diff options
Diffstat (limited to 'openvpn/sample')
| -rw-r--r-- | openvpn/sample/Makefile.am | 1 | ||||
| -rw-r--r-- | openvpn/sample/sample-plugins/defer/README | 16 | ||||
| -rwxr-xr-x | openvpn/sample/sample-plugins/defer/build | 15 | ||||
| -rw-r--r-- | openvpn/sample/sample-plugins/defer/simple.c | 305 | ||||
| -rwxr-xr-x | openvpn/sample/sample-plugins/defer/simple.def | 6 | ||||
| -rwxr-xr-x | openvpn/sample/sample-plugins/defer/winbuild | 18 | ||||
| -rwxr-xr-x | openvpn/sample/sample-plugins/log/build | 15 | ||||
| -rw-r--r-- | openvpn/sample/sample-plugins/log/log.c | 184 | ||||
| -rw-r--r-- | openvpn/sample/sample-plugins/log/log_v3.c | 247 | ||||
| -rwxr-xr-x | openvpn/sample/sample-plugins/log/winbuild | 18 | ||||
| -rw-r--r-- | openvpn/sample/sample-plugins/simple/README | 16 | ||||
| -rwxr-xr-x | openvpn/sample/sample-plugins/simple/build | 15 | ||||
| -rw-r--r-- | openvpn/sample/sample-plugins/simple/simple.c | 120 | ||||
| -rwxr-xr-x | openvpn/sample/sample-plugins/simple/simple.def | 6 | ||||
| -rwxr-xr-x | openvpn/sample/sample-plugins/simple/winbuild | 18 | 
15 files changed, 1000 insertions, 0 deletions
| diff --git a/openvpn/sample/Makefile.am b/openvpn/sample/Makefile.am index 8e35bfc..be30c88 100644 --- a/openvpn/sample/Makefile.am +++ b/openvpn/sample/Makefile.am @@ -13,6 +13,7 @@ MAINTAINERCLEANFILES = \  	$(srcdir)/Makefile.in  EXTRA_DIST = \ +	sample-plugins \  	sample-config-files \  	sample-windows \  	sample-keys \ diff --git a/openvpn/sample/sample-plugins/defer/README b/openvpn/sample/sample-plugins/defer/README new file mode 100644 index 0000000..d8990f8 --- /dev/null +++ b/openvpn/sample/sample-plugins/defer/README @@ -0,0 +1,16 @@ +OpenVPN plugin examples. + +Examples provided: + +simple.c -- using the --auth-user-pass-verify callback, +            test deferred authentication. + +To build: + +  ./build simple (Linux/BSD/etc.) +  ./winbuild simple (MinGW on Windows) + +To use in OpenVPN, add to config file: + +  plugin simple.so (Linux/BSD/etc.) +  plugin simple.dll (MinGW on Windows) diff --git a/openvpn/sample/sample-plugins/defer/build b/openvpn/sample/sample-plugins/defer/build new file mode 100755 index 0000000..0612c08 --- /dev/null +++ b/openvpn/sample/sample-plugins/defer/build @@ -0,0 +1,15 @@ +#!/bin/sh + +# +# Build an OpenVPN plugin module on *nix.  The argument should +# be the base name of the C source file (without the .c). +# + +# This directory is where we will look for openvpn-plugin.h +CPPFLAGS="${CPPFLAGS:--I../../../include}" + +CC="${CC:-gcc}" +CFLAGS="${CFLAGS:--O2 -Wall -g}" + +$CC $CPPFLAGS $CFLAGS -fPIC -c $1.c && \ +$CC $CFLAGS -fPIC -shared ${LDFLAS} -Wl,-soname,$1.so -o $1.so $1.o -lc diff --git a/openvpn/sample/sample-plugins/defer/simple.c b/openvpn/sample/sample-plugins/defer/simple.c new file mode 100644 index 0000000..6539865 --- /dev/null +++ b/openvpn/sample/sample-plugins/defer/simple.c @@ -0,0 +1,305 @@ +/* + *  OpenVPN -- An application to securely tunnel IP networks + *             over a single TCP/UDP port, with support for SSL/TLS-based + *             session authentication and key exchange, + *             packet encryption, packet authentication, and + *             packet compression. + * + *  Copyright (C) 2002-2010 OpenVPN Technologies, Inc. <sales@openvpn.net> + * + *  This program is free software; you can redistribute it and/or modify + *  it under the terms of the GNU General Public License version 2 + *  as published by the Free Software Foundation. + * + *  This program is distributed in the hope that it will be useful, + *  but WITHOUT ANY WARRANTY; without even the implied warranty of + *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the + *  GNU General Public License for more details. + * + *  You should have received a copy of the GNU General Public License + *  along with this program (see the file COPYING included with this + *  distribution); if not, write to the Free Software Foundation, Inc., + *  59 Temple Place, Suite 330, Boston, MA  02111-1307  USA + */ + +/* + * This file implements a simple OpenVPN plugin module which + * will test deferred authentication and packet filtering. + *  + * Will run on Windows or *nix. + * + * Sample usage: + * + * setenv test_deferred_auth 20 + * setenv test_packet_filter 10 + * plugin plugin/defer/simple.so + * + * This will enable