1
0
mirror of https://github.com/SoftEtherVPN/SoftEtherVPN.git synced 2024-11-07 02:00:41 +03:00
Commit Graph

159 Commits

Author SHA1 Message Date
hope4hope
f7f05420af Update Interop_OpenVPN.h
Safer connection
2017-06-10 14:00:30 +03:00
dnobori
4df2eb4f9c v4.22-9634-beta 2016-11-27 17:43:14 +09:00
Daiyuu Nobori
0978e1a016 Merge branch 'master' of github.com:SoftEtherVPN/SoftEtherVPN 2016-11-27 18:03:07 +09:00
Daiyuu Nobori
8bf26d424c Merge branch 'sacha-radius-hub' 2016-11-27 18:02:48 +09:00
Daiyuu Nobori
c9cd73d906 fix conflict 2016-11-27 18:02:30 +09:00
Daiyuu Nobori
6bd15af4f3 Merge pull request #96 from berolinux/master
Try to autodetect OS and CPU instead of requiring user input
2016-11-27 18:01:13 +09:00
Daiyuu Nobori
c18fd5c12e Merge branch 'master' of github.com:SoftEtherVPN/SoftEtherVPN 2016-11-27 18:00:49 +09:00
Daiyuu Nobori
bf4d021112 Merge branch 'yodresh-master' 2016-11-27 17:58:59 +09:00
Daiyuu Nobori
9d09fb0566 fix conflict 2016-11-27 17:58:54 +09:00
Daiyuu Nobori
2a2f47e0c8 Merge pull request #127 from nna774/fix/vpncmd-LogFileGet
fix LogFileGet won't save to SAVEPATH
2016-11-27 17:57:47 +09:00
Daiyuu Nobori
b818cd53c9 Merge branch 'dglushenok-master' 2016-11-27 17:57:15 +09:00
Daiyuu Nobori
86d87d1ac4 fix conflict 2016-11-27 17:57:00 +09:00
Daiyuu Nobori
5f8ce287c3 Merge pull request #133 from yehorov/master
Add the possibility to send the Virtual Hub Name to an external DHCP server
2016-11-27 17:55:04 +09:00
Daiyuu Nobori
697bff4023 Merge pull request #165 from micsell/cpupatch
Fixed OSX CPU utilization by replacing broken kevent() with select()
2016-11-27 17:54:57 +09:00
Daiyuu Nobori
7c30cddedb Merge pull request #178 from mcsalgado/fix_initialization
Fix set initialization, set.OnlyCapsuleModeIsInvalid could be garbage
2016-11-27 17:54:17 +09:00
Daiyuu Nobori
ec5fb8ead7 Merge pull request #180 from hsaito/master
Systemd service configuration files for SoftEther
2016-11-27 17:54:12 +09:00
Daiyuu Nobori
b6d855f8c8 Merge pull request #184 from mrjefftang/rpmspec_update
Update CentOS makefiles and spec file
2016-11-27 17:54:03 +09:00
Daiyuu Nobori
30a6fde3d5 Merge pull request #189 from scj643/master
Fixed typo
2016-11-27 17:53:57 +09:00
Daiyuu Nobori
034a213c2c Merge pull request #204 from LegDog/master
Adding Radius AVP Called-Station-Id
2016-11-27 17:53:45 +09:00
Daiyuu Nobori
d6b0c15e05 Merge branch 'rtau-master' 2016-11-27 17:52:42 +09:00
Daiyuu Nobori
712adc6d74 resolved the conflict 2016-11-27 17:48:18 +09:00
Daiyuu Nobori
cc8fff4d81 Merge pull request #217 from lewellyn/patch-1
Default to TLS connections only
2016-11-27 17:25:15 +09:00
Daiyuu Nobori
5cae447c79 Merge pull request #229 from chipitsine/master
cppcheck issues
2016-11-27 17:25:03 +09:00
Daiyuu Nobori
36591082c4 Merge pull request #231 from Leden/armv7l
Support Debian package build on ARMv7l architecture
2016-11-27 17:24:51 +09:00
Daiyuu Nobori
9939ec5a56 Merge pull request #241 from knok/debian-init
Add LSB header
2016-11-27 17:24:30 +09:00
Daiyuu Nobori
3292d83a62 Merge pull request #248 from ajeecai/master
Fix that ParseTcpOption doesn't work correctly
2016-11-27 17:23:43 +09:00
Luiz Eduardo Gava
ced0856ab1 HTTPS /wiki redir to 443 (test) 2016-11-08 14:44:35 -02:00
Luiz Eduardo Gava
8520502707 Merge remote-tracking branch 'upstream/master' 2016-11-08 09:23:52 -02:00
ajeecai
9bc67cc293 Fix that ParseTcpOption doesn't work correctly
Suppose there is a TCP SYN or SYN-ACK packet taking options as:
    02 04 05 b4 01 01 04 02 01 03 03 04 
which is 
Options: (12 bytes)
    >Maximum segment size: 1460 bytes
    >No-Operation (NOP)
    >No-Operation (NOP)
    >TCP SACK Permitted Option: True
    >No-Operation (NOP)
    >Window scale: 4 (multiply by 16)

