Files
OpenVPNAdapter/openvpn/client/clievent.hpp
T
Sergey Abramchuk 84ad2a289f Squashed 'OpenVPN Adapter/Vendors/openvpn/' changes from 098fd412a..e6d68831a
e6d68831a deps: update mbedTLS to 2.7.0
59de63fa6 cli.cpp: added OPENVPN_REMOTE_OVERRIDE
caf9cf6c1 RedirectPipe: added additional flags for flexibility
68595de4d ClientAPI::RemoteOverride: added error status
37d848ca2 Log lines from C++ exceptions should contain the text "exception"
f05802cf9 Increase server validation of password size to 16KB to support bundling SAML messages.
52e4d4a5f Increase client validation of password/response size to 16KB to support bundling SAML messages.
a0416ed92 [OVPN3-209] win: add dependencies checksum verification
f6eadbc4d [OVPN3-206] Refactor Windows build system
7b30c2f12 [OVPN3-220] proto.hpp: send initial options set on rekeying
33dd2f29e mbedtls: backport fixes for CVE-2018-0487
0912a9b62 [OVPN3-213] build system: mbedtls timing tests
98fa55576 deps: update asio to 1.12.0
620531101 [OVPN3-215] asio: apply external patches
f4a73bde5 [OVPN3-215] asio: rebase external patches on top of our current commit ID
a61cac928 mbedtls: Patches from 2.7 to fix timing test failures
c892f41fb win: tune dependencies build
8a394a37d [OVPN3-213] build system: mbedtls timing tests
0a3dd67da [OVPN3-190] tun linux: add to/from_json methods
44c6cdfdc [OVPN3-206] readme: update Windows build instructions
0edec4a09 [OVPN3-206] win: update directories in VS projects
3d6fd62cb mac build: improve unittest stability
758ae98c6 [OVPN3-209] win: add dependencies checksum verification
a7642ee82 [OVPN3-205] win: apply mbedTLS patches
ac94b6eb7 [OVPN3-206] Refactor Windows build system
c5bc3859e mbedTLS: don't set endpoint twice in conf object
3d5dd9ee3 [OVPN3-199] mac build: do not overwrite DEP_DIR
b713762ba mbedtls: Patches from 2.7 to fix timing test failures
37ab79fa6 tun linux: apply changes from 362acf0
6a7aee2c9 [OVPN3-190] tun: implement persistence
1d2ebb07f [OVPN3-190] tun: move tun creation to separate class
53e33d634 [OVPN3-190] tun: move content of tun to tuncli
85d3377c2 [OVPN3-190] tun: move tun setup methods to separate file
735b985eb i/o layer:  wrap raw pointers embedded in closures
322ae24b5 OptionList: support variadic template parameter pack in constructors
8a012b454 lz4: added namespace and improved error handling
34998e94a zlib: removed verbose parameter
846ed217d OpenSSL: set SSL_MODE_RELEASE_BUFFERS to conserve memory by releasing unneeded buffers
32e3ea117 OptionList: added show_unused_options() method
fe38233a8 Buffer: added typedefs for thread-safe refcounts
b34b6271e compression: added compress_lz4() and decompress_lz4()
755e1a181 linux/core.hpp: added exclude_from_core() function
a7f6fe64f ManClientInstance::Send: added userprop_local_update() virtual method
94526ac19 BufferAllocated: fixed regression in buffer copy
33c16812e [OVPN3-144] mbedTLS: fix support for 4096bit encrypted keys
f249ab4bd [OVPN3-144] build-mbedtls: run make check before compiling
5040aef4c [OVPN3-144] build-mbedtls: apply patches using git-apply instead of patch
8a5e838ab [OVPN3-144] mbedTLS: fix incompatibility with PKI created by OpenSSL 1.1
e7badefd7 proto.hpp/tls-crypt: fix access to ACK IDs during packet validation
73fa974db proto.hpp: print buffer exception in case of packet access error
79ad5eded Estblishing a stable branch
1c5f20ab0 Hide the @ sign in logs if username is empty
01ee1f5a4 Added ClientAPI::Config::retryOnAuthFailed parameter
05880b136 Added ProfileParseLimits::MAX_SERVER_LIST_SIZE and raise limit to 4096
