIMEOUT 2000 /*ms*/
46 
47 #define ERROR_OPENVPN_STARTUP 0x20000000
48 #define ERROR_STARTUP_DATA 0x20000001
49 #define ERROR_MESSAGE_DATA 0x20000002
50 #define ERROR_MESSAGE_TYPE 0x20000003
51 
52 static SERVICE_STATUS_HANDLE service;
53 static SERVICE_STATUS status = { .dwServiceType = SERVICE_WIN32_SHARE_PROCESS };
54 static HANDLE exit_event = NULL;
56 static HANDLE rdns_semaphore = NULL;
57 #define RDNS_TIMEOUT 600 /* seconds to wait for the semaphore */
58 
59 #define TUN_IOCTL_REGISTER_RINGS CTL_CODE(51820U, 0x970U, METHOD_BUFFERED, FILE_READ_DATA | FILE_WRITE_DATA)
60 
63  _L(PACKAGE_NAME) L"ServiceInteractive",
64  _L(PACKAGE_NAME) L" Interactive Service",
66  SERVICE_AUTO_START
67 };
68 
69 
70 typedef struct {
71  WCHAR *directory;
72  WCHAR *options;
73  WCHAR *std_input;
74 } STARTUP_DATA;
75 
76 
77 /* Datatype for linked lists */
78 typedef struct _list_item {
79  struct _list_item *next;
80  LPVOID data;
81 } list_item_t;
82 
83 
84 /* Datatypes for undo information */
85 typedef enum {
95 } undo_type_t;
97 
98 typedef struct {
99  HANDLE engine;
100  int index;
104 
105 typedef struct {
106  char itf_name[256];
107  PWSTR domains;
109 
110 typedef struct {
114 
115 typedef union {
127 
128 static DWORD
129 AddListItem(list_item_t **pfirst, LPVOID data)
130 {
131  list_item_t *new_item = malloc(sizeof(list_item_t));
132  if (new_item == NULL)
133  {
134  return ERROR_OUTOFMEMORY;
135  }
136 
137  new_item->next = *pfirst;
138  new_item->data = data;
139 
140  *pfirst = new_item;
141  return NO_ERROR;
142 }
143 
144 typedef BOOL (*match_fn_t) (LPVOID item, LPVOID ctx);
145 
146 static LPVOID
147 RemoveListItem(list_item_t **pfirst, match_fn_t match, LPVOID ctx)
148 {
149  LPVOID data = NULL;
150  list_item_t **pnext;
151 
152  for (pnext = pfirst; *pnext; pnext = &(*pnext)->next)
153  {
154  list_item_t *item = *pnext;
155  if (!match(item->data, ctx))
156  {
157  continue;
158  }
159 
160  /* Found item, remove from the list and free memory */
161  *pnext = item->next;
162  data = item->data;
163  free(item);
164  break;
165  }
166  return data;
167 }
168 
169 
170 static HANDLE
171 CloseHandleEx(LPHANDLE handle)
172 {
173  if (handle && *handle && *handle != INVALID_HANDLE_VALUE)
174  {
175  CloseHandle(*handle);
176  *handle = INVALID_HANDLE_VALUE;
177  }
178  return INVALID_HANDLE_VALUE;
179 }
180 
181 static void
183 {
184  if (ring && *ring)
185  {
186  UnmapViewOfFile(*ring);
187  *ring = NULL;
188  }
189 }
190 
191 static void
193 {
194  OvpnUnmapViewOfFile(&ring_buffer_maps->send_ring);
195  OvpnUnmapViewOfFile(&ring_buffer_maps->receive_ring);
196 }
197 
198 static HANDLE
199 InitOverlapped(LPOVERLAPPED overlapped)
200 {
201  ZeroMemory(overlapped, sizeof(OVERLAPPED));
202  overlapped->hEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
203  return overlapped->hEvent;
204 }
205 
206 
207 static BOOL
208 ResetOverlapped(LPOVERLAPPED overlapped)
209 {
210  HANDLE io_event = overlapped->hEvent;
211  if (!ResetEvent(io_event))
212  {
213  return FALSE;
214  }
215  ZeroMemory(overlapped, sizeof(OVERLAPPED));
216  overlapped->hEvent = io_event;
217  return TRUE;
218 }
219 
220 
221 typedef enum {
225 } async_op_t;
226 
227 static DWORD
228 AsyncPipeOp(async_op_t op, HANDLE pipe, LPVOID buffer, DWORD size, DWORD count, LPHANDLE events)
229 {
230  DWORD i;
231  BOOL success;
232  HANDLE io_event;
233  DWORD res, bytes = 0;
234  OVERLAPPED overlapped;
235  LPHANDLE handles = NULL;
236 
237  io_event = InitOverlapped(&overlapped);
238  if (!io_event)
239  {
240  goto out;
241  }
242 
243  handles = malloc((count + 1) * sizeof(HANDLE));
244  if (!handles)
245  {
246  goto out;
247  }
248 
249  if (op == write)
250  {
251  success = WriteFile(pipe, buffer, size, NULL, &overlapped);
252  }
253  else
254  {
255  success = ReadFile(pipe, buffer, size, NULL, &overlapped);
256  }
257  if (!success && GetLastError() != ERROR_IO_PENDING && GetLastError() != ERROR_MORE_DATA)
258  {
259  goto out;
260  }
261 
262  handles[0] = io_event;
263  for (i = 0; i < count; i++)
264  {
265  handles[i + 1] = events[i];
266  }
267 
268  res = WaitForMultipleObjects(count + 1, handles, FALSE,
269  op == peek ? INFINITE : IO_TIMEOUT);
270  if (res != WAIT_OBJECT_0)
271  {
272  CancelIo(pipe);
273  goto out;
274  }
275 
276  if (op == peek)
277  {
278  PeekNamedPipe(pipe, NULL, 0, NULL, &bytes, NULL);
279  }
280  else
281  {
282  GetOverlappedResult(pipe, &overlapped, &bytes, TRUE);
283  }
284 
285 out:
286  CloseHandleEx(&io_event);
287  free(handles);
288  return bytes;
289 }
290 
291 static DWORD
292 PeekNamedPipeAsync(HANDLE pipe, DWORD count, LPHANDLE events)
293 {
294  return AsyncPipeOp(peek, pipe, NULL, 0, count, events);
295 }
296 
297 static DWORD
298 ReadPipeAsync(HANDLE pipe, LPVOID buffer, DWORD size, DWORD count, LPHANDLE events)
299 {
300  return AsyncPipeOp(read, pipe, buffer, size, count, events);
301 }
302 
303 static DWORD
304 WritePipeAsync(HANDLE pipe, LPVOID data, DWORD size, DWORD count, LPHANDLE events)
305 {
306  return AsyncPipeOp(write, pipe, data, size, count, events);
307 }
308 
309 static VOID
310 ReturnProcessId(HANDLE pipe, DWORD pid, DWORD count, LPHANDLE events)
311 {
312  const WCHAR msg[] = L"Process ID";
313  WCHAR buf[22 + _countof(msg)]; /* 10 chars each for error and PID and 2 for line breaks */
314 
315  /*
316  * Same format as error messages (3 line string) with error = 0 in
317  * 0x%08x format, PID on line 2 and a description "Process ID" on line 3
318  */
319  swprintf(buf, _countof(buf), L"0x%08x\n0x%08x\n%ls", 0, pid, msg);
320 
321  WritePipeAsync(pipe, buf, (DWORD)(wcslen(buf) * 2), count, events);
322 }
323 
324 static VOID
325 ReturnError(HANDLE pipe, DWORD error, LPCWSTR func, DWORD count, LPHANDLE events)
326 {
327  DWORD result_len;
328  LPWSTR result = L"0xffffffff\nFormatMessage failed\nCould not return result";
329  DWORD_PTR args[] = {
330  (DWORD_PTR) error,
331  (DWORD_PTR) func,
332  (DWORD_PTR) ""
333  };
334 
335  if (error != ERROR_OPENVPN_STARTUP)
336  {
337  FormatMessageW(FORMAT_MESSAGE_FROM_SYSTEM
338  |FORMAT_MESSAGE_ALLOCATE_BUFFER
339  |FORMAT_MESSAGE_IGNORE_INSERTS,
340  0, error, 0, (LPWSTR) &args[2], 0, NULL);
341  }
342 
343  result_len = FormatMessageW(FORMAT_MESSAGE_FROM_STRING
344  |FORMAT_MESSAGE_ALLOCATE_BUFFER
345  |FORMAT_MESSAGE_ARGUMENT_ARRAY,
346  L"0x%1!08x!\n%2!s!\n%3!s!", 0, 0,
347  (LPWSTR) &result, 0, (va_list *) args);
348 
349  WritePipeAsync(pipe, result, (DWORD)(wcslen(result) * 2), count, events);
351 
352  if (error != ERROR_OPENVPN_STARTUP)
353  {
354  LocalFree((LPVOID) args[2]);
355  }
356  if (result_len)
357  {
358  LocalFree(result);
359  }
360 }
361 
362 
363 static VOID
364 ReturnLastError(HANDLE pipe, LPCWSTR func)
365 {
366  ReturnError(pipe, GetLastError(), func, 1, &exit_event);
367 }
368 
369 /*
370  * Validate options against a white list. Also check the config_file is
371  * inside the config_dir. The white list is defined in validate.c
372  * Returns true on success, false on error with reason set in errmsg.
373  */
374 static BOOL
375 ValidateOptions(HANDLE pipe, const WCHAR *workdir, const WCHAR *options, WCHAR *errmsg, DWORD capacity)
376 {
377  WCHAR **argv;
378  int argc;
379  BOOL ret = FALSE;
380  int i;
381  const WCHAR *msg1 = L"You have specified a config file location (%ls relative to %ls)"
382  L" that requires admin approval. This error may be avoided"
383  L" by adding your account to the \"%ls\" group";
384 
385  const WCHAR *msg2 = L"You have specified an option (%ls) that may be used"
386  L" only with admin approval. This error may be avoided"
387  L" by adding your account to the \"%ls\" group";
388 
389  argv = CommandLineToArgvW(options, &argc);
390 
391  if (!argv)
392  {
393  swprintf(errmsg, capacity,
394  L"Cannot validate options: CommandLineToArgvW failed with error = 0x%08x",
395  GetLastError());
396  goto out;
397  }
398 
399  /* Note: argv[0] is the first option */
400  if (argc < 1) /* no options */
401  {
402  ret = TRUE;
403  goto out;
404  }
405 
406  /*
407  * If only one argument, it is the config file
408  */
409  if (argc == 1)
410  {
411  WCHAR *argv_tmp[2] = { L"--config", argv[0] };
412 
413  if (!CheckOption(workdir, 2, argv_tmp, &settings))
414  {
415  swprintf(errmsg, capacity, msg1, argv[0], workdir,
417  }
418  goto out;
419  }
420 
421  for (i = 0; i < argc; ++i)
422  {
423  if (!IsOption(argv[i]))
424  {
425  continue;
426  }
427 
428  if (!CheckOption(workdir, argc-i, &argv[i], &settings))
429  {
430  if (wcscmp(L"--config", argv[i]) == 0 && argc-i > 1)
431  {
432  swprintf(errmsg, capacity, msg1, argv[i+1], workdir,
434  }
435  else
436  {
437  swprintf(errmsg, capacity, msg2, argv[i],
439  }
440  goto out;
441  }
442  }
443 
444  /* all options passed */
445  ret = TRUE;
446 
447 out:
448  if (argv)
449  {
450  LocalFree(argv);
451  }
452  return ret;
453 }
454 
455 static BOOL
456 GetStartupData(HANDLE pipe, STARTUP_DATA *sud)
457 {
458  size_t size, len;
459  WCHAR *data = NULL;
460  DWORD bytes, read;
461 
462  bytes = PeekNamedPipeAsync(pipe, 1, &exit_event);
463  if (bytes == 0)
464  {
465  MsgToEventLog(M_SYSERR, L"PeekNamedPipeAsync failed");
466  ReturnLastError(pipe, L"PeekNamedPipeAsync");
467  goto err;
468  }
469 
470  size = bytes / sizeof(*data);
471  if (size == 0)
472  {
473  MsgToEventLog(M_SYSERR, L"malformed startup data: 1 byte received");
474  ReturnError(pipe, ERROR_STARTUP_DATA, L"GetStartupData", 1, &exit_event);
475  goto err;
476  }
477 
478  data = malloc(bytes);
479  if (data == NULL)
480  {
481  MsgToEventLog(M_SYSERR, L"malloc failed");
482  ReturnLastError(pipe, L"malloc");
483  goto err;
484  }
485 
486  read = ReadPipeAsync(pipe, data, bytes, 1, &exit_event);
487  if (bytes != read)
488  {
489  MsgToEventLog(M_SYSERR, L"ReadPipeAsync failed");
490  ReturnLastError(pipe, L"ReadPipeAsync");
491  goto err;
492  }
493 
494  if (data[size - 1] != 0)
495  {
496  MsgToEventLog(M_ERR, L"Startup data is not NULL terminated");
497  ReturnError(pipe, ERROR_STARTUP_DATA, L"GetStartupData", 1, &exit_event);
498  goto err;
499  }
500 
501  sud->directory = data;
502  len = wcslen(sud->directory) + 1;
503  size -= len;
504  if (size <= 0)
505  {
506  MsgToEventLog(M_ERR, L"Startup data ends at working directory");
507  ReturnError(pipe, ERROR_STARTUP_DATA, L"GetStartupData", 1, &exit_event);
508  goto err;
509  }
510 
511  sud->options = sud->directory + len;
512  len = wcslen(sud->options) + 1;
513  size -= len;
514  if (size <= 0)
515  {
516  MsgToEventLog(M_ERR, L"Startup data ends at command line options");
517  ReturnError(pipe, ERROR_STARTUP_DATA, L"GetStartupData", 1, &exit_event);
518  goto err;
519  }
520 
521  sud->std_input = sud->options + len;
522  return TRUE;
523 
524 err:
525  sud->directory = NULL; /* caller must not free() */
526  free(data);
527  return FALSE;
528 }
529 
530 
531 static VOID
533 {
534  free(sud->directory);
535 }
536 
537 
538 static SOCKADDR_INET
