// SoftEther VPN Source Code // Cedar Communication Module // // SoftEther VPN Server, Client and Bridge are free software under GPLv2. // // Copyright (c) 2012-2015 Daiyuu Nobori. // Copyright (c) 2012-2015 SoftEther VPN Project, University of Tsukuba, Japan. // Copyright (c) 2012-2015 SoftEther Corporation. // // All Rights Reserved. // // http://www.softether.org/ // // Author: Daiyuu Nobori // Comments: Tetsuo Sugiyama, Ph.D. // // This program is free software; you can redistribute it and/or // modify it under the terms of the GNU General Public License // version 2 as published by the Free Software Foundation. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License version 2 // along with this program; if not, write to the Free Software // Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. // IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY // CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, // TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE // SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. // // THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE // AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE. // // // THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN, // UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY, // MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS // SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS // SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER // CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL // DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING, // MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR // SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND // CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO // EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO, // JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION // AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN // THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE. // // USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS // YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY // CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS // SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE // SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO // COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING // PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR // CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE // NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR // INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+ // COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE // WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY // COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE // COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE // SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR // COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO // RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL // RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT // JUST A STATEMENT FOR WARNING AND DISCLAIMER. // // // SOURCE CODE CONTRIBUTION // ------------------------ // // Your contribution to SoftEther VPN Project is much appreciated. // Please send patches to us through GitHub. // Read the SoftEther VPN Patch Acceptance Policy in advance: // http://www.softether.org/5-download/src/9.patch // // // DEAR SECURITY EXPERTS // --------------------- // // If you find a bug or a security vulnerability please kindly inform us // about the problem immediately so that we can fix the security problem // to protect a lot of users around the world as soon as possible. // // Our e-mail address for security reports is: // softether-vpn-security [at] softether.org // // Please note that the above e-mail address is not a technical support // inquiry address. If you need technical assistance, please visit // http://www.softether.org/ and ask your question on the users forum. // // Thank you for your cooperation. // // // NO MEMORY OR RESOURCE LEAKS // --------------------------- // // The memory-leaks and resource-leaks verification under the stress // test has been passed before release this source code. // IPsec_IPC.h // Header of IPsec_IPC.c #ifndef IPSEC_IPC #define IPSEC_IPC // Constants #define IPC_ARP_LIFETIME (3 * 60 * 1000) #define IPC_ARP_GIVEUPTIME (1 * 1000) #define IPC_DHCP_TIMEOUT (5 * 1000) #define IPC_DHCP_TIMEOUT_TOTAL_GIVEUP (20 * 1000) #define IPC_DHCP_MIN_LEASE 5 #define IPC_DHCP_DEFAULT_LEASE 3600 #define IPC_MAX_PACKET_QUEUE_LEN 10000 #define IPC_DHCP_VENDOR_ID "MSFT 5.0" #define IPC_PASSWORD_MSCHAPV2_TAG "xH7DiNlurDhcYV4a:" // ARP table entry struct IPC_ARP { IP Ip; // IP address bool Resolved; // Whether the MAC address have been resolved UCHAR MacAddress[6]; // MAC address UINT64 GiveupTime; // Time to give up (in the case of unresolved) UINT64 ExpireTime; // Expiration date (If resolved) QUEUE *PacketQueue; // Transmission packet queue }; // DHCP release queue struct IPC_DHCP_RELESAE_QUEUE { DHCP_OPTION_LIST Req; UINT TranId; UCHAR MacAddress[6]; }; // IPC_PARAM struct IPC_PARAM { char ClientName[MAX_SIZE]; char Postfix[MAX_SIZE]; char HubName[MAX_HUBNAME_LEN + 1]; char UserName[MAX_USERNAME_LEN + 1]; char Password[MAX_PASSWORD_LEN + 1]; IP ClientIp; UINT ClientPort; IP ServerIp; UINT ServerPort; char ClientHostname[MAX_SIZE]; char CryptName[MAX_SIZE]; bool BridgeMode; UINT Mss; bool IsL3Mode; bool IsOpenVPN; }; // IPC_ASYNC object struct IPC_ASYNC { CEDAR *Cedar; // Cedar IPC_PARAM Param; // Parameters for creating IPC THREAD *Thread; // Thread SOCK_EVENT *SockEvent; // Socket events that is set when the connection is completed bool Done; // Processing completion flag IPC *Ipc; // IPC object (if it fails to connect, the value is NULL) TUBE *TubeForDisconnect; // Tube for disconnection notification UINT ErrorCode; // Error code in the case of failing to connect DHCP_OPTION_LIST L3ClientAddressOption; // Client IP address option (Only in the case of L3 mode) UINT64 L3DhcpRenewInterval; // DHCP update interval UINT64 L3NextDhcpRenewTick; // DHCP renewal time of the next bool DhcpAllocFailed; // Failed to get IP address from the DHCP server }; // IPC object struct IPC { CEDAR *Cedar; char HubName[MAX_HUBNAME_LEN + 1]; char UserName[MAX_USERNAME_LEN + 1]; char Password[MAX_PASSWORD_LEN + 1]; char ClientHostname[MAX_SIZE]; UCHAR random[SHA1_SIZE]; char SessionName[MAX_SESSION_NAME_LEN + 1]; char ConnectionName[MAX_CONNECTION_NAME_LEN + 1]; POLICY *Policy; SOCK *Sock; INTERRUPT_MANAGER *Interrupt; // Interrupt manager IP ClientIPAddress; // IP address of the client IP SubnetMask; // Subnet mask of the client IP DefaultGateway; // Default gateway address IP BroadcastAddress; // Broadcast address UCHAR MacAddress[6]; // MAC address UCHAR Padding[2]; LIST *ArpTable; // ARP table QUEUE *IPv4RecviedQueue; // IPv4 reception queue TUBE_FLUSH_LIST *FlushList; // Tube Flush List UCHAR MsChapV2_ServerResponse[20]; // Server response DHCP_CLASSLESS_ROUTE_TABLE ClasslessRoute; // Classless routing table }; // MS-CHAPv2 authentication information struct IPC_MSCHAP_V2_AUTHINFO { char MsChapV2_PPPUsername[MAX_SIZE]; // MS-CHAPv2 Username UCHAR MsChapV2_ServerChallenge[16]; // MS-CHAPv2 Server Challenge UCHAR MsChapV2_ClientChallenge[16]; // MS-CHAPv2 Client Challenge UCHAR MsChapV2_ClientResponse[24]; // MS-CHAPv2 Client Response }; IPC *NewIPC(CEDAR *cedar, char *client_name, char *postfix, char *hubname, char *username, char *password, UINT *error_code, IP *client_ip, UINT client_port, IP *server_ip, UINT server_port, char *client_hostname, char *crypt_name, bool bridge_mode, UINT mss); IPC *NewIPCByParam(CEDAR *cedar, IPC_PARAM *param, UINT *error_code); IPC *NewIPCBySock(CEDAR *cedar, SOCK *s, void *mac_address); void FreeIPC(IPC *ipc); bool IsIPCConnected(IPC *ipc); void IPCSetSockEventWhenRecvL2Packet(IPC *ipc, SOCK_EVENT *e); void IPCSendL2(IPC *ipc, void *data, UINT size); void IPCSendIPv4(IPC *ipc, void *data, UINT size); BLOCK *IPCRecvL2(IPC *ipc); BLOCK *IPCRecvIPv4(IPC *ipc); void IPCProcessInterrupts(IPC *ipc); void IPCProcessL3Events(IPC *ipc); void IPCProcessL3EventsEx(IPC *ipc, UINT64 now); bool IPCSetIPv4Parameters(IPC *ipc, IP *ip, IP *subnet, IP *gw, DHCP_CLASSLESS_ROUTE_TABLE *rt); IPC_ARP *IPCNewARP(IP *ip, UCHAR *mac_address); void IPCFreeARP(IPC_ARP *a); int IPCCmpArpTable(void *p1, void *p2); void IPCSendIPv4Unicast(IPC *ipc, void *data, UINT size, IP *next_ip); IPC_ARP *IPCSearchArpTable(IPC *ipc, IP *ip); void IPCSendIPv4WithDestMacAddr(IPC *ipc, void *data, UINT size, UCHAR *dest_mac_addr); void IPCFlushArpTable(IPC *ipc); void IPCFlushArpTableEx(IPC *ipc, UINT64 now); void IPCProcessArp(IPC *ipc, BLOCK *b); void IPCAssociateOnArpTable(IPC *ipc, IP *ip, UCHAR *mac_address); bool IsValidUnicastMacAddress(UCHAR *mac); bool IsValidUnicastIPAddress4(IP *ip); bool IsValidUnicastIPAddressUINT4(UINT ip); DHCPV4_DATA *IPCSendDhcpRequest(IPC *ipc, IP *dest_ip, UINT tran_id, DHCP_OPTION_LIST *opt, UINT expecting_code, UINT timeout, TUBE *discon_poll_tube); BUF *IPCBuildDhcpRequest(IPC *ipc, IP *dest_ip, UINT tran_id, DHCP_OPTION_LIST *opt); BUF *IPCBuildDhcpRequestOptions(IPC *ipc, DHCP_OPTION_LIST *opt); bool IPCDhcpAllocateIP(IPC *ipc, DHCP_OPTION_LIST *opt, TUBE *discon_poll_tube); bool IPCDhcpAllocateIPEx(IPC *ipc, DHCP_OPTION_LIST *opt, TUBE *discon_poll_tube, bool openvpn_compatible); bool IPCDhcpRequestInformIP(IPC *ipc, DHCP_OPTION_LIST *opt, TUBE *discon_poll_tube, IP *client_ip); void IPCDhcpRenewIP(IPC *ipc, IP *dhcp_server); void IPCDhcpFreeIP(IPC *ipc, IP *dhcp_server); IPC_ASYNC *NewIPCAsync(CEDAR *cedar, IPC_PARAM *param, SOCK_EVENT *sock_event); void IPCAsyncThreadProc(THREAD *thread, void *param); void FreeIPCAsync(IPC_ASYNC *a); bool ParseAndExtractMsChapV2InfoFromPassword(IPC_MSCHAP_V2_AUTHINFO *d, char *password); #endif // IPSEC_IPC // Developed by SoftEther VPN Project at University of Tsukuba in Japan. // Department of Computer Science has dozens of overly-enthusiastic geeks. // Join us: http://www.tsukuba.ac.jp/english/admission/