deferred authentication to occur 20 + * seconds after the normal TLS authentication process, + * and will cause a packet filter file to be generated 10 + * seconds after the initial TLS negotiation, using + * {common-name}.pf as the source. + * + * Sample packet filter configuration: + * + * [CLIENTS DROP] + * +otherclient + * [SUBNETS DROP] + * +10.0.0.0/8 + * -10.10.0.8 + * [END] + * + * See the README file for build instructions. + */ + +#include <stdio.h> +#include <string.h> +#include <stdlib.h> + +#include "openvpn-plugin.h" + +/* bool definitions */ +#define bool int +#define true 1 +#define false 0 + +/* + * Our context, where we keep our state. + */ + +struct plugin_context { +  int test_deferred_auth; +  int test_packet_filter; +}; + +struct plugin_per_client_context { +  int n_calls; +  bool generated_pf_file; +}; + +/* + * Given an environmental variable name, search + * the envp array for its value, returning it + * if found or NULL otherwise. + */ +static const char * +get_env (const char *name, const char *envp[]) +{ +  if (envp) +    { +      int i; +      const int namelen = strlen (name); +      for (i = 0; envp[i]; ++i) +	{ +	  if (!strncmp (envp[i], name, namelen)) +	    { +	      const char *cp = envp[i] + namelen; +	      if (*cp == '=') +		return cp + 1; +	    } +	} +    } +  return NULL; +} + +/* used for safe printf of possible NULL strings */ +static const char * +np (const char *str) +{ +  if (str) +    return str; +  else +    return "[NULL]"; +} + +static int +atoi_null0 (const char *str) +{ +  if (str) +    return atoi (str); +  else +    return 0; +} + +OPENVPN_EXPORT openvpn_plugin_handle_t +openvpn_plugin_open_v1 (unsigned int *type_mask, const char *argv[], const char *envp[]) +{ +  struct plugin_context *context; + +  printf ("FUNC: openvpn_plugin_open_v1\n"); + +  /* +   * Allocate our context +   */ +  context = (struct plugin_context *) calloc (1, sizeof (struct plugin_context)); + +  context->test_deferred_auth = atoi_null0 (get_env ("test_deferred_auth", envp)); +  printf ("TEST_DEFERRED_AUTH %d\n", context->test_deferred_auth); + +  context->test_packet_filter = atoi_null0 (get_env ("test_packet_filter", envp)); +  printf ("TEST_PACKET_FILTER %d\n", context->test_packet_filter); + +  /* +   * Which callbacks to intercept. +   */ +  *type_mask = +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_UP) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_DOWN) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_ROUTE_UP) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_IPCHANGE) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_TLS_VERIFY) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_CLIENT_CONNECT_V2) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_CLIENT_DISCONNECT) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_LEARN_ADDRESS) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_TLS_FINAL) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_ENABLE_PF); + +  return (openvpn_plugin_handle_t) context; +} + +static int +auth_user_pass_verify (struct plugin_context *context, struct plugin_per_client_context *pcc, const char *argv[], const char *envp[]) +{ +  if (context->test_deferred_auth) +    { +      /* get username/password from envp string array */ +      const char *username = get_env ("username", envp); +      const char *password = get_env ("password", envp); + +      /* get auth_control_file filename from envp string array*/ +      const char *auth_control_file = get_env ("auth_control_file", envp); + +      printf ("DEFER u='%s' p='%s' acf='%s'\n", +	      np(username), +	      np(password), +	      np(auth_control_file)); + +      /* Authenticate asynchronously in n seconds */ +      if (auth_control_file) +	{ +	  char buf[256]; +	  int auth = 2; +	  sscanf (username, "%d", &auth); +	  snprintf (buf, sizeof(buf), "( sleep %d ; echo AUTH %s %d ; echo %d >%s ) &", +		    context->test_deferred_auth, +		    auth_control_file, +		    auth, +		    pcc->n_calls < auth, +		    auth_control_file); +	  printf ("%s\n", buf); +	  system (buf); +	  pcc->n_calls++; +	  return OPENVPN_PLUGIN_FUNC_DEFERRED; +	} +      else +	return OPENVPN_PLUGIN_FUNC_ERROR; +    } +  else +    return OPENVPN_PLUGIN_FUNC_SUCCESS; +} + +static int +tls_final (struct plugin_context *context, struct plugin_per_client_context *pcc, const