e2e8562035
Update strtable_ru.stb
2019-11-02 00:03:00 +03:00
faaad016d9
Update strtable_ru.stb
2019-10-28 17:40:21 +03:00
b78bb4f9d1
Update strtable_ru.stb
2019-10-28 16:16:08 +03:00
9c767d7367
Update strtable_ru.stb
2019-10-28 14:11:23 +03:00
f8cafc7844
Update strtable_ru.stb
2019-10-28 13:04:41 +03:00
08181a3520
Create strtable_ru.stb
2019-10-28 12:21:26 +03:00
4da4f3f5c3
Merge pull request #1 from SoftEtherVPN/master
...
new
2019-10-28 12:20:02 +03:00
cc65b49014
Create strtable_ru.stb
2019-10-28 12:19:37 +03:00
fd73baa06d
Delete strtable_ru.stb
2019-10-28 12:17:14 +03:00
dce351ab3b
Update strtable_ru.stb
2019-10-28 12:11:44 +03:00
1e835e7ec2
Merge PR #1020 : Proto_OpenVPN.c: improve OvsProcessData(), fix out-of-bounds access found by Coverity
2019-10-27 09:37:11 +01:00
5d73cd878f
Proto_OpenVPN.c: improve OvsProcessData(), fix out-of-bounds access found by Coverity
...
Coverity Scan detected an out-of-bounds access issue: OvsProcessData() checked whether the payload size was bigger than the size of the buffer, instead of checking whether the entire packet size (payload size + 2 bytes) was, resulting in an out-of-bounds access in case the payload size is bigger than 1998.
This commit also improves the variable names, the comments and adds two Debug() lines.
2019-10-27 09:01:56 +01:00
7349c4b16a
Merge PR #1018 : Proto_OpenVPN.c: fix segmentation fault in OvsProceccRecvPacket()
2019-10-26 00:53:27 +02:00
16bde47763
Proto_OpenVPN.c: fix segmentation fault in OvsProceccRecvPacket()
...
OvsDecrypt() returns 0 when it fails, resulting in "size" rolling over with an end result of 4294967292.
This commit fixes the issue by checking whether "size" is greater than sizeof(UINT) before performing the subtraction.
2019-10-26 00:36:07 +02:00
79a60bc5f0
Merge PR #1014 : Addressing the OpenVPN UDP reflection amplification attack
2019-10-22 09:42:08 +02:00
4d42f450b2
Addressing the UDP reflection amplification attack: https://github.com/SoftEtherVPN/SoftEtherVPN/issues/1001
2019-10-22 11:14:05 +09:00
46d8da6744
Merge PR #1012 : Mayaqua.h: include <stdarg.h> for "va_list" on Illumos
2019-10-21 22:08:09 +02:00
51330fdb43
Mayaqua.h: include <stdarg.h> for "va_list" on Illumos
2019-10-21 21:44:38 +02:00
5b15b12ea9
Merge PR #1011 : Protocol.c: fix bug in ClientConnectGetSocket() causing custom HTTP header not to work
2019-10-21 21:38:34 +02:00
12cc242529
Protocol.c: fix bug in ClientConnectGetSocket() causing custom HTTP header not to work
...
The bug was caused by a typo in the StrCpy() call: the source buffer was the same as the destination one, meaning that the function didn't do anything.
2019-10-21 20:26:56 +02:00
4afdad09a1
Merge PR #1009 : Move HTTP related functions to dedicated file(s) in Mayaqua
2019-10-20 13:28:53 +02:00
2f90e9ecb8
Mayaqua: move HTTP functions from "Network" to "HTTP"
2019-10-20 04:15:12 +02:00
c3d6ffc533
Move GetMimeTypeFromFileName() and related structure to Mayaqua
...
The structure (containing all mimetypes) occupies almost 700 lines, which are a lot.
This is just the beginning of the refactor plan.
2019-10-20 04:15:12 +02:00
04ecbf843a
Mayaqua.h: include <stdio.h> for "FILE"
2019-10-20 04:15:12 +02:00
6b41b19327
Mayaqua.h: include <stddef.h>, for "wchar_t"
2019-10-20 04:15:12 +02:00
93dcd25d63
Merge PR #1010 : Bump mixin-deep from 1.3.1 to 1.3.2 in /src/bin/hamcore/wwwroot/admin/default
2019-10-20 01:06:55 +02:00
5fed2b8903
Bump mixin-deep in /src/bin/hamcore/wwwroot/admin/default
...
Bumps [mixin-deep](https://github.com/jonschlinkert/mixin-deep ) from 1.3.1 to 1.3.2.