539 sockaddr_inet(short family, inet_address_t *addr)
540 {
541  SOCKADDR_INET sa_inet;
542  ZeroMemory(&sa_inet, sizeof(sa_inet));
543  sa_inet.si_family = family;
544  if (family == AF_INET)
545  {
546  sa_inet.Ipv4.sin_addr = addr->ipv4;
547  }
548  else if (family == AF_INET6)
549  {
550  sa_inet.Ipv6.sin6_addr = addr->ipv6;
551  }
552  return sa_inet;
553 }
554 
555 static DWORD
556 InterfaceLuid(const char *iface_name, PNET_LUID luid)
557 {
558  NETIO_STATUS status;
559  LPWSTR wide_name = utf8to16(iface_name);
560 
561  if (wide_name)
562  {
563  status = ConvertInterfaceAliasToLuid(wide_name, luid);
564  free(wide_name);
565  }
566  else
567  {
568  status = ERROR_OUTOFMEMORY;
569  }
570  return status;
571 }
572 
573 static BOOL
574 CmpAddress(LPVOID item, LPVOID address)
575 {
576  return memcmp(item, address, sizeof(MIB_UNICASTIPADDRESS_ROW)) == 0 ? TRUE : FALSE;
577 }
578 
579 static DWORD
580 DeleteAddress(PMIB_UNICASTIPADDRESS_ROW addr_row)
581 {
582  return DeleteUnicastIpAddressEntry(addr_row);
583 }
584 
585 static DWORD
587 {
588  DWORD err;
589  PMIB_UNICASTIPADDRESS_ROW addr_row;
590  BOOL add = msg->header.type == msg_add_address;
591 
592  addr_row = malloc(sizeof(*addr_row));
593  if (addr_row == NULL)
594  {
595  return ERROR_OUTOFMEMORY;
596  }
597 
598  InitializeUnicastIpAddressEntry(addr_row);
599  addr_row->Address = sockaddr_inet(msg->family, &msg->address);
600  addr_row->OnLinkPrefixLength = (UINT8) msg->prefix_len;
601 
602  if (msg->iface.index != -1)
603  {
604  addr_row->InterfaceIndex = msg->iface.index;
605  }
606  else
607  {
608  NET_LUID luid;
609  err = InterfaceLuid(msg->iface.name, &luid);
610  if (err)
611  {
612  goto out;
613  }
614  addr_row->InterfaceLuid = luid;
615  }
616 
617  if (add)
618  {
619  err = CreateUnicastIpAddressEntry(addr_row);
620  if (err)
621  {
622  goto out;
623  }
624 
625  err = AddListItem(&(*lists)[address], addr_row);
626  if (err)
627  {
628  DeleteAddress(addr_row);
629  }
630  }
631  else
632  {
633  err = DeleteAddress(addr_row);
634  if (err)
635  {
636  goto out;
637  }
638 
639  free(RemoveListItem(&(*lists)[address], CmpAddress, addr_row));
640  }
641 
642 out:
643  if (!add || err)
644  {
645  free(addr_row);
646  }
647 
648  return err;
649 }
650 
651 static BOOL
652 CmpRoute(LPVOID item, LPVOID route)
653 {
654  return memcmp(item, route, sizeof(MIB_IPFORWARD_ROW2)) == 0 ? TRUE : FALSE;
655 }
656 
657 static DWORD
658 DeleteRoute(PMIB_IPFORWARD_ROW2 fwd_row)
659 {
660  return DeleteIpForwardEntry2(fwd_row);
661 }
662 
663 static DWORD
665 {
666  DWORD err;
667  PMIB_IPFORWARD_ROW2 fwd_row;
668  BOOL add = msg->header.type == msg_add_route;
669 
670  fwd_row = malloc(sizeof(*fwd_row));
671  if (fwd_row == NULL)
672  {
673  return ERROR_OUTOFMEMORY;
674  }
675 
676  ZeroMemory(fwd_row, sizeof(*fwd_row));
677  fwd_row->ValidLifetime = 0xffffffff;
678  fwd_row->PreferredLifetime = 0xffffffff;
679  fwd_row->Protocol = MIB_IPPROTO_NETMGMT;
680  fwd_row->Metric = msg->metric;
681  fwd_row->DestinationPrefix.Prefix = sockaddr_inet(msg->family, &msg->prefix);
682  fwd_row->DestinationPrefix.PrefixLength = (UINT8) msg->prefix_len;
683  fwd_row->NextHop = sockaddr_inet(msg->family, &msg->gateway);
684 
685  if (msg->iface.index != -1)
686  {
687  fwd_row->InterfaceIndex = msg->iface.index;
688  }
689  else if (strlen(msg->iface.name))
690  {
691  NET_LUID luid;
692  err = InterfaceLuid(msg->iface.name, &luid);
693  if (err)
694  {
695  goto out;
696  }
697  fwd_row->InterfaceLuid = luid;
698  }
699 
700  if (add)
701  {
702  err = CreateIpForwardEntry2(fwd_row);
703  if (err)
704  {
705  goto out;
706  }
707 
708  err = AddListItem(&(*lists)[route], fwd_row);
709  if (err)
710  {
711  DeleteRoute(fwd_row);
712  }
713  }
714  else
715  {
716  err = DeleteRoute(fwd_row);
717  if (err)
718  {
719  goto out;
720  }
721 
722  free(RemoveListItem(&(*lists)[route], CmpRoute, fwd_row));
723  }
724 
725 out:
726  if (!add || err)
727  {
728  free(fwd_row);
729  }
730 
731  return err;
732 }
733 
734 
735 static DWORD
737 {
738  if (msg->family == AF_INET)
739  {
740  return FlushIpNetTable(msg->iface.index);
741  }
742 
743  return FlushIpNetTable2(msg->family, msg->iface.index);
744 }
745 
746 static void
747 BlockDNSErrHandler(DWORD err, const char *msg)
748 {
749  WCHAR buf[256];
750  LPCWSTR err_str;
751 
752  if (!err)
753  {
754  return;
755  }
756 
757  err_str = L"Unknown Win32 Error";
758 
759  if (FormatMessage(FORMAT_MESSAGE_IGNORE_INSERTS | FORMAT_MESSAGE_FROM_SYSTEM
760  | FORMAT_MESSAGE_ARGUMENT_ARRAY,
761  NULL, err, 0, buf, sizeof(buf), NULL))
762  {
763  err_str = buf;
764  }
765 
766  MsgToEventLog(M_ERR, L"%hs (status = %lu): %ls", msg, err, err_str);
767 }
768 
769 /* Use an always-true match_fn to get the head of the list */
770 static BOOL
771 CmpAny(LPVOID item, LPVOID any)
772 {
773  return TRUE;
774 }
775 
776 static DWORD
778 {
779  DWORD err = 0;
780  wfp_block_data_t *block_data = RemoveListItem(&(*lists)[wfp_block], CmpAny, NULL);
781 
782  if (block_data)
783  {
784  err = delete_wfp_block_filters(block_data->engine);
785  if (block_data->metric_v4 >= 0)
786  {
787  set_interface_metric(msg->iface.index, AF_INET,
788  block_data->metric_v4);
789  }
790  if (block_data->metric_v6 >= 0)
791  {
792  set_interface_metric(msg->iface.index, AF_INET6,
793  block_data->metric_v6);
794  }
795  free(block_data);
796  }
797  else
798  {
799  MsgToEventLog(M_ERR, L"No previous block filters to delete");
800  }
801 
802  return err;
803 }
804 
805 static DWORD
807 {
808  DWORD err = 0;
809  wfp_block_data_t *block_data = NULL;
810  HANDLE engine = NULL;
811  LPCWSTR exe_path;
812  BOOL dns_only;
813 
814  exe_path = settings.exe_path;
815  dns_only = (msg->flags == wfp_block_dns);
816 
817  err = add_wfp_block_filters(&engine, msg->iface.index, exe_path, BlockDNSErrHandler, dns_only);
818  if (!err)
819  {
820  block_data = malloc(sizeof(wfp_block_data_t));
821  if (!block_data)
822  {
823  err = ERROR_OUTOFMEMORY;
824  goto out;
825  }
826  block_data->engine = engine;
827  block_data->index = msg->iface.index;
828  int is_auto = 0;
829  block_data->metric_v4 = get_interface_metric(msg->iface.index,
830  AF_INET, &is_auto);
831  if (is_auto)
832  {
833  block_data->metric_v4 = 0;
834  }
835  block_data->metric_v6 = get_interface_metric(msg->iface.index,
836  AF_INET6, &is_auto);
837  if (is_auto)
838  {
839  block_data->metric_v6 = 0;
840  }
841 
842  err = AddListItem(&(*lists)[wfp_block], block_data);
843  if (!err)
844  {
845  err = set_interface_metric(msg->iface.index, AF_INET,
847  if (!err)
848  {
849  /* for IPv6, we intentionally ignore errors, because
850  * otherwise block-dns activation will fail if a user or
851  * admin has disabled IPv6 on the tun/tap/dco interface
852  * (if OpenVPN wants IPv6 ifconfig, we'll fail there)
853  */
854  set_interface_metric(msg->iface.index, AF_INET6,
856  }
857  if (err)
858  {
859  /* delete the filters, remove undo item and free interface data */
860  DeleteWfpBlock(msg, lists);
861  engine = NULL;
862  }
863  }
864  }
865 
866 out:
867  if (err && engine)
868  {
869  delete_wfp_block_filters(engine);
870  free(block_data);
871  }
872 
873  return err;
874 }
875 
876 static DWORD
878 {
879  if (msg->header.type == msg_add_wfp_block)
880  {
881  return AddWfpBlock(msg, lists);
882  }
883  else
884  {
885  return DeleteWfpBlock(msg, lists);
886  }
887 }
888 
889 /*
890  * Execute a command and return its exit code. If timeout > 0, terminate
891  * the process if still running after timeout milliseconds. In that case
892  * the return value is the windows error code WAIT_TIMEOUT = 0x102
893  */
894 static DWORD
895 ExecCommand(const WCHAR *argv0, const WCHAR *cmdline, DWORD timeout)
896 {
897  DWORD exit_code;
898  STARTUPINFOW si;
899  PROCESS_INFORMATION pi;
900  DWORD proc_flags = CREATE_NO_WINDOW|CREATE_UNICODE_ENVIRONMENT;
901  WCHAR *cmdline_dup = NULL;
902 
903  ZeroMemory(&si, sizeof(si));
904  ZeroMemory(&pi, sizeof(pi));
905 
906  si.cb = sizeof(si);
907 
908  /* CreateProcess needs a modifiable cmdline: make a copy */
909  cmdline_dup = _wcsdup(cmdline);
910  if (cmdline_dup && CreateProcessW(argv0, cmdline_dup, NULL, NULL, FALSE,
911  proc_flags, NULL, NULL, &si, &pi) )
912  {
913  WaitForSingleObject(pi.hProcess, timeout ? timeout : INFINITE);
914  if (!GetExitCodeProcess(pi.hProcess, &exit_code))
915  {
916  MsgToEventLog(M_SYSERR, L"ExecCommand: Error getting exit_code:");
917  exit_code = GetLastError();
918  }
919  else if (exit_code == STILL_ACTIVE)
920  {
921  exit_code = WAIT_TIMEOUT; /* Windows error code 0x102 */
922 
923  /* kill without impunity */
924  TerminateProcess(pi.hProcess, exit_code);
925  MsgToEventLog(M_ERR, L"ExecCommand: \"%ls %ls\" killed after timeout",
926  argv0, cmdline);
927  }
928  else if (exit_code)
929  {
930  MsgToEventLog(M_ERR, L"ExecCommand: \"%ls %ls\" exited with status = %lu",
931  argv0, cmdline, exit_code);
932  }
933  else
934  {
935  MsgToEventLog(M_INFO, L"ExecCommand: \"%ls %ls\" completed", argv0, cmdline);
936  }
937 
938  CloseHandle(pi.hProcess);
939  CloseHandle(pi.hThread);
940  }
941  else
942  {
943  exit_code = GetLastError();
944  MsgToEventLog(M_SYSERR, L"ExecCommand: could not run \"%ls %ls\" :",
945  argv0, cmdline);
946  }
947 
948  free(cmdline_dup);
949  return exit_code;
950 }
951 
952 /*
953  * Entry point for register-dns thread.
954  */
955 static DWORD WINAPI
956 RegisterDNS(LPVOID unused)
957 {
958  DWORD err;
959  size_t i;
960  DWORD timeout = RDNS_TIMEOUT * 1000; /* in milliseconds */
961 
962  /* path of ipconfig command */
963  WCHAR ipcfg[MAX_PATH];
964 
965  struct
966  {
967  WCHAR *argv0;
968  WCHAR *cmdline;
969  DWORD timeout;
970  } cmds [] = {
971  { ipcfg, L"ipconfig /flushdns", timeout },
972  { ipcfg, L"ipconfig /registerdns", timeout },
973  };
974 
975  HANDLE wait_handles[2] = {rdns_semaphore, exit_event};
976 
977  swprintf(ipcfg, MAX_PATH, L"%ls\\%ls", get_win_sys_path(), L"ipconfig.exe");
978 
979  if (WaitForMultipleObjects(2, wait_handles, FALSE, timeout) == WAIT_OBJECT_0)
980  {
981  /* Semaphore locked */
982  for (i = 0; i < _countof(cmds); ++i)
983  {
984  ExecCommand(cmds[i].argv0, cmds[i].cmdline, cmds[i].timeout);
985  }
986  err = 0;
987  if (!ReleaseSemaphore(rdns_semaphore, 1, NULL) )
988  {
989  err = MsgToEventLog(M_SYSERR, L"RegisterDNS: Failed to release regsiter-dns semaphore:");
990  }
991  }
992  else
993  {
994  MsgToEventLog(M_ERR, L"RegisterDNS: Failed to lock register-dns semaphore");
995  err = ERROR_SEM_TIMEOUT; /* Windows error code 0x79 */
996  }
997  return err;
998 }
999 
1000 static DWORD
1002 {
1003  DWORD err;
1004  HANDLE thread = NULL;
1005 
1006  /* Delegate this job to a sub-thread */
1007  thread = CreateThread(NULL, 0, RegisterDNS, NULL, 0, NULL);
1008 
1009  /*
1010  * We don't add these thread handles to the undo list -- the thread and
1011  * processes it spawns are all supposed to terminate or timeout by themselves.