char *argv[], const char *envp[]) +{ +  if (context->test_packet_filter) +    { +      if (!pcc->generated_pf_file) +	{ +	  const char *pff = get_env ("pf_file", envp); +	  const char *cn = get_env ("username", envp); +	  if (pff && cn) +	    { +	      char buf[256]; +	      snprintf (buf, sizeof(buf), "( sleep %d ; echo PF %s/%s ; cp \"%s.pf\" \"%s\" ) &", +			context->test_packet_filter, cn, pff, cn, pff); +	      printf ("%s\n", buf); +	      system (buf); +	      pcc->generated_pf_file = true; +	      return OPENVPN_PLUGIN_FUNC_SUCCESS; +	    } +	  else +	    return OPENVPN_PLUGIN_FUNC_ERROR; +	} +      else +	return OPENVPN_PLUGIN_FUNC_ERROR; +    } +  else +    return OPENVPN_PLUGIN_FUNC_SUCCESS; +} + +OPENVPN_EXPORT int +openvpn_plugin_func_v2 (openvpn_plugin_handle_t handle, +			const int type, +			const char *argv[], +			const char *envp[], +			void *per_client_context, +			struct openvpn_plugin_string_list **return_list) +{ +  struct plugin_context *context = (struct plugin_context *) handle; +  struct plugin_per_client_context *pcc = (struct plugin_per_client_context *) per_client_context; +  switch (type) +    { +    case OPENVPN_PLUGIN_UP: +      printf ("OPENVPN_PLUGIN_UP\n"); +      return OPENVPN_PLUGIN_FUNC_SUCCESS; +    case OPENVPN_PLUGIN_DOWN: +      printf ("OPENVPN_PLUGIN_DOWN\n"); +      return OPENVPN_PLUGIN_FUNC_SUCCESS; +    case OPENVPN_PLUGIN_ROUTE_UP: +      printf ("OPENVPN_PLUGIN_ROUTE_UP\n"); +      return OPENVPN_PLUGIN_FUNC_SUCCESS; +    case OPENVPN_PLUGIN_IPCHANGE: +      printf ("OPENVPN_PLUGIN_IPCHANGE\n"); +      return OPENVPN_PLUGIN_FUNC_SUCCESS; +    case OPENVPN_PLUGIN_TLS_VERIFY: +      printf ("OPENVPN_PLUGIN_TLS_VERIFY\n"); +      return OPENVPN_PLUGIN_FUNC_SUCCESS; +    case OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY: +      printf ("OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY\n"); +      return auth_user_pass_verify (context, pcc, argv, envp); +    case OPENVPN_PLUGIN_CLIENT_CONNECT_V2: +      printf ("OPENVPN_PLUGIN_CLIENT_CONNECT_V2\n"); +      return OPENVPN_PLUGIN_FUNC_SUCCESS; +    case OPENVPN_PLUGIN_CLIENT_DISCONNECT: +      printf ("OPENVPN_PLUGIN_CLIENT_DISCONNECT\n"); +      return OPENVPN_PLUGIN_FUNC_SUCCESS; +    case OPENVPN_PLUGIN_LEARN_ADDRESS: +      printf ("OPENVPN_PLUGIN_LEARN_ADDRESS\n"); +      return OPENVPN_PLUGIN_FUNC_SUCCESS; +    case OPENVPN_PLUGIN_TLS_FINAL: +      printf ("OPENVPN_PLUGIN_TLS_FINAL\n"); +      return tls_final (context, pcc, argv, envp); +    case OPENVPN_PLUGIN_ENABLE_PF: +      printf ("OPENVPN_PLUGIN_ENABLE_PF\n"); +      if (context->test_packet_filter) +	return OPENVPN_PLUGIN_FUNC_SUCCESS; +      else +	return OPENVPN_PLUGIN_FUNC_ERROR; +    default: +      printf ("OPENVPN_PLUGIN_?\n"); +      return OPENVPN_PLUGIN_FUNC_ERROR; +    } +} + +OPENVPN_EXPORT void * +openvpn_plugin_client_constructor_v1 (openvpn_plugin_handle_t handle) +{ +  printf ("FUNC: openvpn_plugin_client_constructor_v1\n"); +  return calloc (1, sizeof (struct plugin_per_client_context)); +} + +OPENVPN_EXPORT void +openvpn_plugin_client_destructor_v1 (openvpn_plugin_handle_t handle, void *per_client_context) +{ +  printf ("FUNC: openvpn_plugin_client_destructor_v1\n"); +  free (per_client_context); +} + +OPENVPN_EXPORT void +openvpn_plugin_close_v1 (openvpn_plugin_handle_t handle) +{ +  struct plugin_context *context = (struct plugin_context *) handle; +  printf ("FUNC: openvpn_plugin_close_v1\n"); +  free (context); +} diff --git a/openvpn/sample/sample-plugins/defer/simple.def b/openvpn/sample/sample-plugins/defer/simple.def new file mode 100755 index 0000000..a87507d --- /dev/null +++ b/openvpn/sample/sample-plugins/defer/simple.def @@ -0,0 +1,6 @@ +LIBRARY   OpenVPN_PLUGIN_SAMPLE +DESCRIPTION "Sample OpenVPN plug-in module." +EXPORTS +   openvpn_plugin_open_v1   @1 +   openvpn_plugin_func_v1   @2 +   openvpn_plugin_close_v1  @3 diff --git a/openvpn/sample/sample-plugins/defer/winbuild b/openvpn/sample/sample-plugins/defer/winbuild new file mode 100755 index 0000000..82927d9 --- /dev/null +++ b/openvpn/sample/sample-plugins/defer/winbuild @@ -0,0 +1,18 @@ +# +# Build an OpenVPN plugin module on Windows/MinGW. +# The argument should be the base name of the C source file +# (without the .c). +# + +# This directory is where we will look for openvpn-plugin.h +INCLUDE="-I../../../build" + +CC_FLAGS="-O2 -Wall" + +gcc -DBUILD_DLL $CC_FLAGS $INCLUDE -c $1.c +gcc --disable-stdcall-fixup -mdll -DBUILD_DLL -o junk.tmp -Wl,--base-file,base.tmp $1.o +rm junk.tmp +dlltool --dllname $1.dll --base-file base.tmp --output-exp temp.exp --input-def $1.def +rm base.tmp +gcc --enable-stdcall-fixup -mdll -DBUILD_DLL -o $1.dll $1.o -Wl,temp.exp +rm temp.exp diff --git a/openvpn/sample/sample-plugins/log/build b/openvpn/sample/sample-plugins/log/build new file mode 100755 index 0000000..bbb05f7 --- /dev/null +++ b/openvpn/sample/sample-plugins/log/build @@ -0,0 +1,15 @@ +#!