- [Release notes](https://github.com/jonschlinkert/mixin-deep/releases )
- [Commits](https://github.com/jonschlinkert/mixin-deep/compare/1.3.1...1.3.2 )
Signed-off-by: dependabot[bot] <support@github.com >
2019-10-19 22:39:12 +00:00
2aeec323f9
Merge PR #1008 : Adding RADIUS and L3 MAC address fixing function, with small bug-fixes
2019-10-19 19:37:21 +02:00
762c399c42
Merge pull request #1007 from dnobori/191019_win32openssl1.1.1d
...
Merge pull request #1007 : Updating built-in Win32 libraries
2019-10-19 14:16:09 +05:00
f0357d4000
- Fixed the problem occurs when RPC messages between Cluster Members exceed 64Kbytes.
...
- Fixed the RADIUS PEAP client to use the standard TLS versioning.
- Implementation of a function to fix the MAC address of L3 VPN protocol by entering e.g. "MAC: 112233445566" in the "Notes" field of the user information.
- Implementation of a function to fix the virtual MAC address to be assigned to the L3 VPN client as a string attribute from RADIUS server when authentication.
2019-10-19 17:34:12 +09:00
7413fec646
Updating built-in Win32 libraries
...
- OpenSSL 1.1.1 -> 1.1.1d
- zlib 1.2.3 -> 1.2.11
2019-10-19 16:59:13 +09:00
e944e6a848
Merge pull request #937 from chipitsine/cap_syslog
...
Merge PR #937 : systemd: replace deprecated CAP_SYS_ADMIN with CAP_SYSLOG
2019-10-12 11:24:07 +05:00
c8a0a5648b
Merge PR #970 : Fix buffer overflow during NETBIOS name resolution
2019-09-30 06:59:04 +02:00
e03db7ee60
Merge pull request #966 from Flucons/patch-1
...
Merge pull request #966 : Create strtable_pt_br.stb
2019-09-21 17:33:12 +00:00
93183f7b3f
Merge pull request #967 from Flucons/patch-2
...
Merge pull request #967 : Update SEVPN.sln
2019-09-21 17:32:03 +00:00
1e9092ee94
Merge pull request #977 from Hiiragi-Yuriko/patch-1
...
Merge pull request #977 : Update strtable_cn.stb
2019-09-17 10:36:42 +00:00
50960dbe16
Update strtable_cn.stb
...
Improve some translation.
2019-09-17 17:51:03 +08:00
ea37c85391
Merge pull request #973 from metalefty/hardcoded-log-path
...
Merge PR #973 : Avoid using hardcoded paths in log file enumeration
2019-09-13 10:49:27 +00:00
21e3ce104b
Avoid using hardcoded paths in log file enumeration
...
Hardcoded paths are used in log file enumeration such as LogFileList
command or GenerateEraseFileList function to delete old log files when
disk free space is lacking.
Fixes : SoftEtherVPN/SoftEtherVPN#972
2019-09-13 10:38:09 +09:00
850a5faa0d
Fix buffer overflow during NETBIOS name resolution
...
If SecureNAT is enabled and the hostname of the server
is longer than 16characters, every NETBIOS name resolution
query triggers the buffer overflow. If the server was built
with stack protection, the process will be killed.
2019-09-04 14:32:19 +02:00
9e46402e6b
Merge PR #960 : ci: display error if vpntest failed
2019-08-29 09:05:47 +02:00
1144d6c430
Update SEVPN.sln
...
Add pt-br
2019-08-15 13:03:14 -03:00
926b99047a
Create strtable_pt_br.stb
...
Start pt-br translation
2019-08-15 00:46:58 -03:00
2fa28480f9
ci: display error if vpntest failed
2019-08-04 14:42:52 +05:00
d10f83417f
Merge PR #962 : Fix several compile warnings on MS VC++ 2008.
2019-08-04 04:03:14 +02:00
82b84a9436
Merge PR #961 : Enable crash minidump for Win32 vpntest
2019-08-04 03:51:00 +02:00
bf4667cfce
Fix several compile warnings on MS VC++ 2008.
2019-08-04 10:35:16 +09:00
c6068d23c7
Enables crash minidump for Win32 vpntest. Minidump files will be saved to the 'C:\Users\<username>\AppData\Local\Temp\vpn_debug' (for normal user) or 'src\bin\vpn_debug\' (for administrator user).
2019-08-04 10:26:41 +09:00
7dff0dce17
Merge PR #957 : Add interface for easy protocol implementation
2019-07-29 03:33:48 +02:00
9f19efb7af
OpenVPN: use new protocol interface
2019-07-26 08:37:00 +02:00