1012  */
1013  if (thread)
1014  {
1015  err = 0;
1016  CloseHandle(thread);
1017  }
1018  else
1019  {
1020  err = GetLastError();
1021  }
1022 
1023  return err;
1024 }
1025 
1035 static DWORD
1036 netsh_wins_cmd(const wchar_t *action, const wchar_t *if_name, const wchar_t *addr)
1037 {
1038  DWORD err = 0;
1039  int timeout = 30000; /* in msec */
1040  wchar_t argv0[MAX_PATH];
1041  wchar_t *cmdline = NULL;
1042  const wchar_t *addr_static = (wcscmp(action, L"set") == 0) ? L"static" : L"";
1043 
1044  if (!addr)
1045  {
1046  if (wcscmp(action, L"delete") == 0)
1047  {
1048  addr = L"all";
1049  }
1050  else /* nothing to do -- return success*/
1051  {
1052  goto out;
1053  }
1054  }
1055 
1056  /* Path of netsh */
1057  swprintf(argv0, _countof(argv0), L"%ls\\%ls", get_win_sys_path(), L"netsh.exe");
1058 
1059  /* cmd template:
1060  * netsh interface ip $action wins $if_name $static $addr
1061  */
1062  const wchar_t *fmt = L"netsh interface ip %ls wins \"%ls\" %ls %ls";
1063 
1064  /* max cmdline length in wchars -- include room for worst case and some */
1065  size_t ncmdline = wcslen(fmt) + wcslen(if_name) + wcslen(action) + wcslen(addr)
1066  +wcslen(addr_static) + 32 + 1;
1067  cmdline = malloc(ncmdline * sizeof(wchar_t));
1068  if (!cmdline)
1069  {
1070  err = ERROR_OUTOFMEMORY;
1071  goto out;
1072  }
1073 
1074  swprintf(cmdline, ncmdline, fmt, action, if_name, addr_static, addr);
1075 
1076  err = ExecCommand(argv0, cmdline, timeout);
1077 
1078 out:
1079  free(cmdline);
1080  return err;
1081 }
1082 
1083 static BOOL
1084 CmpWString(LPVOID item, LPVOID str)
1085 {
1086  return (wcscmp(item, str) == 0) ? TRUE : FALSE;
1087 }
1088 
1095 static BOOL
1097 {
1098  typedef NTSTATUS (__stdcall *publish_fn_t)(
1099  DWORD StateNameLo,
1100  DWORD StateNameHi,
1101  DWORD TypeId,
1102  DWORD Buffer,
1103  DWORD Length,
1104  DWORD ExplicitScope);
1105  publish_fn_t RtlPublishWnfStateData;
1106  const DWORD WNF_GPOL_SYSTEM_CHANGES_HI = 0x0D891E2A;
1107  const DWORD WNF_GPOL_SYSTEM_CHANGES_LO = 0xA3BC0875;
1108 
1109  HMODULE ntdll = LoadLibraryA("ntdll.dll");
1110  if (ntdll == NULL)
1111  {
1112  return FALSE;
1113  }
1114 
1115  RtlPublishWnfStateData = (publish_fn_t) GetProcAddress(ntdll, "RtlPublishWnfStateData");
1116  if (RtlPublishWnfStateData == NULL)
1117  {
1118  return FALSE;
1119  }
1120 
1121  if (RtlPublishWnfStateData(WNF_GPOL_SYSTEM_CHANGES_LO, WNF_GPOL_SYSTEM_CHANGES_HI, 0, 0, 0, 0) != ERROR_SUCCESS)
1122  {
1123  return FALSE;
1124  }
1125 
1126  return TRUE;
1127 }
1128 
1135 static BOOL
1137 {
1138  typedef NTSTATUS (*publish_fn_t)(
1139  INT64 StateName,
1140  INT64 TypeId,
1141  INT64 Buffer,
1142  unsigned int Length,
1143  INT64 ExplicitScope);
1144  publish_fn_t RtlPublishWnfStateData;
1145  const INT64 WNF_GPOL_SYSTEM_CHANGES = 0x0D891E2AA3BC0875;
1146 
1147  HMODULE ntdll = LoadLibraryA("ntdll.dll");
1148  if (ntdll == NULL)
1149  {
1150  return FALSE;
1151  }
1152 
1153  RtlPublishWnfStateData = (publish_fn_t) GetProcAddress(ntdll, "RtlPublishWnfStateData");
1154  if (RtlPublishWnfStateData == NULL)
1155  {
1156  return FALSE;
1157  }
1158 
1159  if (RtlPublishWnfStateData(WNF_GPOL_SYSTEM_CHANGES, 0, 0, 0, 0) != ERROR_SUCCESS)
1160  {
1161  return FALSE;
1162  }
1163 
1164  return TRUE;
1165 }
1166 
1172 static BOOL
1174 {
1175  SYSTEM_INFO si;
1176  GetSystemInfo(&si);
1177  const BOOL win_32bit = si.wProcessorArchitecture == PROCESSOR_ARCHITECTURE_INTEL;
1178  return win_32bit ? ApplyGpolSettings32() : ApplyGpolSettings64();
1179 }
1180 
1188 static BOOL
1189 ApplyDnsSettings(BOOL apply_gpol)
1190 {
1191  BOOL res = FALSE;
1192  SC_HANDLE scm = NULL;
1193  SC_HANDLE dnssvc = NULL;
1194 
1195  if (apply_gpol && ApplyGpolSettings() == FALSE)
1196  {
1197  MsgToEventLog(M_ERR, L"%s: sending GPOL notification failed", __func__);
1198  }
1199 
1200  scm = OpenSCManager(NULL, NULL, SC_MANAGER_ALL_ACCESS);
1201  if (scm == NULL)
1202  {
1203  MsgToEventLog(M_ERR, L"%s: OpenSCManager call failed (%lu)",
1204  __func__, GetLastError());
1205  goto out;
1206  }
1207 
1208  dnssvc = OpenServiceA(scm, "Dnscache", SERVICE_PAUSE_CONTINUE);
1209  if (dnssvc == NULL)
1210  {
1211  MsgToEventLog(M_ERR, L"%s: OpenService call failed (%lu)",
1212  __func__, GetLastError());
1213  goto out;
1214  }
1215 
1216  SERVICE_STATUS status;
1217  if (ControlService(dnssvc, SERVICE_CONTROL_PARAMCHANGE, &status) == 0)
1218  {
1219  MsgToEventLog(M_ERR, L"%s: ControlService call failed (%lu)",
1220  __func__, GetLastError());
1221  goto out;
1222  }
1223 
1224  res = TRUE;
1225 
1226 out:
1227  if (dnssvc)
1228  {
1229  CloseServiceHandle(dnssvc);
1230  }
1231  if (scm)
1232  {
1233  CloseServiceHandle(scm);
1234  }
1235  return res;
1236 }
1237 
1247 static DWORD
1248 InterfaceIdString(PCSTR itf_name, PWSTR str, size_t len)
1249 {
1250  DWORD err;
1251  GUID guid;
1252  NET_LUID luid;
1253  PWSTR iid_str = NULL;
1254 
1255  err = InterfaceLuid(itf_name, &luid);
1256  if (err)
1257  {
1258  MsgToEventLog(M_ERR, L"%s: failed to convert itf alias '%s'", __func__, itf_name);
1259  goto out;
1260  }
1261  err = ConvertInterfaceLuidToGuid(&luid, &guid);
1262  if (err)
1263  {
1264  MsgToEventLog(M_ERR, L"%s: Failed to convert itf '%s' LUID", __func__, itf_name);
1265  goto out;
1266  }
1267 
1268  if (StringFromIID(&guid, &iid_str) != S_OK)
1269  {
1270  MsgToEventLog(M_ERR, L"%s: Failed to convert itf '%s' IID", __func__, itf_name);
1271  err = ERROR_OUTOFMEMORY;
1272  goto out;
1273  }
1274  if (wcslen(iid_str) + 1 > len)
1275  {
1276  err = ERROR_INVALID_PARAMETER;
1277  goto out;
1278  }
1279 
1280  wcsncpy(str, iid_str, len);
1281 
1282 out:
1283  if (iid_str)
1284  {
1285  CoTaskMemFree(iid_str);
1286  }
1287  return err;
1288 }
1289 
1303 static BOOL
1305 {
1306  char data[64];
1307  DWORD size = sizeof(data);
1308  LSTATUS err = RegGetValueA(key, NULL, "SearchList", RRF_RT_REG_SZ, NULL, (PBYTE)data, &size);
1309  if (!err || err == ERROR_MORE_DATA)
1310  {
1311  data[sizeof(data) - 1] = '\0';
1312  for (int i = 0; i < strlen(data); ++i)
1313  {
1314  if (isalnum(data[i]) || data[i] == '-' || data[i] == '.')
1315  {
1316  return TRUE;
1317  }
1318  }
1319  }
1320  return FALSE;
1321 }
1322 
1340 static BOOL
1341 GetDnsSearchListKey(PCSTR itf_name, PBOOL gpol, PHKEY key)
1342 {
1343  LSTATUS err;
1344 
1345  *gpol = FALSE;
1346 
1347  /* Try the group policy search list */
1348  err = RegOpenKeyExA(HKEY_LOCAL_MACHINE,
1349  "SOFTWARE\\Policies\\Microsoft\\Windows NT\\DNSClient",
1350  0, KEY_ALL_ACCESS, key);
1351  if (!err)
1352  {
1353  if (HasValidSearchList(*key))
1354  {
1355  *gpol = TRUE;
1356  return TRUE;
1357  }
1358  RegCloseKey(*key);
1359  }
1360 
1361  /* Try the system-wide search list */
1362  err = RegOpenKeyExA(HKEY_LOCAL_MACHINE,
1363  "System\\CurrentControlSet\\Services\\TCPIP\\Parameters",
1364  0, KEY_ALL_ACCESS, key);
1365  if (!err)
1366  {
1367  if (HasValidSearchList(*key))
1368  {
1369  return TRUE;
1370  }
1371  RegCloseKey(*key);
1372  }
1373 
1374  if (itf_name)
1375  {
1376  /* Always return the VPN interface key (if it exists) */
1377  WCHAR iid[64];
1378  DWORD iid_err = InterfaceIdString(itf_name, iid, _countof(iid));
1379  if (!iid_err)
1380  {
1381  HKEY itfs;
1382  err = RegOpenKeyExA(HKEY_LOCAL_MACHINE,
1383  "System\\CurrentControlSet\\Services\\TCPIP\\Parameters\\Interfaces",
1384  0, KEY_ALL_ACCESS, &itfs);
1385  if (!err)
1386  {
1387  err = RegOpenKeyExW(itfs, iid, 0, KEY_ALL_ACCESS, key);
1388  RegCloseKey(itfs);
1389  if (!err)
1390  {
1391  return FALSE; /* No need to preserve the VPN itf search list */
1392  }
1393  }
1394  }
1395  }
1396 
1397  *key = INVALID_HANDLE_VALUE;
1398  return FALSE;
1399 }
1400 
1408 static BOOL
1410 {
1411  LSTATUS err;
1412 
1413  err = RegGetValueA(key, NULL, "InitialSearchList", RRF_RT_REG_SZ, NULL, NULL, NULL);
1414  if (err)
1415  {
1416  if (err == ERROR_FILE_NOT_FOUND)
1417  {
1418  return FALSE;
1419  }
1420  MsgToEventLog(M_ERR, L"%s: failed to get InitialSearchList (%lu)",
1421  __func__, err);
1422  }
1423 
1424  return TRUE;
1425 }
1426 
1437 static BOOL
1438 StoreInitialDnsSearchList(HKEY key, PCWSTR list)
1439 {
1440  if (!list || wcslen(list) == 0)
1441  {
1442  MsgToEventLog(M_ERR, L"StoreInitialDnsSearchList: empty search list");
1443  return FALSE;
1444  }
1445 
1447  {
1448  /* Initial list had already been stored */
1449  return TRUE;
1450  }
1451 
1452  DWORD size = (wcslen(list) + 1) * sizeof(*list);
1453  LSTATUS err = RegSetValueExW(key, L"InitialSearchList", 0, REG_SZ, (PBYTE)list, size);
1454  if (err)
1455  {
1456  MsgToEventLog(M_ERR, L"%s: failed to set InitialSearchList value (%lu)",
1457  __func__, err);
1458  return FALSE;
1459  }
1460 
1461  return TRUE;
1462 }
1463 
1473 static BOOL
1474 AddDnsSearchDomains(HKEY key, BOOL have_list, PCWSTR domains)
1475 {
1476  LSTATUS err;
1477  WCHAR list[2048] = {0};
1478  DWORD size = sizeof(list);
1479 
1480  if (have_list)
1481  {
1482  err = RegGetValueW(key, NULL, L"SearchList", RRF_RT_REG_SZ, NULL, list, &size);
1483  if (err)
1484  {
1485  MsgToEventLog(M_SYSERR, L"%s: could not get SearchList from registry (%lu)",
1486  __func__, err);
1487  return FALSE;
1488  }
1489 
1490  if (!StoreInitialDnsSearchList(key, list))
1491  {
1492  return FALSE;
1493  }
1494 
1495  size_t listlen = (size / sizeof(list[0])) - 1; /* returned size is in bytes */
1496  size_t domlen = wcslen(domains);
1497  if (listlen + domlen + 2 > _countof(list))
1498  {
1499  MsgToEventLog(M_SYSERR, L"%s: not enough space in list for search domains (len=%lu)",
1500  __func__, domlen);
1501  return FALSE;
1502  }
1503 
1504  /* Append to end of the search list */
1505  PWSTR pos = list + listlen;
1506  *pos = ',';
1507  wcsncpy(pos + 1, domains, domlen + 1);
1508  }
1509  else
1510  {
1511  wcsncpy(list, domains, wcslen(domains) + 1);
1512  }
1513 
1514  size = (wcslen(list) + 1) * sizeof(list[0]);
1515  err = RegSetValueExW(key, L"SearchList", 0, REG_SZ, (PBYTE)list, size);
1516  if (err)
1517  {
1518  MsgToEventLog(M_SYSERR, L"%s: could not set SearchList to registry (%lu)",
1519  __func__, err);
1520  return FALSE;
1521  }
1522 
1523  return TRUE;
1524 }
1525 
1537 static BOOL
1539 {
1540  LSTATUS err;
1541  BOOL ret = FALSE;
1542  WCHAR list[2048];
1543  DWORD size = sizeof(list);
1544 
1545  err = RegGetValueW(key, NULL, L"InitialSearchList", RRF_RT_REG_SZ, NULL, list, &size);
1546  if (err)
1547  {
1548  if (err != ERROR_FILE_NOT_FOUND)
1549  {
1550  MsgToEventLog(M_SYSERR, L"%s: could not get InitialSearchList from registry (%lu)",
1551  __func__, err);
1552  }
1553  goto out;
1554  }
1555 
1556  size = (wcslen(list) + 1) * sizeof(list[0]);
1557  err = RegSetValueExW(key, L"SearchList", 0, REG_SZ, (PBYTE)list, size);
1558  if (err)
1559  {
1560  MsgToEventLog(M_SYSERR, L"%s: could not set SearchList in registry (%lu)",
1561  __func__, err);
1562  goto out;
1563  }
1564 
1565  RegDeleteValueA(key, "InitialSearchList");
1566  ret = TRUE;
1567 
1568 out:
1569  return ret;
1570 }
1571 
1578 static void
1579 RemoveDnsSearchDomains(HKEY key, PCWSTR domains)
1580 {
1581  LSTATUS err;
1582  WCHAR list[2048];
1583  DWORD size = sizeof(list);
1584 
1585  err = RegGetValueW(key, NULL, L"SearchList", RRF_RT_REG_SZ, NULL, list, &size);
1586  if (err)
1587  {