/bin/sh + +# +# Build an OpenVPN plugin module on *nix.  The argument should +# be the base name of the C source file (without the .c). +# + +# This directory is where we will look for openvpn-plugin.h +CPPFLAGS="${CPPFLAGS:--I../../..}" + +CC="${CC:-gcc}" +CFLAGS="${CFLAGS:--O2 -Wall -g}" + +$CC $CPPFLAGS $CFLAGS -fPIC -c $1.c && \ +$CC $CFLAGS -fPIC -shared $LDFLAGS -Wl,-soname,$1.so -o $1.so $1.o -lc diff --git a/openvpn/sample/sample-plugins/log/log.c b/openvpn/sample/sample-plugins/log/log.c new file mode 100644 index 0000000..1cc4650 --- /dev/null +++ b/openvpn/sample/sample-plugins/log/log.c @@ -0,0 +1,184 @@ +/* + *  OpenVPN -- An application to securely tunnel IP networks + *             over a single TCP/UDP port, with support for SSL/TLS-based + *             session authentication and key exchange, + *             packet encryption, packet authentication, and + *             packet compression. + * + *  Copyright (C) 2002-2010 OpenVPN Technologies, Inc. <sales@openvpn.net> + * + *  This program is free software; you can redistribute it and/or modify + *  it under the terms of the GNU General Public License version 2 + *  as published by the Free Software Foundation. + * + *  This program is distributed in the hope that it will be useful, + *  but WITHOUT ANY WARRANTY; without even the implied warranty of + *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the + *  GNU General Public License for more details. + * + *  You should have received a copy of the GNU General Public License + *  along with this program (see the file COPYING included with this + *  distribution); if not, write to the Free Software Foundation, Inc., + *  59 Temple Place, Suite 330, Boston, MA  02111-1307  USA + */ + +/* + * This plugin is similar to simple.c, except it also logs extra information + * to stdout for every plugin method called by OpenVPN. + * + * See the README file for build instructions. + */ + +#include <stdio.h> +#include <string.h> +#include <stdlib.h> + +#include "openvpn-plugin.h" + +/* + * Our context, where we keep our state. + */ +struct plugin_context { +  const char *username; +  const char *password; +}; + +/* + * Given an environmental variable name, search + * the envp array for its value, returning it + * if found or NULL otherwise. + */ +static const char * +get_env (const char *name, const char *envp[]) +{ +  if (envp) +    { +      int i; +      const int namelen = strlen (name); +      for (i = 0; envp[i]; ++i) +	{ +	  if (!strncmp (envp[i], name, namelen)) +	    { +	      const char *cp = envp[i] + namelen; +	      if (*cp == '=') +		return cp + 1; +	    } +	} +    } +  return NULL; +} + +OPENVPN_EXPORT openvpn_plugin_handle_t +openvpn_plugin_open_v1 (unsigned int *type_mask, const char *argv[], const char *envp[]) +{ +  struct plugin_context *context; + +  /* +   * Allocate our context +   */ +  context = (struct plugin_context *) calloc (1, sizeof (struct plugin_context)); + +  /* +   * Set the username/password we will require. +   */ +  context->username = "foo"; +  context->password = "bar"; + +  /* +   * Which callbacks to intercept. +   */ +  *type_mask = +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_UP) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_DOWN) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_ROUTE_UP) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_IPCHANGE) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_TLS_VERIFY) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_CLIENT_CONNECT_V2) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_CLIENT_DISCONNECT) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_LEARN_ADDRESS) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_TLS_FINAL); + +  return (openvpn_plugin_handle_t) context; +} + +void +show (const int type, const char *argv[], const char *envp[]) +{ +  size_t i; +  switch (type) +    { +    case OPENVPN_PLUGIN_UP: +      printf ("OPENVPN_PLUGIN_UP\n"); +      break; +    case OPENVPN_PLUGIN_DOWN: +      printf ("OPENVPN_PLUGIN_DOWN\n"); +      break; +    case OPENVPN_PLUGIN_ROUTE_UP: +      printf ("OPENVPN_PLUGIN_ROUTE_UP\n"); +      break; +    case OPENVPN_PLUGIN_IPCHANGE: +      printf ("OPENVPN_PLUGIN_IPCHANGE\n"); +      break; +    case OPENVPN_PLUGIN_TLS_VERIFY: +      printf ("OPENVPN_PLUGIN_TLS_VERIFY\n"); +      break; +    case OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY: +      printf ("OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY\n"); +      break; +    case OPENVPN_PLUGIN_CLIENT_CONNECT_V2: +      printf ("OPENVPN_PLUGIN_CLIENT_CONNECT_V2\n"); +      break; +    case OPENVPN_PLUGIN_CLIENT_DISCONNECT: +      printf ("OPENVPN_PLUGIN_CLIENT_DISCONNECT\n"); +      break; +    case OPENVPN_PLUGIN_LEARN_ADDRESS: +      printf ("OPENVPN_PLUGIN_LEARN_ADDRESS\n"); +      break; +    case OPENVPN_PLUGIN_TLS_FINAL: +      printf ("OPENVPN_PLUGIN_TLS_FINAL\n"); +      break; +    default: +      printf ("OPENVPN_PLUGIN_?\n"); +      break; +    } + +  printf ("ARGV\n"); +  for (i = 0; argv[i] != NULL; ++i) +    printf ("%d '%s'\n", (int)i, argv[i]); + +  printf ("ENVP\n"); +  for (i = 0; envp[i] != NULL; ++i) +    printf ("%d '%s'\n", (int)i, envp[i]); +} + +OPENVPN_EXPORT int +openvpn_plugin_func_v1 (openvpn_plugin_handle_t handle, const int type, const char *argv[], const char *envp[]) +{ +  struct plugin_context *context = (struct plugin_context *) handle; + +  show (type, argv, envp); + +  /* check entered username/password against what we require */ +  if (type == OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY) +    { +      /* get username/password from envp string array */ +      const char *username = get_env ("username", envp); +      const char *password = get_env ("password", envp); + +      if (username && !strcmp (username, context->username) +	  && password && !strcmp (password, context->password)) +	return OPENVPN_PLUGIN_FUNC_SUCCESS; +      else +	return OPENVPN_PLUGIN_FUNC_ERROR; +    } +  else +    return OPENVPN_PLUGIN_FUNC_SUCCESS; +} + +OPENVPN_EXPORT void +openvpn_plugin_close_v1 (openvpn_plugin_handle_t handle) +{ +  struct plugin_context *context = (struct plugin_context *) handle; +  free (context); +} diff --git a/openvpn/sample/sample-plugins/log/log_v3.c b/openvpn/sample/sample-plugins/log/log_v3.c new file mode 100644 index 0000000..742c756 --- /dev/null +++ b/openvpn/sample/sample-plugins/log/log_v3.c @@ -0,0 +1,247 @@ +/* + *  OpenVPN -- An application to securely tunnel IP networks + *             over a single TCP/UDP port, with support for SSL/TLS-based + *             session authentication and key exchange, + *             packet encryption, packet authentication, and + *             packet compression. + * + *  Copyright (C) 2002-2009 OpenVPN Technologies, Inc. <sales@openvpn.net> + *  Copyright (C) 2010 David Sommerseth <dazo@users.sourceforge.net> + * + *  This program is free software; you can redistribute it and/or modify + *  it under the terms of the GNU General Public License version 2 + *  as published by the Free Software Foundation. + * + *  This program is distributed in the hope that it will be useful, + *  but WITHOUT ANY WARRANTY; without even the implied warranty of + *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the + *  GNU General Public License for more details. + * + *  You should have received a copy of the GNU General Public License + *  along with this program (see the file COPYING included with this + *  distribution); if not, write to the Free Software Foundation, Inc., + *  59 Temple Place, Suite 330, Boston, MA  02111-1307  USA + */ + +/* + * This plugin is similar to simple.c, except it also logs extra information + * to stdout for every plugin method called by OpenVPN.  