eedee4fa6 cli.cpp: allow -s server override to reference a friendly name
6e350e9f9 Linux tun setup: use LinuxGW46 to obtain gateway info
3e044c6c7 top-level .gitignore was missing a trailing newline
a27355ac7 Use C++11 push_back(std::move(...))) for pushing objects onto vectors
8c3af2704 HostPort::split_host_port: support unix socket filename as an alternative kind of host
14b588c86 asio: added asio_resolver_results_to_string()
fd6e8e9bf AsioPolySock: minor changes to remote_endpoint_str()
06f5e4d71 AsioBoundSocket::Socket: added to_string() method
8fd968532 RemoteList: minor cleanup in set_endpoint_range()
f9fc2f54e BufferAllocated: improve movability
8cb8d52cd string: added first_line() method
a26b1646b AsioPolySock: extend AltRouting support
ef3a40c27 Listen::Item: added AltRouting mode
02e786bc9 write_binary_atomic: support ConstBuffer
6745799c9 fileunix: added read_binary_unix_fast()
5689c2d9c write_binary_unix(): added ConstBuffer variant
2b0e76453 enum_dir: refactor to allow enumeration via lambda
116a5bd5e bufstr: added const_buf_from_string() method
f8ec81413 Buffer: added const_buffer_ref() variant accepting a const argument
ae98aa8b6 AsioPolySock: support AltRouting
8f81479f1 AsioBoundSocket::Socket: support inheritance
9598918e9 ServerProto: added schedule_disconnect() method.
4516cf67b ServerProto: reset CoarseTime object when AsioTimer is canceled
0ffc76a0b Route: implement operator< so Route objects can be used as map/set keys.
c4af9f68b event_loop_wait_barrier: raise default timeout to 30 seconds
d7fe87540 appversion.hpp: rename VERSION -> BUILD_VERSION

git-subtree-dir: OpenVPN Adapter/Vendors/openvpn
git-subtree-split: e6d68831a71131b7d92fbea93d3b9cbe10ba2068
2018-04-04 12:34:20 +03:00

439 lines
10 KiB
C++

// OpenVPN -- An application to securely tunnel IP networks
// over a single port, with support for SSL/TLS-based
// session authentication and key exchange,
// packet encryption, packet authentication, and
// packet compression.
//
// Copyright (C) 2012-2017 OpenVPN Inc.
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License Version 3
// as published by the Free Software Foundation.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program in the COPYING file.
// If not, see <http://www.gnu.org/licenses/>.
// This file describes the basic set of OpenVPN client events, including the
// normal events leading up to a connection as well as error events.
#ifndef OPENVPN_CLIENT_CLIEVENT_H
#define OPENVPN_CLIENT_CLIEVENT_H
#include <sstream>
#include <deque>
#include <utility>
#include <openvpn/common/size.hpp>
#include <openvpn/common/exception.hpp>
#include <openvpn/common/rc.hpp>
#include <openvpn/transport/protocol.hpp>
namespace openvpn {
namespace ClientEvent {
enum Type {
// normal events including disconnected, connected, and other transitional events
DISCONNECTED=0,
CONNECTED,
RECONNECTING,
RESOLVE,
WAIT,
WAIT_PROXY,
CONNECTING,
GET_CONFIG,
ASSIGN_IP,
ADD_ROUTES,
ECHO_OPT,
INFO,
WARN,
PAUSE,
RESUME,
RELAY,
// start of nonfatal errors, must be marked by NONFATAL_ERROR_START below
TRANSPORT_ERROR,
TUN_ERROR,
CLIENT_RESTART,
// start of errors, must be marked by FATAL_ERROR_START below
AUTH_FAILED,
CERT_VERIFY_FAIL,
TLS_VERSION_MIN,
CLIENT_HALT,
CLIENT_SETUP,
CONNECTION_TIMEOUT,
INACTIVE_TIMEOUT,
DYNAMIC_CHALLENGE,
PROXY_NEED_CREDS,
PROXY_ERROR,
TUN_SETUP_FAILED,
TUN_IFACE_CREATE,
TUN_IFACE_DISABLED,
EPKI_ERROR, // EPKI refers to External PKI errors, i.e. errors in accessing external
EPKI_INVALID_ALIAS, // certificates or keys.