1588  MsgToEventLog(M_SYSERR, L"%s: could not get SearchList from registry (%lu)",
1589  __func__, err);
1590  return;
1591  }
1592 
1593  PWSTR dst = wcsstr(list, domains);
1594  if (!dst)
1595  {
1596  MsgToEventLog(M_ERR, L"%s: could not find domains in search list", __func__);
1597  return;
1598  }
1599 
1600  /* Cut out domains from list */
1601  size_t domlen = wcslen(domains);
1602  PCWSTR src = dst + domlen;
1603  /* Also remove the leading comma, if there is one */
1604  dst = dst > list ? dst - 1 : dst;
1605  wmemmove(dst, src, domlen);
1606 
1607  size_t list_len = wcslen(list);
1608  if (list_len)
1609  {
1610  /* Now check if the shortened list equals the initial search list */
1611  WCHAR initial[2048];
1612  size = sizeof(initial);
1613  err = RegGetValueW(key, NULL, L"InitialSearchList", RRF_RT_REG_SZ, NULL, initial, &size);
1614  if (err)
1615  {
1616  MsgToEventLog(M_SYSERR, L"%s: could not get InitialSearchList from registry (%lu)",
1617  __func__, err);
1618  return;
1619  }
1620 
1621  /* If the search list is back to its initial state reset it */
1622  if (wcsncmp(list, initial, wcslen(list)) == 0)
1623  {
1625  return;
1626  }
1627  }
1628 
1629  size = (list_len + 1) * sizeof(list[0]);
1630  err = RegSetValueExW(key, L"SearchList", 0, REG_SZ, (PBYTE)list, size);
1631  if (err)
1632  {
1633  MsgToEventLog(M_SYSERR, L"%s: could not set SearchList in registry (%lu)",
1634  __func__, err);
1635  }
1636 }
1637 
1643 static void
1645 {
1646  BOOL gpol;
1647  HKEY dns_searchlist_key;
1648  GetDnsSearchListKey(undo_data->itf_name, &gpol, &dns_searchlist_key);
1649  if (dns_searchlist_key != INVALID_HANDLE_VALUE)
1650  {
1651  RemoveDnsSearchDomains(dns_searchlist_key, undo_data->domains);
1652  RegCloseKey(dns_searchlist_key);
1653  ApplyDnsSettings(gpol);
1654 
1655  free(undo_data->domains);
1656  undo_data->domains = NULL;
1657  }
1658 }
1659 
1681 static DWORD
1682 SetDnsSearchDomains(PCSTR itf_name, PCSTR domains, PBOOL gpol, undo_lists_t *lists)
1683 {
1684  DWORD err = ERROR_OUTOFMEMORY;
1685 
1686  HKEY list_key;
1687  BOOL have_list = GetDnsSearchListKey(itf_name, gpol, &list_key);
1688  if (list_key == INVALID_HANDLE_VALUE)
1689  {
1690  MsgToEventLog(M_SYSERR, L"%s: could not get search list registry key", __func__);
1691  return ERROR_FILE_NOT_FOUND;
1692  }
1693 
1694  /* Remove previously installed search domains */
1695  dns_domains_undo_data_t *undo_data = RemoveListItem(&(*lists)[undo_domains], CmpAny, NULL);
1696  if (undo_data)
1697  {
1698  RemoveDnsSearchDomains(list_key, undo_data->domains);
1699  free(undo_data->domains);
1700  free(undo_data);
1701  undo_data = NULL;
1702  }
1703 
1704  /* If there are search domains, add them */
1705  if (domains && *domains)
1706  {
1707  wchar_t *wide_domains = utf8to16(domains); /* utf8 to wide-char */
1708  if (!wide_domains)
1709  {
1710  goto out;
1711  }
1712 
1713  undo_data = malloc(sizeof(*undo_data));
1714  if (!undo_data)
1715  {
1716  free(wide_domains);
1717  wide_domains = NULL;
1718  goto out;
1719  }
1720  strncpy(undo_data->itf_name, itf_name, sizeof(undo_data->itf_name));
1721  undo_data->domains = wide_domains;
1722 
1723  if (AddDnsSearchDomains(list_key, have_list, wide_domains) == FALSE
1724  || AddListItem(&(*lists)[undo_domains], undo_data) != NO_ERROR)
1725  {
1726  RemoveDnsSearchDomains(list_key, wide_domains);
1727  free(wide_domains);
1728  free(undo_data);
1729  undo_data = NULL;
1730  goto out;
1731  }
1732  }
1733 
1734  err = NO_ERROR;
1735 
1736 out:
1737  RegCloseKey(list_key);
1738  return err;
1739 }
1740 
1748 static BOOL
1749 GetInterfacesKey(short family, PHKEY key)
1750 {
1751  PCSTR itfs_key = family == AF_INET6
1752  ? "SYSTEM\\CurrentControlSet\\Services\\Tcpip6\\Parameters\\Interfaces"
1753  : "SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Interfaces";
1754 
1755  LSTATUS err = RegOpenKeyExA(HKEY_LOCAL_MACHINE, itfs_key, 0, KEY_ALL_ACCESS, key);
1756  if (err)
1757  {
1758  *key = INVALID_HANDLE_VALUE;
1759  MsgToEventLog(M_SYSERR, L"%s: could not open interfaces registry key for family %d (%lu)",
1760  __func__, family, err);
1761  }
1762 
1763  return err ? FALSE : TRUE;
1764 }
1765 
1775 static DWORD
1776 SetNameServersValue(PCWSTR itf_id, short family, PCSTR value)
1777 {
1778  DWORD err;
1779 
1780  HKEY itfs;
1781  if (!GetInterfacesKey(family, &itfs))
1782  {
1783  return ERROR_FILE_NOT_FOUND;
1784  }
1785 
1786  HKEY itf = INVALID_HANDLE_VALUE;
1787  err = RegOpenKeyExW(itfs, itf_id, 0, KEY_ALL_ACCESS, &itf);
1788  if (err)
1789  {
1790  MsgToEventLog(M_SYSERR, L"%s: could not open interface key for %s family %d (%lu)",
1791  __func__, itf_id, family, err);
1792  goto out;
1793  }
1794 
1795  err = RegSetValueExA(itf, "NameServer", 0, REG_SZ, (PBYTE)value, strlen(value) + 1);
1796  if (err)
1797  {
1798  MsgToEventLog(M_SYSERR, L"%s: could not set name servers '%S' for %s family %d (%lu)",
1799  __func__, value, itf_id, family, err);
1800  }
1801 
1802 out:
1803  if (itf != INVALID_HANDLE_VALUE)
1804  {
1805  RegCloseKey(itf);
1806  }
1807  if (itfs != INVALID_HANDLE_VALUE)
1808  {
1809  RegCloseKey(itfs);
1810  }
1811  return err;
1812 }
1813 
1823 static DWORD
1824 SetNameServers(PCWSTR itf_id, short family, PCSTR addrs)
1825 {
1826  return SetNameServersValue(itf_id, family, addrs);
1827 }
1828 
1837 static DWORD
1838 ResetNameServers(PCWSTR itf_id, short family)
1839 {
1840  return SetNameServersValue(itf_id, family, "");
1841 }
1842 
1843 static DWORD
1845 {
1846  DWORD err = 0;
1847  undo_type_t undo_type = (msg->family == AF_INET6) ? undo_dns4 : undo_dns6;
1848  int addr_len = msg->addr_len;
1849 
1850  /* sanity check */
1851  const size_t max_addrs = _countof(msg->addr);
1852  if (addr_len > max_addrs)
1853  {
1854  addr_len = max_addrs;
1855  }
1856 
1857  if (!msg->iface.name[0]) /* interface name is required */
1858  {
1859  return ERROR_MESSAGE_DATA;
1860  }
1861 
1862  /* use a non-const reference with limited scope to enforce null-termination of strings from client */
1863  {
1864  dns_cfg_message_t *msgptr = (dns_cfg_message_t *) msg;
1865  msgptr->iface.name[_countof(msg->iface.name)-1] = '\0';
1866  msgptr->domains[_countof(msg->domains)-1] = '\0';
1867  }
1868 
1869  WCHAR iid[64];
1870  err = InterfaceIdString(msg->iface.name, iid, _countof(iid));
1871  if (err)
1872  {
1873  return err;
1874  }
1875 
1876  /* We delete all current addresses before adding any
1877  * OR if the message type is del_dns_cfg
1878  */
1879  if (addr_len > 0 || msg->header.type == msg_del_dns_cfg)
1880  {
1881  err = ResetNameServers(iid, msg->family);
1882  if (err)
1883  {
1884  return err;
1885  }
1886  free(RemoveListItem(&(*lists)[undo_type], CmpAny, iid));
1887  }
1888 
1889  if (msg->header.type == msg_del_dns_cfg)
1890  {
1891  BOOL gpol = FALSE;
1892  if (msg->domains[0])
1893  {
1894  /* setting an empty domain list removes any previous value */
1895  err = SetDnsSearchDomains(msg->iface.name, NULL, &gpol, lists);
1896  }
1897  ApplyDnsSettings(gpol);
1898  return err; /* job done */
1899  }
1900 
1901  if (msg->addr_len > 0)
1902  {
1903  /* prepare the comma separated address list */
1904  /* cannot use max_addrs here as that is not considered compile
1905  * time constant by all compilers and constexpr is C23 */
1906  CHAR addrs[_countof(msg->addr) * 64]; /* 64 is enough for one IPv4/6 address */
1907  size_t offset = 0;
1908  for (int i = 0; i < addr_len; ++i)
1909  {
1910  if (i != 0)
1911  {
1912  addrs[offset++] = ',';
1913  }
1914  if (msg->family == AF_INET6)
1915  {
1916  RtlIpv6AddressToStringA(&msg->addr[i].ipv6, addrs + offset);
1917  }
1918  else
1919  {
1920  RtlIpv4AddressToStringA(&msg->addr[i].ipv4, addrs + offset);
1921  }
1922  offset += strlen(addrs);
1923  }
1924 
1925  err = SetNameServers(iid, msg->family, addrs);
1926  if (err)
1927  {
1928  return err;
1929  }
1930 
1931  wchar_t *tmp_iid = _wcsdup(iid);
1932  if (!tmp_iid || AddListItem(&(*lists)[undo_type], tmp_iid))
1933  {
1934  free(tmp_iid);
1935  ResetNameServers(iid, msg->family);
1936  return ERROR_OUTOFMEMORY;
1937  }
1938  }
1939 
1940  BOOL gpol = FALSE;
1941  if (msg->domains[0])
1942  {
1943  err = SetDnsSearchDomains(msg->iface.name, msg->domains, &gpol, lists);
1944  }
1945  ApplyDnsSettings(gpol);
1946 
1947  return err;
1948 }
1949 
1950 static DWORD
1952 {
1953  DWORD err = 0;
1954  wchar_t addr[16]; /* large enough to hold string representation of an ipv4 */
1955  int addr_len = msg->addr_len;
1956 
1957  /* sanity check */
1958  if (addr_len > _countof(msg->addr))
1959  {
1960  addr_len = _countof(msg->addr);
1961  }
1962 
1963  if (!msg->iface.name[0]) /* interface name is required */
1964  {
1965  return ERROR_MESSAGE_DATA;
1966  }
1967 
1968  /* use a non-const reference with limited scope to enforce null-termination of strings from client */
1969  {
1971  msgptr->iface.name[_countof(msg->iface.name) - 1] = '\0';
1972  }
1973 
1974  wchar_t *wide_name = utf8to16(msg->iface.name); /* utf8 to wide-char */
1975  if (!wide_name)
1976  {
1977  return ERROR_OUTOFMEMORY;
1978  }
1979 
1980  /* We delete all current addresses before adding any
1981  * OR if the message type is del_wins_cfg
1982  */
1983  if (addr_len > 0 || msg->header.type == msg_del_wins_cfg)
1984  {
1985  err = netsh_wins_cmd(L"delete", wide_name, NULL);
1986  if (err)
1987  {
1988  goto out;
1989  }
1990  free(RemoveListItem(&(*lists)[undo_wins], CmpWString, wide_name));
1991  }
1992 
1993  if (msg->header.type == msg_del_wins_cfg)
1994  {
1995  goto out; /* job done */
1996  }
1997 
1998  for (int i = 0; i < addr_len; ++i)
1999  {
2000  RtlIpv4AddressToStringW(&msg->addr[i].ipv4, addr);
2001  err = netsh_wins_cmd(i == 0 ? L"set" : L"add", wide_name, addr);
2002  if (i == 0 && err)
2003  {
2004  goto out;
2005  }
2006  /* We do not check for duplicate addresses, so any error in adding
2007  * additional addresses is ignored.
2008  */
2009  }
2010 
2011  err = 0;
2012 
2013  if (addr_len > 0)
2014  {
2015  wchar_t *tmp_name = _wcsdup(wide_name);
2016  if (!tmp_name || AddListItem(&(*lists)[undo_wins], tmp_name))
2017  {
2018  free(tmp_name);
2019  netsh_wins_cmd(L"delete", wide_name, NULL);
2020  err = ERROR_OUTOFMEMORY;
2021  goto out;
2022  }
2023  }
2024 
2025 out:
2026  free(wide_name);
2027  return err;
2028 }
2029 
2030 static DWORD
2032 {
2033  DWORD err = 0;
2034  DWORD timeout = 5000; /* in milli seconds */
2035  wchar_t argv0[MAX_PATH];
2036 
2037  /* Path of netsh */
2038  swprintf(argv0, _countof(argv0), L"%ls\\%ls", get_win_sys_path(), L"netsh.exe");
2039 
2040  /* cmd template:
2041  * netsh interface ipv4 set address name=$if_index source=dhcp
2042  */
2043  const wchar_t *fmt = L"netsh interface ipv4 set address name=\"%d\" source=dhcp";
2044 
2045  /* max cmdline length in wchars -- include room for if index:
2046  * 10 chars for 32 bit int in decimal and +1 for NUL
2047  */
2048  size_t ncmdline = wcslen(fmt) + 10 + 1;
2049  wchar_t *cmdline = malloc(ncmdline*sizeof(wchar_t));
2050  if (!cmdline)
2051  {
2052  err = ERROR_OUTOFMEMORY;
2053  return err;
2054  }
2055 
2056  swprintf(cmdline, ncmdline, fmt, dhcp->iface.index);
2057 
2058  err = ExecCommand(argv0, cmdline, timeout);
2059 
2060  /* Note: This could fail if dhcp is already enabled, so the caller
2061  * may not want to treat errors as FATAL.