The only difference + * between this (log_v3.c) and log.c is that this module uses the v3 plug-in + * API. + * + * See the README file for build instructions. + */ + +#include <stdio.h> +#include <string.h> +#include <stdlib.h> + +#define ENABLE_SSL + +#include "openvpn-plugin.h" + +/* + * Our context, where we keep our state. + */ +struct plugin_context { +  const char *username; +  const char *password; +}; + +/* + * Given an environmental variable name, search + * the envp array for its value, returning it + * if found or NULL otherwise. + */ +static const char * +get_env (const char *name, const char *envp[]) +{ +  if (envp) +    { +      int i; +      const int namelen = strlen (name); +      for (i = 0; envp[i]; ++i) +	{ +	  if (!strncmp (envp[i], name, namelen)) +	    { +	      const char *cp = envp[i] + namelen; +	      if (*cp == '=') +		return cp + 1; +	    } +	} +    } +  return NULL; +} + +OPENVPN_EXPORT int +openvpn_plugin_open_v3 (const int v3structver, +                        struct openvpn_plugin_args_open_in const *args, +                        struct openvpn_plugin_args_open_return *ret) +{ +  struct plugin_context *context = NULL; + +  /* Check that we are API compatible */ +  if( v3structver != OPENVPN_PLUGINv3_STRUCTVER ) { +    return OPENVPN_PLUGIN_FUNC_ERROR; +  } + +  /*  Which callbacks to intercept.  */ +  ret->type_mask = +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_UP) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_DOWN) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_ROUTE_UP) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_IPCHANGE) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_TLS_VERIFY) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_CLIENT_CONNECT_V2) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_CLIENT_DISCONNECT) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_LEARN_ADDRESS) | +    OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_TLS_FINAL); + + +  /* Allocate our context */ +  context = (struct plugin_context *) calloc (1, sizeof (struct plugin_context)); + +  /* Set the username/password we will require. */ +  context->username = "foo"; +  context->password = "bar"; + +  /* Point the global context handle to our newly created context */ +  ret->handle = (void *) context; + +  return OPENVPN_PLUGIN_FUNC_SUCCESS; +} + +void +show (const int type, const char *argv[], const char *envp[]) +{ +  size_t i; +  switch (type) +    { +    case OPENVPN_PLUGIN_UP: +      printf ("OPENVPN_PLUGIN_UP\n"); +      break; +    case OPENVPN_PLUGIN_DOWN: +      printf ("OPENVPN_PLUGIN_DOWN\n"); +      break; +    case OPENVPN_PLUGIN_ROUTE_UP: +      printf ("OPENVPN_PLUGIN_ROUTE_UP\n"); +      break; +    case OPENVPN_PLUGIN_IPCHANGE: +      printf ("OPENVPN_PLUGIN_IPCHANGE\n"); +      break; +    case OPENVPN_PLUGIN_TLS_VERIFY: +      printf ("OPENVPN_PLUGIN_TLS_VERIFY\n"); +      break; +    case OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY: +      printf ("OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY\n"); +      break; +    case OPENVPN_PLUGIN_CLIENT_CONNECT_V2: +      printf ("OPENVPN_PLUGIN_CLIENT_CONNECT_V2\n"); +      break; +    case OPENVPN_PLUGIN_CLIENT_DISCONNECT: +      printf ("OPENVPN_PLUGIN_CLIENT_DISCONNECT\n"); +      break; +    case OPENVPN_PLUGIN_LEARN_ADDRESS: +      printf ("OPENVPN_PLUGIN_LEARN_ADDRESS\n"); +      break; +    case OPENVPN_PLUGIN_TLS_FINAL: +      printf ("OPENVPN_PLUGIN_TLS_FINAL\n"); +      break; +    default: +      printf ("OPENVPN_PLUGIN_?\n"); +      break; +    } + +  printf ("ARGV\n"); +  for (i = 0; argv[i] != NULL; ++i) +    printf ("%d '%s'\n", (int)i, argv[i]); + +  printf ("ENVP\n"); +  for (i = 0; envp[i] != NULL; ++i) +    printf ("%d '%s'\n", (int)i, envp[i]); +} + +static void +x509_print_info (X509 *x509crt) +{ +  int i, n; +  int fn_nid; +  ASN1_OBJECT *fn; +  ASN1_STRING *val; +  X509_NAME *x509_name; +  X509_NAME_ENTRY *ent; +  const char *objbuf; +  unsigned char *buf; + +  x509_name = X509_get_subject_name (x509crt); +  n = X509_NAME_entry_count (x509_name); +  for (i = 0; i < n; ++i) +    { +      ent = X509_NAME_get_entry (x509_name, i); +      if (!ent) +	continue; +      fn = X509_NAME_ENTRY_get_object (ent); +      if (!fn) +	continue; +      val = X509_NAME_ENTRY_get_data (ent); +      if (!val) +	continue; +      fn_nid = OBJ_obj2nid (fn); +      if (fn_nid == NID_undef) +	continue; +      objbuf = OBJ_nid2sn (fn_nid); +      if (!objbuf) +	continue; +      buf = (unsigned char *)1; /* bug in OpenSSL 0.9.6b ASN1_STRING_to_UTF8 requires this workaround */ +      if (ASN1_STRING_to_UTF8 (&buf, val) <= 0) +	continue; + +      printf("X509 %s: %s\n", objbuf, (char *)buf); +      