RELAY_ERROR,
N_TYPES
};
enum {
NONFATAL_ERROR_START = TRANSPORT_ERROR, // start of nonfatal errors that automatically reconnect
FATAL_ERROR_START = AUTH_FAILED, // start of fatal errors
};
inline const char *event_name(const Type type)
{
static const char *names[] = {
"DISCONNECTED",
"CONNECTED",
"RECONNECTING",
"RESOLVE",
"WAIT",
"WAIT_PROXY",
"CONNECTING",
"GET_CONFIG",
"ASSIGN_IP",
"ADD_ROUTES",
"ECHO",
"INFO",
"WARN",
"PAUSE",
"RESUME",
"RELAY",
// nonfatal errors
"TRANSPORT_ERROR",
"TUN_ERROR",
"CLIENT_RESTART",
// fatal errors
"AUTH_FAILED",
"CERT_VERIFY_FAIL",
"TLS_VERSION_MIN",
"CLIENT_HALT",
"CLIENT_SETUP",
"CONNECTION_TIMEOUT",
"INACTIVE_TIMEOUT",
"DYNAMIC_CHALLENGE",
"PROXY_NEED_CREDS",
"PROXY_ERROR",
"TUN_SETUP_FAILED",
"TUN_IFACE_CREATE",
"TUN_IFACE_DISABLED",
"EPKI_ERROR",
"EPKI_INVALID_ALIAS",
"RELAY_ERROR",
};
static_assert(N_TYPES == array_size(names), "event names array inconsistency");
if (type < N_TYPES)
return names[type];
else
return "UNKNOWN_EVENT_TYPE";
}
struct Connected;
// The base class for all events.
class Base : public RC<thread_safe_refcount>
{
public:
typedef RCPtr<Base> Ptr;
Base(Type id) : id_(id) {}
Type id() const { return id_; }
const char *name() const
{
return event_name(id_);
}
bool is_error() const
{
return int(id_) >= NONFATAL_ERROR_START;
}
bool is_fatal() const
{
return int(id_) >= FATAL_ERROR_START;
}
virtual std::string render() const
{
return "";
}
const Connected* connected_cast() const
{
if (id_ == CONNECTED)
return (const Connected*)this;
else
return nullptr;
}
private:
Type id_;
};
// Specific client events. Some events have no additional data attached to them,
// while other events (such as Connected) have many additional data fields.
struct Resolve : public Base
{
Resolve() : Base(RESOLVE) {}
};
struct Wait : public Base
{
Wait() : Base(WAIT) {}
};
struct WaitProxy : public Base
{
WaitProxy() : Base(WAIT_PROXY) {}
};
struct Connecting : public Base
{
Connecting() : Base(CONNECTING) {}
};
struct Reconnecting : public Base
{
Reconnecting() : Base(RECONNECTING) {}
};
struct GetConfig : public Base
{
GetConfig() : Base(GET_CONFIG) {}
};
struct AssignIP : public Base
{
AssignIP() : Base(ASSIGN_IP) {}
};
struct AddRoutes : public Base
{
AddRoutes() : Base(ADD_ROUTES) {}
};
struct Resume : public Base
{
Resume() : Base(RESUME) {}
};
struct Relay : public Base
{
Relay() : Base(RELAY) {}
};
struct Disconnected : public Base
{
Disconnected() : Base(DISCONNECTED) {}
};
struct ConnectionTimeout : public Base
{
ConnectionTimeout() : Base(CONNECTION_TIMEOUT) {}
};
struct InactiveTimeout : public Base
{
InactiveTimeout() : Base(INACTIVE_TIMEOUT) {}
};
struct TLSVersionMinFail : public Base
{
TLSVersionMinFail() : Base(TLS_VERSION_MIN) {}
};
struct Connected : public Base
{
typedef RCPtr<Connected> Ptr;
Connected() : Base(CONNECTED) {}
std::string user;
std::string server_host;
std::string server_port;
std::string server_proto;
std::string server_ip;
std::string vpn_ip4;
std::string vpn_ip6;
std::string vpn_gw4;
std::string vpn_gw6;
std::string client_ip;
std::string tun_name;
virtual std::string render() const
{
std::ostringstream out;
// eg. "godot@foo.bar.gov:443 (1.2.3.4) via TCPv4 on tun0/5.5.1.1"
if (!user.empty())
out << user << '@';
if (server_host.find_first_of(':') == std::string::npos)
out << server_host;
else
out << '[' << server_host << ']';
out << ':' << server_port