2062  */
2063 
2064  free(cmdline);
2065  return err;
2066 }
2067 
2068 static DWORD
2069 OvpnDuplicateHandle(HANDLE ovpn_proc, HANDLE orig_handle, HANDLE *new_handle)
2070 {
2071  DWORD err = ERROR_SUCCESS;
2072 
2073  if (!DuplicateHandle(ovpn_proc, orig_handle, GetCurrentProcess(), new_handle, 0, FALSE, DUPLICATE_SAME_ACCESS))
2074  {
2075  err = GetLastError();
2076  MsgToEventLog(M_SYSERR, L"Could not duplicate handle");
2077  return err;
2078  }
2079 
2080  return err;
2081 }
2082 
2083 static DWORD
2084 DuplicateAndMapRing(HANDLE ovpn_proc, HANDLE orig_handle, struct tun_ring **ring)
2085 {
2086  DWORD err = ERROR_SUCCESS;
2087 
2088  HANDLE dup_handle = NULL;
2089 
2090  err = OvpnDuplicateHandle(ovpn_proc, orig_handle, &dup_handle);
2091  if (err != ERROR_SUCCESS)
2092  {
2093  return err;
2094  }
2095  *ring = (struct tun_ring *)MapViewOfFile(dup_handle, FILE_MAP_ALL_ACCESS, 0, 0, sizeof(struct tun_ring));
2096  CloseHandleEx(&dup_handle);
2097  if (*ring == NULL)
2098  {
2099  err = GetLastError();
2100  MsgToEventLog(M_SYSERR, L"Could not map shared memory");
2101  return err;
2102  }
2103 
2104  return err;
2105 }
2106 
2107 static DWORD
2109  undo_lists_t *lists)
2110 {
2111  DWORD err = 0;
2112 
2113  ring_buffer_maps_t *ring_buffer_maps = RemoveListItem(&(*lists)[undo_ring_buffer], CmpAny, NULL);
2114 
2115  if (ring_buffer_maps)
2116  {
2117  UnmapRingBuffer(ring_buffer_maps);
2118  }
2119  else if ((ring_buffer_maps = calloc(1, sizeof(*ring_buffer_maps))) == NULL)
2120  {
2121  return ERROR_OUTOFMEMORY;
2122  }
2123 
2124  HANDLE device = NULL;
2125  HANDLE send_tail_moved = NULL;
2126  HANDLE receive_tail_moved = NULL;
2127 
2128  err = OvpnDuplicateHandle(ovpn_proc, rrb->device, &device);
2129  if (err != ERROR_SUCCESS)
2130  {
2131  goto out;
2132  }
2133 
2134  err = DuplicateAndMapRing(ovpn_proc, rrb->send_ring_handle, &ring_buffer_maps->send_ring);
2135  if (err != ERROR_SUCCESS)
2136  {
2137  goto out;
2138  }
2139 
2140  err = DuplicateAndMapRing(ovpn_proc, rrb->receive_ring_handle, &ring_buffer_maps->receive_ring);
2141  if (err != ERROR_SUCCESS)
2142  {
2143  goto out;
2144  }
2145 
2146  err = OvpnDuplicateHandle(ovpn_proc, rrb->send_tail_moved, &send_tail_moved);
2147  if (err != ERROR_SUCCESS)
2148  {
2149  goto out;
2150  }
2151 
2152  err = OvpnDuplicateHandle(ovpn_proc, rrb->receive_tail_moved, &receive_tail_moved);
2153  if (err != ERROR_SUCCESS)
2154  {
2155  goto out;
2156  }
2157 
2158  if (!register_ring_buffers(device, ring_buffer_maps->send_ring,
2159  ring_buffer_maps->receive_ring,
2160  send_tail_moved, receive_tail_moved))
2161  {
2162  err = GetLastError();
2163  MsgToEventLog(M_SYSERR, L"Could not register ring buffers");
2164  goto out;
2165  }
2166 
2167  err = AddListItem(&(*lists)[undo_ring_buffer], ring_buffer_maps);
2168 
2169 out:
2170  if (err != ERROR_SUCCESS && ring_buffer_maps)
2171  {
2172  UnmapRingBuffer(ring_buffer_maps);
2173  free(ring_buffer_maps);
2174  }
2175  CloseHandleEx(&device);
2176  CloseHandleEx(&send_tail_moved);
2177  CloseHandleEx(&receive_tail_moved);
2178  return err;
2179 }
2180 
2181 static DWORD
2183 {
2184  DWORD err = 0;
2185  MIB_IPINTERFACE_ROW ipiface;
2186  InitializeIpInterfaceEntry(&ipiface);
2187  ipiface.Family = mtu->family;
2188  ipiface.InterfaceIndex = mtu->iface.index;
2189  err = GetIpInterfaceEntry(&ipiface);
2190  if (err != NO_ERROR)
2191  {
2192  return err;
2193  }
2194  if (mtu->family == AF_INET)
2195  {
2196  ipiface.SitePrefixLength = 0;
2197  }
2198  ipiface.NlMtu = mtu->mtu;
2199 
2200  err = SetIpInterfaceEntry(&ipiface);
2201  return err;
2202 }
2203 
2204 static VOID
2205 HandleMessage(HANDLE pipe, HANDLE ovpn_proc,
2206  DWORD bytes, DWORD count, LPHANDLE events, undo_lists_t *lists)
2207 {
2209  ack_message_t ack = {
2210  .header = {
2212  .size = sizeof(ack),
2213  .message_id = -1
2214  },
2215  .error_number = ERROR_MESSAGE_DATA
2216  };
2217 
2218  DWORD read = ReadPipeAsync(pipe, &msg, bytes, count, events);
2219  if (read != bytes || read < sizeof(msg.header) || read != msg.header.size)
2220  {
2221  goto out;
2222  }
2223 
2224  ack.header.message_id = msg.header.message_id;
2225 
2226  switch (msg.header.type)
2227  {
2228  case msg_add_address:
2229  case msg_del_address:
2230  if (msg.header.size == sizeof(msg.address))
2231  {
2232  ack.error_number = HandleAddressMessage(&msg.address, lists);
2233  }
2234  break;
2235 
2236  case msg_add_route:
2237  case msg_del_route:
2238  if (msg.header.size == sizeof(msg.route))
2239  {
2240  ack.error_number = HandleRouteMessage(&msg.route, lists);
2241  }
2242  break;
2243 
2244  case msg_flush_neighbors:
2245  if (msg.header.size == sizeof(msg.flush_neighbors))
2246  {
2247  ack.error_number = HandleFlushNeighborsMessage(&msg.flush_neighbors);
2248  }
2249  break;
2250 
2251  case msg_add_wfp_block:
2252  case msg_del_wfp_block:
2253  if (msg.header.size == sizeof(msg.wfp_block))
2254  {
2255  ack.error_number = HandleWfpBlockMessage(&msg.wfp_block, lists);
2256  }
2257  break;
2258 
2259  case msg_register_dns:
2261  break;
2262 
2263  case msg_add_dns_cfg:
2264  case msg_del_dns_cfg:
2265  ack.error_number = HandleDNSConfigMessage(&msg.dns, lists);
2266  break;
2267 
2268  case msg_add_wins_cfg:
2269  case msg_del_wins_cfg:
2270  ack.error_number = HandleWINSConfigMessage(&msg.wins, lists);
2271  break;
2272 
2273  case msg_enable_dhcp:
2274  if (msg.header.size == sizeof(msg.dhcp))
2275  {
2277  }
2278  break;
2279 
2281  if (msg.header.size == sizeof(msg.rrb))
2282  {
2283  ack.error_number = HandleRegisterRingBuffers(&msg.rrb, ovpn_proc, lists);
2284  }
2285  break;
2286 
2287  case msg_set_mtu:
2288  if (msg.header.size == sizeof(msg.mtu))
2289  {
2290  ack.error_number = HandleMTUMessage(&msg.mtu);
2291  }
2292  break;
2293 
2294  default:
2296  MsgToEventLog(MSG_FLAGS_ERROR, L"Unknown message type %d", msg.header.type);
2297  break;
2298  }
2299 
2300 out:
2301  WritePipeAsync(pipe, &ack, sizeof(ack), count, events);
2302 }
2303 
2304 
2305 static VOID
2307 {
2308  undo_type_t type;
2309  wfp_block_data_t *interface_data;
2310  for (type = 0; type < _undo_type_max; type++)
2311  {
2312  list_item_t **pnext = &(*lists)[type];
2313  while (*pnext)
2314  {
2315  list_item_t *item = *pnext;
2316  switch (type)
2317  {
2318  case address:
2319  DeleteAddress(item->data);
2320  break;
2321 
2322  case route:
2323  DeleteRoute(item->data);
2324  break;
2325 
2326  case undo_dns4:
2327  ResetNameServers(item->data, AF_INET);
2328  break;
2329 
2330  case undo_dns6:
2331  ResetNameServers(item->data, AF_INET6);
2332  break;
2333 
2334  case undo_domains:
2335  UndoDnsSearchDomains(item->data);
2336  break;
2337 
2338  case undo_wins:
2339  netsh_wins_cmd(L"delete", item->data, NULL);
2340  break;
2341 
2342  case wfp_block:
2343  interface_data = (wfp_block_data_t *)(item->data);
2344  delete_wfp_block_filters(interface_data->engine);
2345  if (interface_data->metric_v4 >= 0)
2346  {
2347  set_interface_metric(interface_data->index, AF_INET,
2348  interface_data->metric_v4);
2349  }
2350  if (interface_data->metric_v6 >= 0)
2351  {
2352  set_interface_metric(interface_data->index, AF_INET6,
2353  interface_data->metric_v6);
2354  }
2355  break;
2356 
2357  case undo_ring_buffer:
2358  UnmapRingBuffer(item->data);
2359  break;
2360 
2361  case _undo_type_max:
2362  /* unreachable */
2363  break;
2364  }
2365 
2366  /* Remove from the list and free memory */
2367  *pnext = item->next;
2368  free(item->data);
2369  free(item);
2370  }
2371  }
2372 }
2373 
2374 static DWORD WINAPI
2375 RunOpenvpn(LPVOID p)
2376 {
2377  HANDLE pipe = p;
2378  HANDLE ovpn_pipe = NULL, svc_pipe = NULL;
2379  PTOKEN_USER svc_user = NULL, ovpn_user = NULL;
2380  HANDLE svc_token = NULL, imp_token = NULL, pri_token = NULL;
2381  HANDLE stdin_read = NULL, stdin_write = NULL;
2382  HANDLE stdout_write = NULL;
2383  DWORD pipe_mode, len, exit_code = 0;
2384  STARTUP_DATA sud = { 0, 0, 0 };
2385  STARTUPINFOW startup_info;
2386  PROCESS_INFORMATION proc_info;
2387  LPVOID user_env = NULL;
2388  WCHAR ovpn_pipe_name[256]; /* The entire pipe name string can be up to 256 characters long according to MSDN. */
2389  LPCWSTR exe_path;
2390  WCHAR *cmdline = NULL;
2391  size_t cmdline_size;
2392  undo_lists_t undo_lists;
2393  WCHAR errmsg[512] = L"";
2394 
2395  SECURITY_ATTRIBUTES inheritable = {
2396  .nLength = sizeof(inheritable),
2397  .lpSecurityDescriptor = NULL,
2398  .bInheritHandle = TRUE
2399  };
2400 
2401  PACL ovpn_dacl;
2402  EXPLICIT_ACCESS ea[2];
2403  SECURITY_DESCRIPTOR ovpn_sd;
2404  SECURITY_ATTRIBUTES ovpn_sa = {
2405  .nLength = sizeof(ovpn_sa),
2406  .lpSecurityDescriptor = &ovpn_sd,
2407  .bInheritHandle = FALSE
2408  };
2409 
2410  ZeroMemory(&ea, sizeof(ea));
2411  ZeroMemory(&startup_info, sizeof(startup_info));
2412  ZeroMemory(&undo_lists, sizeof(undo_lists));
2413  ZeroMemory(&proc_info, sizeof(proc_info));
2414 
2415  if (!GetStartupData(pipe, &sud))
2416  {
2417  goto out;
2418  }
2419 
2420  if (!InitializeSecurityDescriptor(&ovpn_sd, SECURITY_DESCRIPTOR_REVISION))
2421  {
2422  ReturnLastError(pipe, L"InitializeSecurityDescriptor");
2423  goto out;
2424  }
2425 
2426  /* Get SID of user the service is running under */
2427  if (!OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY, &svc_token))
2428  {
2429  ReturnLastError(pipe, L"OpenProcessToken");
2430  goto out;
2431  }
2432  len = 0;
2433  while (!GetTokenInformation(svc_token, TokenUser, svc_user, len, &len))
2434  {
2435  if (GetLastError() != ERROR_INSUFFICIENT_BUFFER)
2436  {
2437  ReturnLastError(pipe, L"GetTokenInformation (service token)");
2438  goto out;
2439  }
2440  free(svc_user);
2441  svc_user = malloc(len);
2442  if (svc_user == NULL)
2443  {
2444  ReturnLastError(pipe, L"malloc (service token user)");
2445  goto out;
2446  }
2447  }
2448  if (!IsValidSid(svc_user->User.Sid))
2449  {
2450  ReturnLastError(pipe, L"IsValidSid (service token user)");
2451  goto out;
2452  }
2453 
2454  if (!ImpersonateNamedPipeClient(pipe))
2455  {
2456  ReturnLastError(pipe, L"ImpersonateNamedPipeClient");
2457  goto out;
2458  }
2459  if (!OpenThreadToken(GetCurrentThread(), TOKEN_ALL_ACCESS, FALSE, &imp_token))
2460  {
2461  ReturnLastError(pipe, L"OpenThreadToken");
2462  goto out;
2463  }
2464  len = 0;
2465  while (!GetTokenInformation(imp_token, TokenUser, ovpn_user, len, &len))
2466  {
2467  if (GetLastError() != ERROR_INSUFFICIENT_BUFFER)
2468  {
2469  ReturnLastError(pipe, L"GetTokenInformation (impersonation token)");
2470  goto out;
2471  }
2472  free(ovpn_user);
2473  ovpn_user = malloc(len);
2474  if (ovpn_user == NULL)
2475  {
2476  ReturnLastError(pipe, L"malloc (impersonation token user)");
2477  goto out;
2478  }
2479  }
2480  if (!IsValidSid(ovpn_user->User.Sid))
2481  {
2482  ReturnLastError(pipe, L"IsValidSid (impersonation token user)");
2483  goto out;
2484  }
2485 
2486  /*
2487  * Only authorized users are allowed to use any command line options or
2488  * have the config file in locations other than the global config directory.
2489  *
2490  * Check options are white-listed and config is in the global directory
2491  * OR user is authorized to run any config.
