// SoftEther VPN Source Code - Stable Edition Repository // Cedar Communication Module // // SoftEther VPN Server, Client and Bridge are free software under the Apache License, Version 2.0. // // Copyright (c) Daiyuu Nobori. // Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan. // Copyright (c) SoftEther Corporation. // Copyright (c) all contributors on SoftEther VPN project in GitHub. // // All Rights Reserved. // // http://www.softether.org/ // // This stable branch is officially managed by Daiyuu Nobori, the owner of SoftEther VPN Project. // Pull requests should be sent to the Developer Edition Master Repository on https://github.com/SoftEtherVPN/SoftEtherVPN // // License: The Apache License, Version 2.0 // https://www.apache.org/licenses/LICENSE-2.0 // // DISCLAIMER // ========== // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE // SOFTWARE. // // THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN, UNDER // JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY, MERGE, PUBLISH, // DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS SOFTWARE, THAT ANY // JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS SOFTWARE OR ITS CONTENTS, // AGAINST US (SOFTETHER PROJECT, SOFTETHER CORPORATION, DAIYUU NOBORI OR OTHER // SUPPLIERS), OR ANY JURIDICAL DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND // OF USING, COPYING, MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, // AND/OR SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND // CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO EXCLUSIVE // JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO, JAPAN. YOU MUST WAIVE // ALL DEFENSES OF LACK OF PERSONAL JURISDICTION AND FORUM NON CONVENIENS. // PROCESS MAY BE SERVED ON EITHER PARTY IN THE MANNER AUTHORIZED BY APPLICABLE // LAW OR COURT RULE. // // USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS YOU HAVE // A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY CRIMINAL LAWS OR CIVIL // RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS SOFTWARE IN OTHER COUNTRIES IS // COMPLETELY AT YOUR OWN RISK. THE SOFTETHER VPN PROJECT HAS DEVELOPED AND // DISTRIBUTED THIS SOFTWARE TO COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING // CIVIL RIGHTS INCLUDING PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER // COUNTRIES' LAWS OR CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. // WE HAVE NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR // INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+ COUNTRIES // AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE WORLD, WITH // DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY COUNTRIES' LAWS, REGULATIONS // AND CIVIL RIGHTS TO MAKE THE SOFTWARE COMPLY WITH ALL COUNTRIES' LAWS BY THE // PROJECT. EVEN IF YOU WILL BE SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A // PUBLIC SERVANT IN YOUR COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE // LIABLE TO RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL // RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT JUST A // STATEMENT FOR WARNING AND DISCLAIMER. // // READ AND UNDERSTAND THE 'WARNING.TXT' FILE BEFORE USING THIS SOFTWARE. // SOME SOFTWARE PROGRAMS FROM THIRD PARTIES ARE INCLUDED ON THIS SOFTWARE WITH // LICENSE CONDITIONS WHICH ARE DESCRIBED ON THE 'THIRD_PARTY.TXT' FILE. // // // SOURCE CODE CONTRIBUTION // ------------------------ // // Your contribution to SoftEther VPN Project is much appreciated. // Please send patches to us through GitHub. // Read the SoftEther VPN Patch