<< " (" << server_ip << ") via " << client_ip << '/' << server_proto
<< " on " << tun_name << '/' << vpn_ip4 << '/' << vpn_ip6
<< " gw=[" << vpn_gw4 << '/' << vpn_gw6 << ']';
return out.str();
}
};
struct ReasonBase : public Base {
ReasonBase(const Type id, const std::string& reason_arg)
: Base(id),
reason(reason_arg)
{
}
ReasonBase(const Type id, std::string&& reason_arg)
: Base(id),
reason(std::move(reason_arg))
{
}
virtual std::string render() const
{
return reason;
}
std::string reason;
};
struct AuthFailed : public ReasonBase
{
AuthFailed(std::string reason) : ReasonBase(AUTH_FAILED, std::move(reason)) {}
};
struct CertVerifyFail : public ReasonBase
{
CertVerifyFail(std::string reason) : ReasonBase(CERT_VERIFY_FAIL, std::move(reason)) {}
};
struct ClientHalt : public ReasonBase
{
ClientHalt(std::string reason) : ReasonBase(CLIENT_HALT, std::move(reason)) {}
};
struct ClientRestart : public ReasonBase
{
ClientRestart(std::string reason) : ReasonBase(CLIENT_RESTART, std::move(reason)) {}
};
struct RelayError : public ReasonBase
{
RelayError(std::string reason) : ReasonBase(RELAY_ERROR, std::move(reason)) {}
};
struct DynamicChallenge : public ReasonBase
{
DynamicChallenge(std::string reason) : ReasonBase(DYNAMIC_CHALLENGE, std::move(reason)) {}
};
struct Pause : public ReasonBase
{
Pause(std::string reason) : ReasonBase(PAUSE, std::move(reason)) {}
};
struct ProxyError : public ReasonBase
{
ProxyError(std::string reason) : ReasonBase(PROXY_ERROR, std::move(reason)) {}
};
struct ProxyNeedCreds : public ReasonBase
{
ProxyNeedCreds(std::string reason) : ReasonBase(PROXY_NEED_CREDS, std::move(reason)) {}
};
struct TransportError : public ReasonBase
{
TransportError(std::string reason) : ReasonBase(TRANSPORT_ERROR, std::move(reason)) {}
};
struct TunSetupFailed : public ReasonBase
{
TunSetupFailed(std::string reason) : ReasonBase(TUN_SETUP_FAILED, std::move(reason)) {}
};
struct TunIfaceCreate : public ReasonBase
{
TunIfaceCreate(std::string reason) : ReasonBase(TUN_IFACE_CREATE, std::move(reason)) {}
};
struct TunIfaceDisabled : public ReasonBase
{
TunIfaceDisabled(std::string reason) : ReasonBase(TUN_IFACE_DISABLED, std::move(reason)) {}
};
struct TunError : public ReasonBase
{
TunError(std::string reason) : ReasonBase(TUN_ERROR, std::move(reason)) {}
};
struct EpkiError : public ReasonBase
{
EpkiError(std::string reason) : ReasonBase(EPKI_ERROR, std::move(reason)) {}
};
struct EpkiInvalidAlias : public ReasonBase
{
EpkiInvalidAlias(std::string reason) : ReasonBase(EPKI_INVALID_ALIAS, std::move(reason)) {}
};
struct Echo : public ReasonBase
{
Echo(std::string value) : ReasonBase(ECHO_OPT, std::move(value)) {}
};
struct Info : public ReasonBase
{
Info(std::string value) : ReasonBase(INFO, std::move(value)) {}
};
struct Warn : public ReasonBase
{
Warn(std::string value) : ReasonBase(WARN, std::move(value)) {}
};
class ClientSetup : public ReasonBase
{
public:
ClientSetup(const std::string& status, const std::string& message)
: ReasonBase(CLIENT_SETUP, make(status, message))
{
}
private:
static std::string make(const std::string& status, const std::string& message)
{
std::string ret;
ret += status;
if (!status.empty() && !message.empty())
ret += ": ";
ret += message;
return ret;
}
};
class Queue : public RC<thread_unsafe_refcount>
{
public:
typedef RCPtr<Queue> Ptr;
virtual void add_event(Base::Ptr event) = 0;
};
}
}
#endif // OPENVPN_CLIENT_CLIEVENT_H