2492  */
2493  if (!ValidateOptions(pipe, sud.directory, sud.options, errmsg, _countof(errmsg))
2494  && !IsAuthorizedUser(ovpn_user->User.Sid, imp_token, settings.ovpn_admin_group))
2495  {
2496  ReturnError(pipe, ERROR_STARTUP_DATA, errmsg, 1, &exit_event);
2497  goto out;
2498  }
2499 
2500  /* OpenVPN process DACL entry for access by service and user */
2501  ea[0].grfAccessPermissions = SPECIFIC_RIGHTS_ALL | STANDARD_RIGHTS_ALL;
2502  ea[0].grfAccessMode = SET_ACCESS;
2503  ea[0].grfInheritance = NO_INHERITANCE;
2504  ea[0].Trustee.TrusteeForm = TRUSTEE_IS_SID;
2505  ea[0].Trustee.TrusteeType = TRUSTEE_IS_UNKNOWN;
2506  ea[0].Trustee.ptstrName = (LPWSTR) svc_user->User.Sid;
2507  ea[1].grfAccessPermissions = READ_CONTROL | SYNCHRONIZE | PROCESS_VM_READ
2508  |SYNCHRONIZE | PROCESS_TERMINATE | PROCESS_QUERY_INFORMATION;
2509  ea[1].grfAccessMode = SET_ACCESS;
2510  ea[1].grfInheritance = NO_INHERITANCE;
2511  ea[1].Trustee.TrusteeForm = TRUSTEE_IS_SID;
2512  ea[1].Trustee.TrusteeType = TRUSTEE_IS_UNKNOWN;
2513  ea[1].Trustee.ptstrName = (LPWSTR) ovpn_user->User.Sid;
2514 
2515  /* Set owner and DACL of OpenVPN security descriptor */
2516  if (!SetSecurityDescriptorOwner(&ovpn_sd, svc_user->User.Sid, FALSE))
2517  {
2518  ReturnLastError(pipe, L"SetSecurityDescriptorOwner");
2519  goto out;
2520  }
2521  if (SetEntriesInAcl(2, ea, NULL, &ovpn_dacl) != ERROR_SUCCESS)
2522  {
2523  ReturnLastError(pipe, L"SetEntriesInAcl");
2524  goto out;
2525  }
2526  if (!SetSecurityDescriptorDacl(&ovpn_sd, TRUE, ovpn_dacl, FALSE))
2527  {
2528  ReturnLastError(pipe, L"SetSecurityDescriptorDacl");
2529  goto out;
2530  }
2531 
2532  /* Create primary token from impersonation token */
2533  if (!DuplicateTokenEx(imp_token, TOKEN_ALL_ACCESS, NULL, 0, TokenPrimary, &pri_token))
2534  {
2535  ReturnLastError(pipe, L"DuplicateTokenEx");
2536  goto out;
2537  }
2538 
2539  /* use /dev/null for stdout of openvpn (client should use --log for output) */
2540  stdout_write = CreateFile(_L("NUL"), GENERIC_WRITE, FILE_SHARE_WRITE,
2541  &inheritable, OPEN_EXISTING, 0, NULL);
2542  if (stdout_write == INVALID_HANDLE_VALUE)
2543  {
2544  ReturnLastError(pipe, L"CreateFile for stdout");
2545  goto out;
2546  }
2547 
2548  if (!CreatePipe(&stdin_read, &stdin_write, &inheritable, 0)
2549  || !SetHandleInformation(stdin_write, HANDLE_FLAG_INHERIT, 0))
2550  {
2551  ReturnLastError(pipe, L"CreatePipe");
2552  goto out;
2553  }
2554 
2555  swprintf(ovpn_pipe_name, _countof(ovpn_pipe_name),
2556  L"\\\\.\\pipe\\" _L(PACKAGE) L"%ls\\service_%lu", service_instance, GetCurrentThreadId());
2557  ovpn_pipe = CreateNamedPipe(ovpn_pipe_name,
2558  PIPE_ACCESS_DUPLEX | FILE_FLAG_FIRST_PIPE_INSTANCE | FILE_FLAG_OVERLAPPED,
2559  PIPE_TYPE_MESSAGE | PIPE_READMODE_MESSAGE | PIPE_WAIT, 1, 128, 128, 0, NULL);
2560  if (ovpn_pipe == INVALID_HANDLE_VALUE)
2561  {
2562  ReturnLastError(pipe, L"CreateNamedPipe");
2563  goto out;
2564  }
2565 
2566  svc_pipe = CreateFile(ovpn_pipe_name, GENERIC_READ | GENERIC_WRITE, 0,
2567  &inheritable, OPEN_EXISTING, 0, NULL);
2568  if (svc_pipe == INVALID_HANDLE_VALUE)
2569  {
2570  ReturnLastError(pipe, L"CreateFile");
2571  goto out;
2572  }
2573 
2574  pipe_mode = PIPE_READMODE_MESSAGE;
2575  if (!SetNamedPipeHandleState(svc_pipe, &pipe_mode, NULL, NULL))
2576  {
2577  ReturnLastError(pipe, L"SetNamedPipeHandleState");
2578  goto out;
2579  }
2580 
2581  cmdline_size = wcslen(sud.options) + 128;
2582  cmdline = malloc(cmdline_size * sizeof(*cmdline));
2583  if (cmdline == NULL)
2584  {
2585  ReturnLastError(pipe, L"malloc");
2586  goto out;
2587  }
2588  /* there seem to be no common printf specifier that works on all
2589  * mingw/msvc platforms without trickery, so convert to void* and use
2590  * PRIuPTR to print that as best compromise */
2591  swprintf(cmdline, cmdline_size, L"openvpn %ls --msg-channel %" PRIuPTR,
2592  sud.options, (uintptr_t)svc_pipe);
2593 
2594  if (!CreateEnvironmentBlock(&user_env, imp_token, FALSE))
2595  {
2596  ReturnLastError(pipe, L"CreateEnvironmentBlock");
2597  goto out;
2598  }
2599 
2600  startup_info.cb = sizeof(startup_info);
2601  startup_info.dwFlags = STARTF_USESTDHANDLES;
2602  startup_info.hStdInput = stdin_read;
2603  startup_info.hStdOutput = stdout_write;
2604  startup_info.hStdError = stdout_write;
2605 
2606  exe_path = settings.exe_path;
2607 
2608  /* TODO: make sure HKCU is correct or call LoadUserProfile() */
2609  if (!CreateProcessAsUserW(pri_token, exe_path, cmdline, &ovpn_sa, NULL, TRUE,
2610  settings.priority | CREATE_NO_WINDOW | CREATE_UNICODE_ENVIRONMENT,
2611  user_env, sud.directory, &startup_info, &proc_info))
2612  {
2613  ReturnLastError(pipe, L"CreateProcessAsUser");
2614  goto out;
2615  }
2616 
2617  if (!RevertToSelf())
2618  {
2619  TerminateProcess(proc_info.hProcess, 1);
2620  ReturnLastError(pipe, L"RevertToSelf");
2621  goto out;
2622  }
2623 
2624  ReturnProcessId(pipe, proc_info.dwProcessId, 1, &exit_event);
2625 
2626  CloseHandleEx(&stdout_write);
2627  CloseHandleEx(&stdin_read);
2628  CloseHandleEx(&svc_pipe);
2629 
2630  DWORD input_size = WideCharToMultiByte(CP_UTF8, 0, sud.std_input, -1, NULL, 0, NULL, NULL);
2631  LPSTR input = NULL;
2632  if (input_size && (input = malloc(input_size)))
2633  {
2634  DWORD written;
2635  WideCharToMultiByte(CP_UTF8, 0, sud.std_input, -1, input, input_size, NULL, NULL);
2636  WriteFile(stdin_write, input, (DWORD)strlen(input), &written, NULL);
2637  free(input);
2638  }
2639 
2640  while (TRUE)
2641  {
2642  DWORD bytes = PeekNamedPipeAsync(ovpn_pipe, 1, &exit_event);
2643  if (bytes == 0)
2644  {
2645  break;
2646  }
2647 
2648  if (bytes > sizeof(pipe_message_t))
2649  {
2650  /* process at the other side of the pipe is misbehaving, shut it down */
2651  MsgToEventLog(MSG_FLAGS_ERROR, L"OpenVPN process sent too large payload length to the pipe (%lu bytes), it will be terminated", bytes);
2652  break;
2653  }
2654 
2655  HandleMessage(ovpn_pipe, proc_info.hProcess, bytes, 1, &exit_event, &undo_lists);
2656  }
2657 
2658  WaitForSingleObject(proc_info.hProcess, IO_TIMEOUT);
2659  GetExitCodeProcess(proc_info.hProcess, &exit_code);
2660  if (exit_code == STILL_ACTIVE)
2661  {
2662  TerminateProcess(proc_info.hProcess, 1);
2663  }
2664  else if (exit_code != 0)
2665  {
2666  WCHAR buf[256];
2667  swprintf(buf, _countof(buf),
2668  L"OpenVPN exited with error: exit code = %lu", exit_code);
2669  ReturnError(pipe, ERROR_OPENVPN_STARTUP, buf, 1, &exit_event);
2670  }
2671  Undo(&undo_lists);
2672 
2673 out:
2674  FlushFileBuffers(pipe);
2675  DisconnectNamedPipe(pipe);
2676 
2677  free(ovpn_user);
2678  free(svc_user);
2679  free(cmdline);
2680  DestroyEnvironmentBlock(user_env);
2681  FreeStartupData(&sud);
2682  CloseHandleEx(&proc_info.hProcess);
2683  CloseHandleEx(&proc_info.hThread);
2684  CloseHandleEx(&stdin_read);
2685  CloseHandleEx(&stdin_write);
2686  CloseHandleEx(&stdout_write);
2687  CloseHandleEx(&svc_token);
2688  CloseHandleEx(&imp_token);
2689  CloseHandleEx(&pri_token);
2690  CloseHandleEx(&ovpn_pipe);
2691  CloseHandleEx(&svc_pipe);
2692  CloseHandleEx(&pipe);
2693 
2694  return 0;
2695 }
2696 
2697 
2698 static DWORD WINAPI
2699 ServiceCtrlInteractive(DWORD ctrl_code, DWORD event, LPVOID data, LPVOID ctx)
2700 {
2701  SERVICE_STATUS *status = ctx;
2702  switch (ctrl_code)
2703  {
2704  case SERVICE_CONTROL_STOP:
2705  status->dwCurrentState = SERVICE_STOP_PENDING;
2707  if (exit_event)
2708  {
2709  SetEvent(exit_event);
2710  }
2711  return NO_ERROR;
2712 
2713  case SERVICE_CONTROL_INTERROGATE:
2714  return NO_ERROR;
2715 
2716  default:
2717  return ERROR_CALL_NOT_IMPLEMENTED;
2718  }
2719 }
2720 
2721 
2722 static HANDLE
2724 {
2725  /*
2726  * allow all access for local system
2727  * deny FILE_CREATE_PIPE_INSTANCE for everyone
2728  * allow read/write for authenticated users
2729  * deny all access to anonymous
2730  */
2731  const WCHAR *sddlString = L"D:(A;OICI;GA;;;S-1-5-18)(D;OICI;0x4;;;S-1-1-0)(A;OICI;GRGW;;;S-1-5-11)(D;;GA;;;S-1-5-7)";
2732 
2733  PSECURITY_DESCRIPTOR sd = NULL;
2734  if (!ConvertStringSecurityDescriptorToSecurityDescriptor(sddlString, SDDL_REVISION_1, &sd, NULL))
2735  {
2736  MsgToEventLog(M_SYSERR, L"ConvertStringSecurityDescriptorToSecurityDescriptor failed.");
2737  return INVALID_HANDLE_VALUE;
2738  }
2739 
2740  /* Set up SECURITY_ATTRIBUTES */
2741  SECURITY_ATTRIBUTES sa = {0};
2742  sa.nLength = sizeof(SECURITY_ATTRIBUTES);
2743  sa.lpSecurityDescriptor = sd;
2744  sa.bInheritHandle = FALSE;
2745 
2746  DWORD flags = PIPE_ACCESS_DUPLEX | WRITE_DAC | FILE_FLAG_OVERLAPPED;
2747 
2748  static BOOL first = TRUE;
2749  if (first)
2750  {
2751  flags |= FILE_FLAG_FIRST_PIPE_INSTANCE;
2752  first = FALSE;
2753  }
2754 
2755  WCHAR pipe_name[256]; /* The entire pipe name string can be up to 256 characters long according to MSDN. */
2756  swprintf(pipe_name, _countof(pipe_name), L"\\\\.\\pipe\\" _L(PACKAGE) L"%ls\\service", service_instance);
2757  HANDLE pipe = CreateNamedPipe(pipe_name, flags,
2758  PIPE_TYPE_MESSAGE | PIPE_READMODE_MESSAGE | PIPE_REJECT_REMOTE_CLIENTS,
2759  PIPE_UNLIMITED_INSTANCES, 1024, 1024, 0, &sa);
2760 
2761  LocalFree(sd);
2762 
2763  if (pipe == INVALID_HANDLE_VALUE)
2764  {
2765  MsgToEventLog(M_SYSERR, L"Could not create named pipe");
2766  return INVALID_HANDLE_VALUE;
2767  }
2768 
2769  return pipe;
2770 }
2771 
2772 
2773 static DWORD
2774 UpdateWaitHandles(LPHANDLE *handles_ptr, LPDWORD count,
2775  HANDLE io_event, HANDLE exit_event, list_item_t *threads)
2776 {
2777  static DWORD size = 10;
2778  static LPHANDLE handles = NULL;
2779  DWORD pos = 0;
2780 
2781  if (handles == NULL)
2782  {
2783  handles = malloc(size * sizeof(HANDLE));
2784  *handles_ptr = handles;
2785  if (handles == NULL)
2786  {
2787  return ERROR_OUTOFMEMORY;
2788  }
2789  }
2790 
2791  handles[pos++] = io_event;
2792 
2793  if (!threads)
2794  {
2795  handles[pos++] = exit_event;
2796  }
2797 
2798  while (threads)
2799  {
2800  if (pos == size)
2801  {
2802  LPHANDLE tmp;
2803  size += 10;
2804  tmp = realloc(handles, size * sizeof(HANDLE));
2805  if (tmp == NULL)
2806  {
2807  size -= 10;
2808  *count = pos;
2809  return ERROR_OUTOFMEMORY;
2810  }
2811  handles = tmp;
2812  *handles_ptr = handles;
2813  }
2814  handles[pos++] = threads->data;
2815  threads = threads->next;
2816  }
2817 
2818  *count = pos;
2819  return NO_ERROR;
2820 }
2821 
2822 
2823 static VOID
2824 FreeWaitHandles(LPHANDLE h)
2825 {
2826  free(h);
2827 }
2828 
2829 static BOOL
2830 CmpHandle(LPVOID item, LPVOID hnd)
2831 {
2832  return item == hnd;
2833 }
2834 
2835 
2836 VOID WINAPI
2837 ServiceStartInteractiveOwn(DWORD dwArgc, LPWSTR *lpszArgv)
2838 {
2839  status.dwServiceType = SERVICE_WIN32_OWN_PROCESS;
2840  ServiceStartInteractive(dwArgc, lpszArgv);
2841 }
2842 
2848 static void
2850 {
2851  HKEY key;
2852  DWORD changed = 0;
2853 
2854  /* Clean up leftover DNS search list fragments */
2855  BOOL gpol_list;
2856  GetDnsSearchListKey(NULL, &gpol_list, &key);
2857  if (key != INVALID_HANDLE_VALUE)
2858  {
2860  {
2861  changed++;
2862  }
2863  RegCloseKey(key);
2864  }
2865 
2866  if (changed)
2867  {
2868  ApplyDnsSettings(gpol_list);
2869  }
2870 }
2871 
2872 VOID WINAPI
2873 ServiceStartInteractive(DWORD dwArgc, LPWSTR *lpszArgv)
2874 {
2875  HANDLE pipe, io_event = NULL;
2876  OVERLAPPED overlapped;
2877  DWORD error = NO_ERROR;
2878  list_item_t *threads = NULL;
2879  PHANDLE handles = NULL;
2880  DWORD handle_count;