Acceptance Policy in advance: // http://www.softether.org/5-download/src/9.patch // // // DEAR SECURITY EXPERTS // --------------------- // // If you find a bug or a security vulnerability please kindly inform us // about the problem immediately so that we can fix the security problem // to protect a lot of users around the world as soon as possible. // // Our e-mail address for security reports is: // softether-vpn-security [at] softether.org // // Please note that the above e-mail address is not a technical support // inquiry address. If you need technical assistance, please visit // http://www.softether.org/ and ask your question on the users forum. // // Thank you for your cooperation. // // // NO MEMORY OR RESOURCE LEAKS // --------------------------- // // The memory-leaks and resource-leaks verification under the stress // test has been passed before release this source code. // IPsec_IPC.h // Header of IPsec_IPC.c #ifndef IPSEC_IPC #define IPSEC_IPC // Constants #define IPC_ARP_LIFETIME (3 * 60 * 1000) #define IPC_ARP_GIVEUPTIME (1 * 1000) #define IPC_DHCP_TIMEOUT (5 * 1000) #define IPC_DHCP_TIMEOUT_TOTAL_GIVEUP (20 * 1000) #define IPC_DHCP_MIN_LEASE 5 #define IPC_DHCP_DEFAULT_LEASE 3600 #define IPC_MAX_PACKET_QUEUE_LEN 10000 #define IPC_DHCP_VENDOR_ID "MSFT 5.0" #define IPC_PASSWORD_MSCHAPV2_TAG "xH7DiNlurDhcYV4a:" #define IPC_LAYER_2 2 #define IPC_LAYER_3 3 // ARP table entry struct IPC_ARP { IP Ip; // IP address bool Resolved; // Whether the MAC address have been resolved UCHAR MacAddress[6]; // MAC address UINT64 GiveupTime; // Time to give up (in the case of unresolved) UINT64 ExpireTime; // Expiration date (If resolved) QUEUE *PacketQueue; // Transmission packet queue }; // DHCP release queue struct IPC_DHCP_RELESAE_QUEUE { DHCP_OPTION_LIST Req; UINT TranId; UCHAR MacAddress[6]; }; // IPC_SESSION_SHARED_BUFFER_DATA struct IPC_SESSION_SHARED_BUFFER_DATA { char ProtocolDetails[256]; // Protocol Details bool EnableUdpAccel; bool UsingUdpAccel; }; // IPC_PARAM struct IPC_PARAM { char ClientName[MAX_SIZE]; char Postfix[MAX_SIZE]; char HubName[MAX_HUBNAME_LEN + 1]; char UserName[MAX_USERNAME_LEN + 1]; char Password[MAX_PASSWORD_LEN + 1]; IP ClientIp; UINT ClientPort; IP ServerIp; UINT ServerPort; char ClientHostname[MAX_SIZE]; char CryptName[MAX_SIZE]; bool BridgeMode; UINT Mss; bool IsL3Mode; bool IsOpenVPN; X *ClientCertificate; UINT Layer; }; // IPC_ASYNC object struct IPC_ASYNC { CEDAR *Cedar; // Cedar IPC_PARAM Param; // Parameters for creating IPC THREAD *Thread; // Thread SOCK_EVENT *SockEvent; // Socket events that is set when the connection is completed bool Done; // Processing completion flag IPC *Ipc; // IPC object (if it fails to connect, the value is NULL) TUBE *TubeForDisconnect; // Tube for disconnection notification UINT ErrorCode; // Error code in the case of failing to connect DHCP_OPTION_LIST L3ClientAddressOption; // Client IP address option (Only in the case of L3 mode) UINT64 L3DhcpRenewInterval; // DHCP update interval UINT64 L3NextDhcpRenewTick; // DHCP renewal time of the next bool DhcpAllocFailed; // Failed to get IP address from the DHCP server }; // IPC object struct IPC { CEDAR *Cedar; char HubName[MAX_HUBNAME_LEN + 1]; char UserName[MAX_USERNAME_LEN + 1]; char Password[MAX_PASSWORD_LEN + 1]; char ClientHostname[MAX_SIZE]; UCHAR random[SHA1_SIZE]; char SessionName[MAX_SESSION_NAME_LEN + 1]; char ConnectionName[MAX_CONNECTION_NAME_LEN + 1]; POLICY *Policy; SOCK *Sock; INTERRUPT_MANAGER *Interrupt; // Interrupt manager IP ClientIPAddress; // IP address of