blob: 9ee5795cb6571df1cc7d202a80557f3ccfdba9f4 [file] [log] [blame]
/*
*
* ConnMan VPN daemon
*
* Copyright (C) 2010-2014 BMW Car IT GmbH.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include <unistd.h>
#include <stdio.h>
#include <net/if.h>
#include <glib.h>
#define CONNMAN_API_SUBJECT_TO_CHANGE
#include <connman/plugin.h>
#include <connman/log.h>
#include <connman/task.h>
#include <connman/dbus.h>
#include <connman/ipconfig.h>
#include "../vpn-provider.h"
#include "vpn.h"
#define ARRAY_SIZE(a) (sizeof(a)/sizeof(a[0]))
static DBusConnection *connection;
struct {
const char *cm_opt;
const char *ov_opt;
char has_value;
} ov_options[] = {
{ "Host", "--remote", 1 },
{ "OpenVPN.CACert", "--ca", 1 },
{ "OpenVPN.Cert", "--cert", 1 },
{ "OpenVPN.Key", "--key", 1 },
{ "OpenVPN.MTU", "--mtu", 1 },
{ "OpenVPN.NSCertType", "--ns-cert-type", 1 },
{ "OpenVPN.Proto", "--proto", 1 },
{ "OpenVPN.Port", "--port", 1 },
{ "OpenVPN.AuthUserPass", "--auth-user-pass", 1 },
{ "OpenVPN.AskPass", "--askpass", 1 },
{ "OpenVPN.AuthNoCache", "--auth-nocache", 0 },
{ "OpenVPN.TLSRemote", "--tls-remote", 1 },
{ "OpenVPN.TLSAuth", NULL, 1 },
{ "OpenVPN.TLSAuthDir", NULL, 1 },
{ "OpenVPN.Cipher", "--cipher", 1 },
{ "OpenVPN.Auth", "--auth", 1 },
{ "OpenVPN.CompLZO", "--comp-lzo", 0 },
{ "OpenVPN.RemoteCertTls", "--remote-cert-tls", 1 },
{ "OpenVPN.ConfigFile", "--config", 1 },
};
struct nameserver_entry {
int id;
char *nameserver;
};
static struct nameserver_entry *ov_append_dns_entries(const char *key,
const char *value)
{
struct nameserver_entry *entry = NULL;
gchar **options;
if (!g_str_has_prefix(key, "foreign_option_"))
return NULL;
options = g_strsplit(value, " ", 3);
if (options[0] &&
!strcmp(options[0], "dhcp-option") &&
options[1] &&
!strcmp(options[1], "DNS") &&
options[2]) {
entry = g_try_new(struct nameserver_entry, 1);
if (!entry)
return NULL;
entry->nameserver = g_strdup(options[2]);
entry->id = atoi(key + 15); /* foreign_option_XXX */
}
g_strfreev(options);
return entry;
}
static char *ov_get_domain_name(const char *key, const char *value)
{
gchar **options;
char *domain = NULL;
if (!g_str_has_prefix(key, "foreign_option_"))
return NULL;
options = g_strsplit(value, " ", 3);
if (options[0] &&
!strcmp(options[0], "dhcp-option") &&
options[1] &&
!strcmp(options[1], "DOMAIN") &&
options[2]) {
domain = g_strdup(options[2]);
}
g_strfreev(options);
return domain;
}
static gint cmp_ns(gconstpointer a, gconstpointer b)
{
struct nameserver_entry *entry_a = (struct nameserver_entry *)a;
struct nameserver_entry *entry_b = (struct nameserver_entry *)b;
if (entry_a->id < entry_b->id)
return -1;
if (entry_a->id > entry_b->id)
return 1;
return 0;
}
static void free_ns_entry(gpointer data)
{
struct nameserver_entry *entry = data;
g_free(entry->nameserver);
g_free(entry);
}
static int ov_notify(DBusMessage *msg, struct vpn_provider *provider)
{
DBusMessageIter iter, dict;
const char *reason, *key, *value;
char *address = NULL, *gateway = NULL, *peer = NULL;
struct connman_ipaddress *ipaddress;
GSList *nameserver_list = NULL;
dbus_message_iter_init(msg, &iter);
dbus_message_iter_get_basic(&iter, &reason);
dbus_message_iter_next(&iter);
if (!provider) {
connman_error("No provider found");
return VPN_STATE_FAILURE;
}
if (strcmp(reason, "up"))
return VPN_STATE_DISCONNECT;
dbus_message_iter_recurse(&iter, &dict);
while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
struct nameserver_entry *ns_entry = NULL;
DBusMessageIter entry;
dbus_message_iter_recurse(&dict, &entry);
dbus_message_iter_get_basic(&entry, &key);
dbus_message_iter_next(&entry);
dbus_message_iter_get_basic(&entry, &value);
DBG("%s = %s", key, value);
if (!strcmp(key, "trusted_ip"))
gateway = g_strdup(value);
if (!strcmp(key, "ifconfig_local"))
address = g_strdup(value);
if (!strcmp(key, "ifconfig_remote"))
peer = g_strdup(value);
if (g_str_has_prefix(key, "route_"))
vpn_provider_append_route(provider, key, value);
if ((ns_entry = ov_append_dns_entries(key, value)))
nameserver_list = g_slist_prepend(nameserver_list,
ns_entry);
else {
char *domain = ov_get_domain_name(key, value);
if (domain) {
vpn_provider_set_domain(provider, domain);
g_free(domain);
}
}
dbus_message_iter_next(&dict);
}
ipaddress = connman_ipaddress_alloc(AF_INET);
if (!ipaddress) {
g_slist_free_full(nameserver_list, free_ns_entry);
g_free(address);
g_free(gateway);
g_free(peer);
return VPN_STATE_FAILURE;
}
connman_ipaddress_set_ipv4(ipaddress, address, NULL, gateway);
connman_ipaddress_set_peer(ipaddress, peer);