OPENSSL_free (buf); +    } +} + + + +OPENVPN_EXPORT int +openvpn_plugin_func_v3 (const int version, +                        struct openvpn_plugin_args_func_in const *args, +                        struct openvpn_plugin_args_func_return *retptr) +{ +  struct plugin_context *context = (struct plugin_context *) args->handle; + +  printf("\nopenvpn_plugin_func_v3() :::::>> "); +  show (args->type, args->argv, args->envp); + +  /* Dump some X509 information if we're in the TLS_VERIFY phase */ +  if ((args->type == OPENVPN_PLUGIN_TLS_VERIFY) && args->current_cert ) { +    printf("---- X509 Subject information ----\n"); +    printf("Certificate depth: %i\n", args->current_cert_depth); +    x509_print_info(args->current_cert); +    printf("----------------------------------\n"); +  } + +  /* check entered username/password against what we require */ +  if (args->type == OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY) +    { +      /* get username/password from envp string array */ +      const char *username = get_env ("username", args->envp); +      const char *password = get_env ("password", args->envp); + +      if (username && !strcmp (username, context->username) +	  && password && !strcmp (password, context->password)) +	return OPENVPN_PLUGIN_FUNC_SUCCESS; +      else +	return OPENVPN_PLUGIN_FUNC_ERROR; +    } +  else +    return OPENVPN_PLUGIN_FUNC_SUCCESS; +} + +OPENVPN_EXPORT void +openvpn_plugin_close_v1 (openvpn_plugin_handle_t handle) +{ +  struct plugin_context *context = (struct plugin_context *) handle; +  free (context); +} diff --git a/openvpn/sample/sample-plugins/log/winbuild b/openvpn/sample/sample-plugins/log/winbuild new file mode 100755 index 0000000..decf05f --- /dev/null +++ b/openvpn/sample/sample-plugins/log/winbuild @@ -0,0 +1,18 @@ +# +# Build an OpenVPN plugin module on Windows/MinGW. +# The argument should be the base name of the C source file +# (without the .c). +# + +# This directory is where we will look for openvpn-plugin.h +INCLUDE="-I../../../include" + +CC_FLAGS="-O2 -Wall" + +gcc -DBUILD_DLL $CC_FLAGS $INCLUDE -c $1.c +gcc --disable-stdcall-fixup -mdll -DBUILD_DLL -o junk.tmp -Wl,--base-file,base.tmp $1.o +rm junk.tmp +dlltool --dllname $1.dll --base-file base.tmp --output-exp temp.exp --input-def $1.def +rm base.tmp +gcc --enable-stdcall-fixup -mdll -DBUILD_DLL -o $1.dll $1.o -Wl,temp.exp +rm temp.exp diff --git a/openvpn/sample/sample-plugins/simple/README b/openvpn/sample/sample-plugins/simple/README new file mode 100644 index 0000000..4400cd3 --- /dev/null +++ b/openvpn/sample/sample-plugins/simple/README @@ -0,0 +1,16 @@ +OpenVPN plugin examples. + +Examples provided: + +simple.c -- using the --auth-user-pass-verify callback, verify +            that the username/password is "foo"/"bar". + +To build: + +  ./build simple (Linux/BSD/etc.) +  ./winbuild simple (MinGW on Windows) + +To use in OpenVPN, add to config file: + +  plugin simple.so (Linux/BSD/etc.) +  plugin simple.dll (MinGW on Windows) diff --git a/openvpn/sample/sample-plugins/simple/build b/openvpn/sample/sample-plugins/simple/build new file mode 100755 index 0000000..bbb05f7 --- /dev/null +++ b/openvpn/sample/sample-plugins/simple/build @@ -0,0 +1,15 @@ +#!/bin/sh + +# +# Build an OpenVPN plugin module on *nix.  The argument should +# be the base name of the C source file (without the .c). +# + +# This directory is where we will look for openvpn-plugin.h +CPPFLAGS="${CPPFLAGS:--I../../..}" + +CC="${CC:-gcc}" +CFLAGS="${CFLAGS:--O2 -Wall -g}" + +$CC $CPPFLAGS $CFLAGS -fPIC -c $1.c && \ +$CC $CFLAGS -fPIC -shared $LDFLAGS -Wl,-soname,$1.so -o $1.so $1.o -lc diff --git a/openvpn/sample/sample-plugins/simple/simple.c b/openvpn/sample/sample-plugins/simple/simple.c new file mode 100644 index 0000000..f26d89f --- /dev/null +++ b/openvpn/sample/sample-plugins/simple/simple.c @@ -0,0 +1,120 @@ +/* + *  OpenVPN -- An application to securely tunnel IP networks + *             over a single TCP/UDP port, with support for SSL/TLS-based + *             session authentication and key exchange, + *             packet encryption, packet authentication, and + *             packet compression. + * + *  Copyright (C) 2002-2010 OpenVPN Technologies, Inc. <sales@openvpn.net> + * + *  This program is free software; you can redistribute it and/or modify + *  it under the terms of the