Then the original parse function only returns MSS 1460 while WSS is 0.
2016-08-04 17:33:18 +08:00
NOKUBI Takatsugu
6115a2f6b7 Add LSB header 2016-06-10 14:32:37 +09:00
Denis Lesnov
5ffb983a85 Support Debian package build on ARMv7l architecture 2016-05-12 17:02:30 +03:00
Mykhaylo Yehorov
03ffd7535a merge upstream v4.21-9613-beta 2016-05-04 12:27:52 +03:00
Mykhaylo Yehorov
698babf408 merge upstream v4.20-9608-rtm 2016-05-04 11:53:35 +03:00
Ilya Shipitsin
d1ea47eb66 cppcheck issues:
[src/Cedar/Client.c:2184] -> [src/Cedar/Client.c:2187]: (warning) Either the condition 'rpc==0' is redundant or there is possible null pointer dereference: rpc.
[src/Cedar/Client.c:6032] -> [src/Cedar/Client.c:6035]: (warning) Either the condition 'ret!=0' is redundant or there is possible null pointer dereference: ret.
2016-04-30 00:26:58 +05:00
Ilya Shipitsin
29f93371c3 cppcheck issue:
[src/Cedar/Connection.c:1041] -> [src/Cedar/Connection.c:1043]: (warning) Either the condition 's!=0' is redundant or there is possible null pointer dereference: s.
2016-04-30 00:22:05 +05:00
Ilya Shipitsin
01edd34bbe cppcheck issues:
[src/Cedar/SM.c:875] -> [src/Cedar/SM.c:882]: (warning) Either the condition 'd==0' is redundant or there is possible null pointer dereference: d.
[src/Cedar/UdpAccel.c:119] -> [src/Cedar/UdpAccel.c:123]: (warning) Either the condition 'a==0' is redundant or there is possible null pointer dereference: a.
2016-04-30 00:16:15 +05:00
Ilya Shipitsin
556ea647e3 cppcheck issues:
[src/Cedar/Virtual.c:2389] -> [src/Cedar/Virtual.c:2398]: (warning) Either the condition 'a==0' is redundant or there is possible null pointer dereference: a.
[src/Cedar/Virtual.c:4000] -> [src/Cedar/Virtual.c:4004]: (warning) Either the condition 'n==0' is redundant or there is possible null pointer dereference: n.
[src/Cedar/Virtual.c:4203] -> [src/Cedar/Virtual.c:4207]: (warning) Either the condition 'n==0' is redundant or there is possible null pointer dereference: n.
2016-04-30 00:03:35 +05:00
Ilya Shipitsin
84f95447a3 cppcheck issues:
[src/Cedar/WebUI.c:1728] -> [src/Cedar/WebUI.c:1730]: (warning) Either the condition 'buf==0' is redundant or there is possible null pointer dereference: buf.
[src/Mayaqua/FileIO.c:383] -> [src/Mayaqua/FileIO.c:386]: (warning) Either the condition 'p==0' is redundant or there is possible null pointer dereference: p.
[src/Mayaqua/TcpIp.c:1837] -> [src/Mayaqua/TcpIp.c:1839]: (warning) Either the condition 'tcp!=0' is redundant or there is possible null pointer dereference: tcp.
2016-04-29 23:59:35 +05:00
Ilya Shipitsin
2f52dac9c4 cppcheck issues:
[src/Cedar/Admin.c:11843] -> [src/Cedar/Admin.c:11845]: (warning) Either the condition 't==0' is redundant or there is possible null pointer dereference: t.
[src/Cedar/Admin.c:12316] -> [src/Cedar/Admin.c:12318]: (warning) Either the condition 'a==0' is redundant or there is possible null pointer dereference: a.
[src/Cedar/Admin.c:12576] -> [src/Cedar/Admin.c:12578]: (warning) Either the condition 't==0' is redundant or there is possible null pointer dereference: t.
[src/Cedar/Admin.c:12790] -> [src/Cedar/Admin.c:12792]: (warning) Either the condition 't==0' is redundant or there is possible null pointer dereference: t.
2016-04-29 23:50:58 +05:00
dnobori
1e17c9bcfd v4.21-9613-beta 2016-04-24 23:49:31 +09:00
Hideki Saito
a9b9afc806 Merge remote-tracking branch 'upstream/master' 2016-04-18 11:59:58 -07:00
dnobori
c0c1b914db v4.20-9608-rtm 2016-04-18 01:52:49 +09:00
Mykhaylo Yehorov
4a3f08e5b8 merge upstream v4.19-9605-beta 2016-03-08 21:32:14 +02:00
dnobori
17e624ac26 v4.19-9605-beta 2016-03-06 23:16:01 +09:00
Matt Lewandowsky
15876de6fb Default to TLS connections only
Due to DROWN (CVE-2016-0800), SSLv2 must be disabled by default. This is the most straight-forward way to ensure new installations are not vulnerable. The upgrade use case is not addressed by this PR, though I posted information to the forum: http://www.vpnusers.com/viewtopic.php?f=7&t=5596

This patch is made available under Contribution Option 1, to allow PacketiX to be fixed the same way.
2016-03-02 08:02:07 -08:00
Jeff Tang
af8d24cc22 Merge remote-tracking branch 'origin/rpmspec_update' into rpmspec_update
* origin/rpmspec_update:
  Fix typo in specfile
2016-01-05 10:52:29 -05:00
Jeff Tang
b72392117b Merge remote-tracking branch 'SoftEtherVPN/master' into rpmspec_update
* SoftEtherVPN/master:
  v4.19-9599-beta
2016-01-05 10:52:25 -05:00
Raymond Tau
311ab9efab Correctly save and apply the DisableSslVersions config 2015-12-09 14:06:13 +08:00
Luiz Eduardo Gava
c34b751db0 Adding Radius AVP Called-Station-Id 2015-11-26 11:24:04 -02:00
Raymond Tau
04b72873c7 Fix the problem of the DisableSslVersions patch. 2015-11-23 16:15:10 +08:00