vpn_provider_set_ipaddress(provider, ipaddress);
if (nameserver_list) {
char *nameservers = NULL;
GSList *tmp;
nameserver_list = g_slist_sort(nameserver_list, cmp_ns);
for (tmp = nameserver_list; tmp;
tmp = g_slist_next(tmp)) {
struct nameserver_entry *ns = tmp->data;
if (!nameservers) {
nameservers = g_strdup(ns->nameserver);
} else {
char *str;
str = g_strjoin(" ", nameservers,
ns->nameserver, NULL);
g_free(nameservers);
nameservers = str;
}
}
g_slist_free_full(nameserver_list, free_ns_entry);
vpn_provider_set_nameservers(provider, nameservers);
g_free(nameservers);
}
g_free(address);
g_free(gateway);
g_free(peer);
connman_ipaddress_free(ipaddress);
return VPN_STATE_CONNECT;
}
static int ov_save(struct vpn_provider *provider, GKeyFile *keyfile)
{
const char *option;
int i;
for (i = 0; i < (int)ARRAY_SIZE(ov_options); i++) {
if (strncmp(ov_options[i].cm_opt, "OpenVPN.", 8) == 0) {
option = vpn_provider_get_string(provider,
ov_options[i].cm_opt);
if (!option)
continue;
g_key_file_set_string(keyfile,
vpn_provider_get_save_group(provider),
ov_options[i].cm_opt, option);
}
}
return 0;
}
static int task_append_config_data(struct vpn_provider *provider,
struct connman_task *task)
{
const char *option;
int i;
for (i = 0; i < (int)ARRAY_SIZE(ov_options); i++) {
if (!ov_options[i].ov_opt)
continue;
option = vpn_provider_get_string(provider,
ov_options[i].cm_opt);
if (!option)
continue;
if (connman_task_add_argument(task,
ov_options[i].ov_opt,
ov_options[i].has_value ? option : NULL) < 0) {
return -EIO;
}
}
return 0;
}
static int ov_connect(struct vpn_provider *provider,
struct connman_task *task, const char *if_name,
vpn_provider_connect_cb_t cb, const char *dbus_sender,
void *user_data)
{
const char *option;
int err = 0, fd;
option = vpn_provider_get_string(provider, "Host");
if (!option) {
connman_error("Host not set; cannot enable VPN");
return -EINVAL;
}
task_append_config_data(provider, task);
option = vpn_provider_get_string(provider, "OpenVPN.ConfigFile");
if (!option) {
/*
* Set some default options if user has no config file.
*/
option = vpn_provider_get_string(provider, "OpenVPN.TLSAuth");
if (option) {
connman_task_add_argument(task, "--tls-auth", option);
option = vpn_provider_get_string(provider,
"OpenVPN.TLSAuthDir");
if (option)
connman_task_add_argument(task, option, NULL);
}
connman_task_add_argument(task, "--nobind", NULL);
connman_task_add_argument(task, "--persist-key", NULL);
connman_task_add_argument(task, "--client", NULL);
}
connman_task_add_argument(task, "--syslog", NULL);
connman_task_add_argument(task, "--script-security", "2");
connman_task_add_argument(task, "--up",
SCRIPTDIR "/openvpn-script");
connman_task_add_argument(task, "--up-restart", NULL);
connman_task_add_argument(task, "--setenv", NULL);
connman_task_add_argument(task, "CONNMAN_BUSNAME",
dbus_bus_get_unique_name(connection));
connman_task_add_argument(task, "--setenv", NULL);
connman_task_add_argument(task, "CONNMAN_INTERFACE",
CONNMAN_TASK_INTERFACE);
connman_task_add_argument(task, "--setenv", NULL);
connman_task_add_argument(task, "CONNMAN_PATH",
connman_task_get_path(task));
connman_task_add_argument(task, "--dev", if_name);
connman_task_add_argument(task, "--dev-type", "tun");
connman_task_add_argument(task, "--persist-tun", NULL);
connman_task_add_argument(task, "--route-noexec", NULL);
connman_task_add_argument(task, "--ifconfig-noexec", NULL);
/*
* Disable client restarts because we can't handle this at the
* moment. The problem is that when OpenVPN decides to switch
* from CONNECTED state to RECONNECTING and then to RESOLVE,
* it is not possible to do a DNS lookup. The DNS server is
* not accessable through the tunnel anymore and so we end up
* trying to resolve the OpenVPN servers address.
*/
connman_task_add_argument(task, "--ping-restart", "0");
fd = fileno(stderr);
err = connman_task_run(task, vpn_died, provider,
NULL, &fd, &fd);
if (err < 0) {
connman_error("openvpn failed to start");
err = -EIO;
goto done;
}
done:
if (cb)
cb(provider, user_data, err);
return err;
}
static struct vpn_driver vpn_driver = {
.notify = ov_notify,
.connect = ov_connect,
.save = ov_save,
};
static int openvpn_init(void)
{
connection = connman_dbus_get_connection();
return vpn_register("openvpn", &vpn_driver, OPENVPN);
}
static void openvpn_exit(void)
{
vpn_unregister("openvpn");
dbus_connection_unref(connection);
}
CONNMAN_PLUGIN_DEFINE(openvpn, "OpenVPN plugin", VERSION,
CONNMAN_PLUGIN_PRIORITY_DEFAULT, openvpn_init, openvpn_exit)