GNU General Public License version 2 + *  as published by the Free Software Foundation. + * + *  This program is distributed in the hope that it will be useful, + *  but WITHOUT ANY WARRANTY; without even the implied warranty of + *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the + *  GNU General Public License for more details. + * + *  You should have received a copy of the GNU General Public License + *  along with this program (see the file COPYING included with this + *  distribution); if not, write to the Free Software Foundation, Inc., + *  59 Temple Place, Suite 330, Boston, MA  02111-1307  USA + */ + +/* + * This file implements a simple OpenVPN plugin module which + * will examine the username/password provided by a client, + * and make an accept/deny determination.  Will run + * on Windows or *nix. + * + * See the README file for build instructions. + */ + +#include <stdio.h> +#include <string.h> +#include <stdlib.h> + +#include "openvpn-plugin.h" + +/* + * Our context, where we keep our state. + */ +struct plugin_context { +  const char *username; +  const char *password; +}; + +/* + * Given an environmental variable name, search + * the envp array for its value, returning it + * if found or NULL otherwise. + */ +static const char * +get_env (const char *name, const char *envp[]) +{ +  if (envp) +    { +      int i; +      const int namelen = strlen (name); +      for (i = 0; envp[i]; ++i) +	{ +	  if (!strncmp (envp[i], name, namelen)) +	    { +	      const char *cp = envp[i] + namelen; +	      if (*cp == '=') +		return cp + 1; +	    } +	} +    } +  return NULL; +} + +OPENVPN_EXPORT openvpn_plugin_handle_t +openvpn_plugin_open_v1 (unsigned int *type_mask, const char *argv[], const char *envp[]) +{ +  struct plugin_context *context; + +  /* +   * Allocate our context +   */ +  context = (struct plugin_context *) calloc (1, sizeof (struct plugin_context)); + +  /* +   * Set the username/password we will require. +   */ +  context->username = "foo"; +  context->password = "bar"; + +  /* +   * We are only interested in intercepting the +   * --auth-user-pass-verify callback. +   */ +  *type_mask = OPENVPN_PLUGIN_MASK (OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY); + +  return (openvpn_plugin_handle_t) context; +} + +OPENVPN_EXPORT int +openvpn_plugin_func_v1 (openvpn_plugin_handle_t handle, const int type, const char *argv[], const char *envp[]) +{ +  struct plugin_context *context = (struct plugin_context *) handle; + +  /* get username/password from envp string array */ +  const char *username = get_env ("username", envp); +  const char *password = get_env ("password", envp); + +  /* check entered username/password against what we require */ +  if (username && !strcmp (username, context->username) +      && password && !strcmp (password, context->password)) +    return OPENVPN_PLUGIN_FUNC_SUCCESS; +  else +    return OPENVPN_PLUGIN_FUNC_ERROR; +} + +OPENVPN_EXPORT void +openvpn_plugin_close_v1 (openvpn_plugin_handle_t handle) +{ +  struct plugin_context *context = (struct plugin_context *) handle; +  free (context); +} diff --git a/openvpn/sample/sample-plugins/simple/simple.def b/openvpn/sample/sample-plugins/simple/simple.def new file mode 100755 index 0000000..a87507d --- /dev/null +++ b/openvpn/sample/sample-plugins/simple/simple.def @@ -0,0 +1,6 @@ +LIBRARY   OpenVPN_PLUGIN_SAMPLE +DESCRIPTION "Sample OpenVPN plug-in module." +EXPORTS +   openvpn_plugin_open_v1   @1 +   openvpn_plugin_func_v1   @2 +   openvpn_plugin_close_v1  @3 diff --git a/openvpn/sample/sample-plugins/simple/winbuild b/openvpn/sample/sample-plugins/simple/winbuild new file mode 100755 index 0000000..decf05f --- /dev/null +++ b/openvpn/sample/sample-plugins/simple/winbuild @@ -0,0 +1,18 @@ +# +# Build an OpenVPN plugin module on Windows/MinGW. +# The argument should be the base name of the C source file +# (without the .c). +# + +# This directory is where we will look for openvpn-plugin.h +INCLUDE="-I../../../include" + +CC_FLAGS="-O2 -Wall" + +gcc -DBUILD_DLL $CC_FLAGS $INCLUDE -c $1.c +gcc --disable-stdcall-fixup -mdll -DBUILD_DLL -o junk.tmp -Wl,--base-file,base.tmp $1.o +rm junk.tmp +dlltool --dllname $1.dll --base-file base.tmp --output-exp temp.exp --input-def $1.def +rm base.tmp +gcc --enable-stdcall-fixup -mdll -DBUILD_DLL -o $1.dll $1.o -Wl,temp.exp +rm temp.exp | 