the client IP SubnetMask; // Subnet mask of the client IP DefaultGateway; // Default gateway address IP BroadcastAddress; // Broadcast address UCHAR MacAddress[6]; // MAC address UCHAR Padding[2]; LIST *ArpTable; // ARP table QUEUE *IPv4RecviedQueue; // IPv4 reception queue TUBE_FLUSH_LIST *FlushList; // Tube Flush List UCHAR MsChapV2_ServerResponse[20]; // Server response DHCP_CLASSLESS_ROUTE_TABLE ClasslessRoute; // Classless routing table SHARED_BUFFER *IpcSessionSharedBuffer; // A shared buffer between IPC and Session IPC_SESSION_SHARED_BUFFER_DATA *IpcSessionShared; // A shared data between IPC and Session UINT Layer; }; // MS-CHAPv2 authentication information struct IPC_MSCHAP_V2_AUTHINFO { char MsChapV2_PPPUsername[MAX_SIZE]; // MS-CHAPv2 Username UCHAR MsChapV2_ServerChallenge[16]; // MS-CHAPv2 Server Challenge UCHAR MsChapV2_ClientChallenge[16]; // MS-CHAPv2 Client Challenge UCHAR MsChapV2_ClientResponse[24]; // MS-CHAPv2 Client Response EAP_CLIENT *MsChapV2_EapClient; // EAP client }; IPC *NewIPC(CEDAR *cedar, char *client_name, char *postfix, char *hubname, char *username, char *password, UINT *error_code, IP *client_ip, UINT client_port, IP *server_ip, UINT server_port, char *client_hostname, char *crypt_name, bool bridge_mode, UINT mss, EAP_CLIENT *eap_client, X *client_certificate, UINT layer); IPC *NewIPCByParam(CEDAR *cedar, IPC_PARAM *param, UINT *error_code); IPC *NewIPCBySock(CEDAR *cedar, SOCK *s, void *mac_address); void FreeIPC(IPC *ipc); bool IsIPCConnected(IPC *ipc); void IPCSetSockEventWhenRecvL2Packet(IPC *ipc, SOCK_EVENT *e); void IPCSendL2(IPC *ipc, void *data, UINT size); void IPCSendIPv4(IPC *ipc, void *data, UINT size); BLOCK *IPCRecvL2(IPC *ipc); BLOCK *IPCRecvIPv4(IPC *ipc); void IPCProcessInterrupts(IPC *ipc); void IPCProcessL3Events(IPC *ipc); void IPCProcessL3EventsEx(IPC *ipc, UINT64 now); bool IPCSetIPv4Parameters(IPC *ipc, IP *ip, IP *subnet, IP *gw, DHCP_CLASSLESS_ROUTE_TABLE *rt); IPC_ARP *IPCNewARP(IP *ip, UCHAR *mac_address); void IPCFreeARP(IPC_ARP *a); int IPCCmpArpTable(void *p1, void *p2); void IPCSendIPv4Unicast(IPC *ipc, void *data, UINT size, IP *next_ip); IPC_ARP *IPCSearchArpTable(IPC *ipc, IP *ip); void IPCSendIPv4WithDestMacAddr(IPC *ipc, void *data, UINT size, UCHAR *dest_mac_addr); void IPCFlushArpTable(IPC *ipc); void IPCFlushArpTableEx(IPC *ipc, UINT64 now); void IPCProcessArp(IPC *ipc, BLOCK *b); void IPCAssociateOnArpTable(IPC *ipc, IP *ip, UCHAR *mac_address); bool IsValidUnicastMacAddress(UCHAR *mac); bool IsValidUnicastIPAddress4(IP *ip); bool IsValidUnicastIPAddressUINT4(UINT ip); DHCPV4_DATA *IPCSendDhcpRequest(IPC *ipc, IP *dest_ip, UINT tran_id, DHCP_OPTION_LIST *opt, UINT expecting_code, UINT timeout, TUBE *discon_poll_tube); BUF *IPCBuildDhcpRequest(IPC *ipc, IP *dest_ip, UINT tran_id, DHCP_OPTION_LIST *opt); BUF *IPCBuildDhcpRequestOptions(IPC *ipc, DHCP_OPTION_LIST *opt); bool IPCDhcpAllocateIP(IPC *ipc, DHCP_OPTION_LIST *opt, TUBE *discon_poll_tube); bool IPCDhcpAllocateIPEx(IPC *ipc, DHCP_OPTION_LIST *opt, TUBE *discon_poll_tube, bool openvpn_compatible); bool IPCDhcpRequestInformIP(IPC *ipc, DHCP_OPTION_LIST *opt, TUBE *discon_poll_tube, IP *client_ip); void IPCDhcpRenewIP(IPC *ipc, IP *dhcp_server); void IPCDhcpFreeIP(IPC *ipc, IP *dhcp_server); IPC_ASYNC *NewIPCAsync(CEDAR *cedar, IPC_PARAM *param, SOCK_EVENT *sock_event); void IPCAsyncThreadProc(THREAD *thread, void *param); void FreeIPCAsync(IPC_ASYNC *a); bool ParseAndExtractMsChapV2InfoFromPassword(IPC_MSCHAP_V2_AUTHINFO *d, char *password); #endif // IPSEC_IPC