2881 
2882  service = RegisterServiceCtrlHandlerEx(interactive_service.name, ServiceCtrlInteractive, &status);
2883  if (!service)
2884  {
2885  return;
2886  }
2887 
2888  status.dwCurrentState = SERVICE_START_PENDING;
2889  status.dwServiceSpecificExitCode = NO_ERROR;
2890  status.dwWin32ExitCode = NO_ERROR;
2891  status.dwWaitHint = 3000;
2893 
2894  /* Clean up potentially left over registry values */
2895  CleanupRegistry();
2896 
2897  /* Read info from registry in key HKLM\SOFTWARE\OpenVPN */
2898  error = GetOpenvpnSettings(&settings);
2899  if (error != ERROR_SUCCESS)
2900  {
2901  goto out;
2902  }
2903 
2904  io_event = InitOverlapped(&overlapped);
2905  exit_event = CreateEvent(NULL, TRUE, FALSE, NULL);
2906  if (!exit_event || !io_event)
2907  {
2908  error = MsgToEventLog(M_SYSERR, L"Could not create event");
2909  goto out;
2910  }
2911 
2912  rdns_semaphore = CreateSemaphoreW(NULL, 1, 1, NULL);
2913  if (!rdns_semaphore)
2914  {
2915  error = MsgToEventLog(M_SYSERR, L"Could not create semaphore for register-dns");
2916  goto out;
2917  }
2918 
2919  error = UpdateWaitHandles(&handles, &handle_count, io_event, exit_event, threads);
2920  if (error != NO_ERROR)
2921  {
2922  goto out;
2923  }
2924 
2925  pipe = CreateClientPipeInstance();
2926  if (pipe == INVALID_HANDLE_VALUE)
2927  {
2928  goto out;
2929  }
2930 
2931  status.dwCurrentState = SERVICE_RUNNING;
2932  status.dwWaitHint = 0;
2934 
2935  while (TRUE)
2936  {
2937  if (ConnectNamedPipe(pipe, &overlapped) == FALSE
2938  && GetLastError() != ERROR_PIPE_CONNECTED
2939  && GetLastError() != ERROR_IO_PENDING)
2940  {
2941  MsgToEventLog(M_SYSERR, L"Could not connect pipe");
2942  break;
2943  }
2944 
2945  error = WaitForMultipleObjects(handle_count, handles, FALSE, INFINITE);
2946  if (error == WAIT_OBJECT_0)
2947  {
2948  /* Client connected, spawn a worker thread for it */
2949  HANDLE next_pipe = CreateClientPipeInstance();
2950  HANDLE thread = CreateThread(NULL, 0, RunOpenvpn, pipe, CREATE_SUSPENDED, NULL);
2951  if (thread)
2952  {
2953  error = AddListItem(&threads, thread);
2954  if (!error)
2955  {
2956  error = UpdateWaitHandles(&handles, &handle_count, io_event, exit_event, threads);
2957  }
2958  if (error)
2959  {
2960  ReturnError(pipe, error, L"Insufficient resources to service new clients", 1, &exit_event);
2961  /* Update wait handles again after removing the last worker thread */
2962  RemoveListItem(&threads, CmpHandle, thread);
2963  UpdateWaitHandles(&handles, &handle_count, io_event, exit_event, threads);
2964  TerminateThread(thread, 1);
2965  CloseHandleEx(&thread);
2966  CloseHandleEx(&pipe);
2967  }
2968  else
2969  {
2970  ResumeThread(thread);
2971  }
2972  }
2973  else
2974  {
2975  CloseHandleEx(&pipe);
2976  }
2977 
2978  ResetOverlapped(&overlapped);
2979  pipe = next_pipe;
2980  }
2981  else
2982  {
2983  CancelIo(pipe);
2984  if (error == WAIT_FAILED)
2985  {
2986  MsgToEventLog(M_SYSERR, L"WaitForMultipleObjects failed");
2987  SetEvent(exit_event);
2988  /* Give some time for worker threads to exit and then terminate */
2989  Sleep(1000);
2990  break;
2991  }
2992  if (!threads)
2993  {
2994  /* exit event signaled */
2995  CloseHandleEx(&pipe);
2996  ResetEvent(exit_event);
2997  error = NO_ERROR;
2998  break;
2999  }
3000 
3001  /* Worker thread ended */
3002  HANDLE thread = RemoveListItem(&threads, CmpHandle, handles[error]);
3003  UpdateWaitHandles(&handles, &handle_count, io_event, exit_event, threads);
3004  CloseHandleEx(&thread);
3005  }
3006  }
3007 
3008 out:
3009  FreeWaitHandles(handles);
3010  CloseHandleEx(&io_event);
3013 
3014  status.dwCurrentState = SERVICE_STOPPED;
3015  status.dwWin32ExitCode = error;
3017 }
service_instance
LPCWSTR service_instance
Definition: common.c:27
ack_message_t::header
message_header_t header
Definition: openvpn-msg.h:125
add_wfp_block_filters
DWORD add_wfp_block_filters(HANDLE *engine_handle, int index, const WCHAR *exe_path, wfp_block_msg_handler_t msg_handler, BOOL dns_only)
Definition: wfp_block.c:185
wfp_block_data_t
Definition: interactive.c:98
CmpAny
static BOOL CmpAny(LPVOID item, LPVOID any)
Definition: interactive.c:771
RDNS_TIMEOUT
#define RDNS_TIMEOUT
Definition: interactive.c:57
HandleWfpBlockMessage
static DWORD HandleWfpBlockMessage(const wfp_block_message_t *msg, undo_lists_t *lists)
Definition: interactive.c:877
set_mtu_message_t::mtu
int mtu
Definition: openvpn-msg.h:153
address_message_t
Definition: openvpn-msg.h:72
get_interface_metric
int get_interface_metric(const NET_IFINDEX index, const ADDRESS_FAMILY family, int *is_auto)
Return interface metric value for the specified interface index.
Definition: wfp_block.c:404
M_INFO
#define M_INFO
Definition: errlevel.h:55
ServiceStartInteractiveOwn
VOID WINAPI ServiceStartInteractiveOwn(DWORD dwArgc, LPWSTR *lpszArgv)
Definition: interactive.c:2837
utf8to16
static wchar_t * utf8to16(const char *utf8)
Convert a zero terminated UTF-8 string to UTF-16.
Definition: service.h:118
OvpnUnmapViewOfFile
static void OvpnUnmapViewOfFile(struct tun_ring **ring)
Definition: interactive.c:182
settings_t::priority
DWORD priority
Definition: service.h:69
undo_wins
@ undo_wins
Definition: interactive.c:93
CmpRoute
static BOOL CmpRoute(LPVOID item, LPVOID route)
Definition: interactive.c:652
_L
#define _L(q)
Definition: basic.h:37
msg_del_dns_cfg
@ msg_del_dns_cfg
Definition: openvpn-msg.h:37
CmpHandle
static BOOL CmpHandle(LPVOID item, LPVOID hnd)
Definition: interactive.c:2830
GetDnsSearchListKey
static BOOL GetDnsSearchListKey(PCSTR itf_name, PBOOL gpol, PHKEY key)
Find the registry key for storing the DNS domains for the VPN interface.
Definition: interactive.c:1341
PACKAGE_NAME
#define PACKAGE_NAME
Definition: config.h:492
IsAuthorizedUser
BOOL IsAuthorizedUser(PSID sid, const HANDLE token, const WCHAR *ovpn_admin_group)
Definition: validate.c:148
msg_add_dns_cfg
@ msg_add_dns_cfg
Definition: openvpn-msg.h:36
argv
Definition: argv.h:35
StoreInitialDnsSearchList
static BOOL StoreInitialDnsSearchList(HKEY key, PCWSTR list)
Prepare DNS domain "SearchList" registry value, so additional VPN domains can be added and its origin...
Definition: interactive.c:1438
AddWfpBlock
static DWORD AddWfpBlock(const wfp_block_message_t *msg, undo_lists_t *lists)
Definition: interactive.c:806
service.h
msg_register_dns
@ msg_register_dns
Definition: openvpn-msg.h:43
dns_cfg_message_t
Definition: openvpn-msg.h:90
dns_cfg_message_t::iface
interface_t iface
Definition: openvpn-msg.h:92
set_mtu_message_t::iface
interface_t iface
Definition: openvpn-msg.h:151
undo_domains
@ undo_domains
Definition: interactive.c:91
undo_dns6
@ undo_dns6
Definition: interactive.c:90
netsh_wins_cmd
static DWORD netsh_wins_cmd(const wchar_t *action, const wchar_t *if_name, const wchar_t *addr)
Run the command: netsh interface ip $action wins $if_name [static] $addr.
Definition: interactive.c:1036
enable_dhcp_message_t
Definition: openvpn-msg.h:135
HandleFlushNeighborsMessage
static DWORD HandleFlushNeighborsMessage(flush_neighbors_message_t *msg)
Definition: interactive.c:736
wfp_block
@ wfp_block
Definition: interactive.c:88
RemoveListItem
static LPVOID RemoveListItem(list_item_t **pfirst, match_fn_t match, LPVOID ctx)
Definition: interactive.c:147
delete_wfp_block_filters
DWORD delete_wfp_block_filters(HANDLE engine_handle)
Definition: wfp_block.c:379
PeekNamedPipeAsync
static DWORD PeekNamedPipeAsync(HANDLE pipe, DWORD count, LPHANDLE events)
Definition: interactive.c:292
ApplyGpolSettings64
static BOOL ApplyGpolSettings64(void)
Signal the DNS resolver (and others potentially) to reload the group policy (DNS) settings on 64 bit ...
Definition: interactive.c:1136
register_ring_buffers_message_t::send_tail_moved
HANDLE send_tail_moved
Definition: openvpn-msg.h:145
ValidateOptions
static BOOL ValidateOptions(HANDLE pipe, const WCHAR *workdir, const WCHAR *options, WCHAR *errmsg, DWORD capacity)
Definition: interactive.c:375
ack_message_t
Definition: openvpn-msg.h:124
peek
@ peek
Definition: interactive.c:222
_list_item
Definition: interactive.c:78
pos
static int pos(char c)
Definition: base64.c:105
CleanupRegistry
static void CleanupRegistry(void)
Clean up remains of previous sessions in registry.
Definition: interactive.c:2849
wfp_block_data_t::engine
HANDLE engine
Definition: interactive.c:99
WFP_BLOCK_IFACE_METRIC
#define WFP_BLOCK_IFACE_METRIC
Definition: wfp_block.h:34
settings_t::ovpn_admin_group
WCHAR ovpn_admin_group[MAX_NAME]
Definition: service.h:68
message_header_t
Definition: openvpn-msg.h:51
ERROR_OPENVPN_STARTUP
#define ERROR_OPENVPN_STARTUP
Definition: interactive.c:47
PACKAGE
#define PACKAGE
Definition: config.h:486
CmpAddress
static BOOL CmpAddress(LPVOID item, LPVOID address)
Definition: interactive.c:574
HandleMTUMessage
static DWORD HandleMTUMessage(const set_mtu_message_t *mtu)
Definition: interactive.c:2182
SERVICE_DEPENDENCIES
#define SERVICE_DEPENDENCIES
Definition: service.h:38
ServiceCtrlInteractive
static DWORD WINAPI ServiceCtrlInteractive(DWORD ctrl_code, DWORD event, LPVOID data, LPVOID ctx)
Definition: interactive.c:2699
msg_set_mtu
@ msg_set_mtu
Definition: openvpn-msg.h:46
msg_register_ring_buffers
@ msg_register_ring_buffers
Definition: openvpn-msg.h:45
register_ring_buffers_message_t
Definition: openvpn-msg.h:140
msg_add_route
@ msg_add_route
Definition: openvpn-msg.h:34
MSG_FLAGS_ERROR
#define MSG_FLAGS_ERROR
Definition: service.h:43
pipe_message_t::wfp_block
wfp_block_message_t wfp_block
Definition: interactive.c:120
register_ring_buffers
static bool register_ring_buffers(HANDLE device, struct tun_ring *send_ring, struct tun_ring *receive_ring, HANDLE send_tail_moved, HANDLE receive_tail_moved)
Registers ring buffers used to exchange data between userspace openvpn process and wintun kernel driv...
Definition: ring_buffer.h:98
InitOverlapped
static HANDLE InitOverlapped(LPOVERLAPPED overlapped)
Definition: interactive.c:199
set_mtu_message_t::family
short family
Definition: openvpn-msg.h:152
msg_enable_dhcp
@ msg_enable_dhcp
Definition: openvpn-msg.h:44
key
Container for unidirectional cipher and HMAC key material.
Definition: crypto.h:151
ApplyGpolSettings
static BOOL ApplyGpolSettings(void)
Signal the DNS resolver (and others potentially) to reload the group policy (DNS) settings.
Definition: interactive.c:1173
ReturnLastError
static VOID ReturnLastError(HANDLE pipe, LPCWSTR func)
Definition: interactive.c:364
pipe_message_t::dhcp
enable_dhcp_message_t dhcp
Definition: interactive.c:122
OvpnDuplicateHandle
static DWORD OvpnDuplicateHandle(HANDLE ovpn_proc, HANDLE orig_handle, HANDLE *new_handle)
Definition: interactive.c:2069
AddDnsSearchDomains
static BOOL AddDnsSearchDomains(HKEY key, BOOL have_list, PCWSTR domains)
Append domain suffixes to an existing search list.
Definition: interactive.c:1474
interface_t::index
int index
Definition: openvpn-msg.h:63
ring_buffer_maps_t
Definition: interactive.c:110
read
@ read
Definition: interactive.c:223
_undo_type_max
@ _undo_type_max
Definition: interactive.c:94
route_message_t
Definition: openvpn-msg.h:80
rdns_semaphore
static HANDLE rdns_semaphore
Definition: interactive.c:56
wfp_block_dns
@ wfp_block_dns
Definition: openvpn-msg.h:69
tun_ring
Wintun ring buffer See https://github.com/WireGuard/wintun#ring-layout.
Definition: ring_buffer.h:50
InterfaceIdString
static DWORD InterfaceIdString(PCSTR itf_name, PWSTR str, size_t len)
Get the string interface UUID (with braces) for an interface alias name.
Definition: interactive.c:1248
ERROR_STARTUP_DATA
#define ERROR_STARTUP_DATA
Definition: interactive.c:48
DeleteWfpBlock
static DWORD DeleteWfpBlock(const wfp_block_message_t *msg, undo_lists_t *lists)
Definition: interactive.c:777
write
@ write
Definition: interactive.c:224
BlockDNSErrHandler
static void BlockDNSErrHandler(DWORD err, const char *msg)
Definition: interactive.c:747
HandleRouteMessage
static DWORD HandleRouteMessage(route_message_t *msg, undo_lists_t *lists)
Definition: interactive.c:664
RemoveDnsSearchDomains
static void RemoveDnsSearchDomains(HKEY key, PCWSTR domains)
Remove domain suffixes from an existing search list.
Definition: interactive.c:1579
HandleEnableDHCPMessage
static DWORD HandleEnableDHCPMessage(const enable_dhcp_message_t *dhcp)
Definition: interactive.c:2031
ResetNameServers
static DWORD ResetNameServers(PCWSTR itf_id, short family)
Delete all DNS name servers from a registry interface configuration.
Definition: interactive.c:1838
interface_t::name
char name[256]
Definition: openvpn-msg.h:64
register_ring_buffers_message_t::receive_ring_handle
HANDLE receive_ring_handle
Definition: openvpn-msg.h:144
DuplicateAndMapRing
static DWORD DuplicateAndMapRing(HANDLE ovpn_proc, HANDLE orig_handle, struct tun_ring **ring)
Definition: interactive.c:2084
ack_message_t::error_number
int error_number
Definition: openvpn-msg.h:126
ApplyGpolSettings32
static BOOL ApplyGpolSettings32(void)
Signal the DNS resolver (and others potentially) to reload the group policy (DNS) settings on 32 bit ...
Definition: interactive.c:1096
Undo
static VOID Undo(undo_lists_t *lists)
Definition: interactive.c:2306
DeleteRoute
static DWORD DeleteRoute(PMIB_IPFORWARD_ROW2 fwd_row)
Definition: interactive.c:658
openvpn_service_t
Definition: service.h:54
register_ring_buffers_message_t::device
HANDLE device
Definition: openvpn-msg.h:142
wins_cfg_message_t::iface
interface_t iface
Definition: openvpn-msg.h:101
settings_t::exe_path
WCHAR exe_path[MAX_PATH]
Definition: service.h:64
msg_del_route
@ msg_del_route
Definition: openvpn-msg.h:35
ring_buffer_maps_t::send_ring
struct tun_ring * send_ring
Definition: interactive.c:111
message_header_t::type
message_type_t type
Definition: openvpn-msg.h:52
options
Definition: options.h:249
CloseHandleEx
static HANDLE CloseHandleEx(LPHANDLE handle)
Definition: interactive.c:171
MsgToEventLog
DWORD MsgToEventLog(DWORD flags, LPCWSTR format,...)
Definition: common.c:215
undo_dns4
@ undo_dns4
Definition: interactive.c:89
wfp_block_data_t::index
int index
Definition: interactive.c:100
dns_domains_undo_data_t::itf_name
char itf_name[256]
Definition: interactive.c:106
M_ERR
#define M_ERR
Definition: error.h:105
wfp_block_message_t
Definition: openvpn-msg.h:129
register_ring_buffers_message_t::send_ring_handle
HANDLE send_ring_handle
Definition: openvpn-msg.h:143
WritePipeAsync
static DWORD WritePipeAsync(HANDLE pipe, LPVOID data, DWORD size, DWORD count, LPHANDLE events)
Definition: interactive.c:304
FreeStartupData
static VOID FreeStartupData(STARTUP_DATA *sud)
Definition: interactive.c:532
CreateClientPipeInstance
static HANDLE CreateClientPipeInstance(VOID)
Definition: interactive.c:2723
UnmapRingBuffer
static void UnmapRingBuffer(ring_buffer_maps_t *ring_buffer_maps)
Definition: interactive.c:192
buffer
Wrapper structure for dynamically allocated memory.
Definition: buffer.h:60
pipe_message_t::mtu
set_mtu_message_t mtu
Definition: interactive.c:124
HasValidSearchList
static BOOL HasValidSearchList(HKEY key)
Check for a valid search list in a certain key of the registry.
Definition: interactive.c:1304
ResetOverlapped
static BOOL ResetOverlapped(LPOVERLAPPED overlapped)
Definition: interactive.c:208
FreeWaitHandles
static VOID FreeWaitHandles(LPHANDLE h)
Definition: interactive.c:2824
dns_domains_undo_data_t
Definition: interactive.c:105
RunOpenvpn
static DWORD WINAPI RunOpenvpn(LPVOID p)
Definition: interactive.c:2375
CmpWString
static BOOL CmpWString(LPVOID item, LPVOID str)
Definition: interactive.c:1084
address
@ address
Definition: interactive.c:86
pipe_message_t::rrb
register_ring_buffers_message_t rrb
Definition: interactive.c:123
pipe_message_t
Definition: interactive.c:115
pipe_message_t::address
address_message_t address
Definition: interactive.c:117
dns_domains_undo_data_t::domains
PWSTR domains
Definition: interactive.c:107
msg_del_wfp_block
@ msg_del_wfp_block
Definition: openvpn-msg.h:42
settings_t
Definition: service.h:63
RegisterDNS
static DWORD WINAPI RegisterDNS(LPVOID unused)
Definition: interactive.c:956
wfp_block.h
msg_add_wins_cfg
@ msg_add_wins_cfg
Definition: openvpn-msg.h:47
ERROR_MESSAGE_TYPE
#define ERROR_MESSAGE_TYPE
Definition: interactive.c:50
STARTUP_DATA::options
WCHAR * options
Definition: interactive.c:72
ring_buffer_maps_t::receive_ring
struct tun_ring * receive_ring
Definition: interactive.c:112
pipe_message_t::header
message_header_t header
Definition: interactive.c:116
dns_cfg_message_t::domains
char domains[512]
Definition: openvpn-msg.h:93
register_ring_buffers_message_t::receive_tail_moved
HANDLE receive_tail_moved
Definition: openvpn-msg.h:146
ReturnError
static VOID ReturnError(HANDLE pipe, DWORD error, LPCWSTR func, DWORD count, LPHANDLE events)
Definition: interactive.c:325
async_op_t
async_op_t
Definition: interactive.c:221
ApplyDnsSettings
static BOOL ApplyDnsSettings(BOOL apply_gpol)
Signal the DNS resolver to reload its settings.
Definition: interactive.c:1189
openvpn_service_t::name
WCHAR * name
Definition: service.h:56
IO_TIMEOUT
#define IO_TIMEOUT
Definition: interactive.c:45
route
@ route
Definition: interactive.c:87
exit_event
static HANDLE exit_event
Definition: interactive.c:54
flush_neighbors_message_t
Definition: openvpn-msg.h:118
UpdateWaitHandles
static DWORD UpdateWaitHandles(LPHANDLE *handles_ptr, LPDWORD count, HANDLE io_event, HANDLE exit_event, list_item_t *threads)
Definition: interactive.c:2774
UndoDnsSearchDomains
static void UndoDnsSearchDomains(dns_domains_undo_data_t *undo_data)
Removes DNS domains from a search list they were previously added to.
Definition: interactive.c:1644
pipe_message_t::route
route_message_t route
Definition: interactive.c:118
message_header_t::message_id
int message_id
Definition: openvpn-msg.h:54
ring_buffer.h
M_SYSERR
#define M_SYSERR
Definition: service.h:46
wfp_block_data_t::metric_v4
int metric_v4
Definition: interactive.c:101
wfp_block_data_t::metric_v6
int metric_v6
Definition: interactive.c:102
undo_type_t
undo_type_t
Definition: interactive.c:85
SetNameServers
static DWORD SetNameServers(PCWSTR itf_id, short family, PCSTR addrs)
Set the DNS name servers in a registry interface configuration.
Definition: interactive.c:1824
inet_address_t::ipv4
struct in_addr ipv4
Definition: openvpn-msg.h:58
ServiceStartInteractive
VOID WINAPI ServiceStartInteractive(DWORD dwArgc, LPWSTR *lpszArgv)
Definition: interactive.c:2873
service
static SERVICE_STATUS_HANDLE service
Definition: interactive.c:52
STARTUP_DATA::directory
WCHAR * directory
Definition: interactive.c:71
DeleteAddress
static DWORD DeleteAddress(PMIB_UNICASTIPADDRESS_ROW addr_row)
Definition: interactive.c:580
STARTUP_DATA::std_input
WCHAR * std_input
Definition: interactive.c:73
set_mtu_message_t
Definition: openvpn-msg.h:149
set_interface_metric
DWORD set_interface_metric(const NET_IFINDEX index, const ADDRESS_FAMILY family, const ULONG metric)
Sets interface metric value for specified interface index.
Definition: wfp_block.c:443
_list_item::next
struct _list_item * next
Definition: interactive.c:79
status
static SERVICE_STATUS status
Definition: interactive.c:53
SetDnsSearchDomains
static DWORD SetDnsSearchDomains(PCSTR itf_name, PCSTR domains, PBOOL gpol, undo_lists_t *lists)
Add or remove DNS search domains.
Definition: interactive.c:1682
GetInterfacesKey
static BOOL GetInterfacesKey(short family, PHKEY key)
Return the interfaces registry key for the specified address family.
Definition: interactive.c:1749
SetNameServersValue
static DWORD SetNameServersValue(PCWSTR itf_id, short family, PCSTR value)
Set the DNS name servers in a registry interface configuration.
Definition: interactive.c:1776
ResetDnsSearchDomains
static BOOL ResetDnsSearchDomains(HKEY key)
Reset the DNS search list to its original value.
Definition: interactive.c:1538
HandleWINSConfigMessage
static DWORD HandleWINSConfigMessage(const wins_cfg_message_t *msg, undo_lists_t *lists)
Definition: interactive.c:1951
CheckOption
BOOL CheckOption(const WCHAR *workdir, int argc, WCHAR *argv[], const settings_t *s)
Definition: validate.c:317
ReadPipeAsync
static DWORD ReadPipeAsync(HANDLE pipe, LPVOID buffer, DWORD size, DWORD count, LPHANDLE events)
Definition: interactive.c:298
match_fn_t
BOOL(* match_fn_t)(LPVOID item, LPVOID ctx)
Definition: interactive.c:144
undo_ring_buffer
@ undo_ring_buffer
Definition: interactive.c:92
ERROR_MESSAGE_DATA
#define ERROR_MESSAGE_DATA
Definition: interactive.c:49
msg_acknowledgement
@ msg_acknowledgement
Definition: openvpn-msg.h:31
inet_address_t::ipv6
struct in6_addr ipv6
Definition: openvpn-msg.h:59
IsOption
static BOOL IsOption(const WCHAR *o)
Definition: validate.h:42
validate.h
openvpn-msg.h
ReportStatusToSCMgr
BOOL ReportStatusToSCMgr(SERVICE_STATUS_HANDLE service, SERVICE_STATUS *status)
Definition: service.c:22
_list_item::data
LPVOID data
Definition: interactive.c:80
pipe_message_t::dns
dns_cfg_message_t dns
Definition: interactive.c:121
pipe_message_t::flush_neighbors
flush_neighbors_message_t flush_neighbors
Definition: interactive.c:119
AsyncPipeOp
static DWORD AsyncPipeOp(async_op_t op, HANDLE pipe, LPVOID buffer, DWORD size, DWORD count, LPHANDLE events)
Definition: interactive.c:228
GetStartupData
static BOOL GetStartupData(HANDLE pipe, STARTUP_DATA *sud)
Definition: interactive.c:456
interactive
@ interactive
Definition: service.h:50
HandleRegisterRingBuffers
static DWORD HandleRegisterRingBuffers(const register_ring_buffers_message_t *rrb, HANDLE ovpn_proc, undo_lists_t *lists)
Definition: interactive.c:2108
interactive_service
openvpn_service_t interactive_service
Definition: interactive.c:61
AddListItem
static DWORD AddListItem(list_item_t **pfirst, LPVOID data)
Definition: interactive.c:129
undo_lists_t
list_item_t * undo_lists_t[_undo_type_max]
Definition: interactive.c:96
list_item_t
struct _list_item list_item_t
msg_del_address
@ msg_del_address
Definition: openvpn-msg.h:33
HandleDNSConfigMessage
static DWORD HandleDNSConfigMessage(const dns_cfg_message_t *msg, undo_lists_t *lists)
Definition: interactive.c:1844
InitialSearchListExists
static BOOL InitialSearchListExists(HKEY key)
Check if a initial list had already been created.
Definition: interactive.c:1409
msg_del_wins_cfg
@ msg_del_wins_cfg
Definition: openvpn-msg.h:48
HandleRegisterDNSMessage
static DWORD HandleRegisterDNSMessage(void)
Definition: interactive.c:1001
msg_add_address
@ msg_add_address
Definition: openvpn-msg.h:32
get_win_sys_path
char * get_win_sys_path(void)
Definition: win32.c:1113
msg_add_wfp_block
@ msg_add_wfp_block
Definition: openvpn-msg.h:41
HandleAddressMessage
static DWORD HandleAddressMessage(address_message_t *msg, undo_lists_t *lists)
Definition: interactive.c:586
sockaddr_inet
static SOCKADDR_INET sockaddr_inet(short family, inet_address_t *addr)
Definition: interactive.c:539
GetOpenvpnSettings
DWORD GetOpenvpnSettings(settings_t *s)
Definition: common.c:56
msg
#define msg(flags,...)
Definition: error.h:144
HandleMessage
static VOID HandleMessage(HANDLE pipe, HANDLE ovpn_proc, DWORD bytes, DWORD count, LPHANDLE events, undo_lists_t *lists)
Definition: interactive.c:2205
InterfaceLuid
static DWORD InterfaceLuid(const char *iface_name, PNET_LUID luid)
Definition: interactive.c:556
tun_ring::data
UCHAR data[WINTUN_RING_CAPACITY+WINTUN_RING_TRAILING_BYTES]
Definition: ring_buffer.h:55
STARTUP_DATA
Definition: interactive.c:70
dhcp
Definition: dhcp.h:53
ExecCommand
static DWORD ExecCommand(const WCHAR *argv0, const WCHAR *cmdline, DWORD timeout)
Definition: interactive.c:895
ReturnProcessId
static VOID ReturnProcessId(HANDLE pipe, DWORD pid, DWORD count, LPHANDLE events)
Definition: interactive.c:310
wins_cfg_message_t
Definition: openvpn-msg.h:99
msg_flush_neighbors
@ msg_flush_neighbors
Definition: openvpn-msg.h:40
settings
static settings_t settings
Definition: interactive.c:55
inet_address_t
Definition: openvpn-msg.h:57
pipe_message_t::wins
wins_cfg_message_t wins
Definition: interactive.c:125