%PDF- %PDF-
| Direktori : /proc/self/root/backups/router/usr/local/etc/inc/plugins.inc.d/ |
| Current File : //proc/self/root/backups/router/usr/local/etc/inc/plugins.inc.d/openvpn.inc |
<?php
/*
* Copyright (C) 2016-2023 Deciso B.V.
* Copyright (C) 2015-2022 Franco Fichtner <franco@opnsense.org>
* Copyright (C) 2008 Scott Ullrich <sullrich@gmail.com>
* Copyright (C) 2006 Fernando Lemos
* Copyright (C) 2005 Peter Allgeyer <allgeyer@web.de>
* Copyright (C) 2004 Peter Curran <peter@closeconsultants.com>
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are met:
*
* 1. Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
* AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
* AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
* OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
function openvpn_configure()
{
return [
'crl' => ['openvpn_refresh_crls:0'],
'remote' => ['openvpn_configure_do'],
'openvpn' => ['openvpn_configure_do:2'],
'vpn' => ['openvpn_configure_do:2'],
];
}
function openvpn_syslog()
{
$logfacilities = array();
$logfacilities['openvpn'] = array('facility' => array('openvpn'));
return $logfacilities;
}
function openvpn_services()
{
global $config;
$services = array();
foreach (array('server', 'client') as $mode) {
if (isset($config['openvpn']["openvpn-{$mode}"])) {
foreach ($config['openvpn']["openvpn-{$mode}"] as $setting) {
if (empty($setting['disable'])) {
$pconfig = array();
$pconfig['description'] = "OpenVPN {$mode}: " . htmlspecialchars($setting['description'] ?? '');
$pconfig['pidfile'] = "/var/run/openvpn_{$mode}{$setting['vpnid']}.pid";
$pconfig['php']['restart'] = array('openvpn_configure_single');
$pconfig['php']['start'] = array('openvpn_configure_single');
$pconfig['php']['args'] = array('id');
$pconfig['id'] = $setting['vpnid'];
$pconfig['name'] = 'openvpn';
$services[] = $pconfig;
}
}
}
}
foreach ((new OPNsense\OpenVPN\OpenVPN())->Instances->Instance->iterateItems() as $key => $node) {
if (!empty((string)$node->enabled)) {
$services[] = [
'description' => "OpenVPN {$node->role} " . htmlspecialchars($node->description),
'pidfile' => "/var/run/ovpn-instance-{$key}.pid",
'configd' => [
'start' => ["openvpn start {$key}"],
'restart' => ["openvpn restart {$key}"],
'stop' => ["openvpn stop {$key}"],
],
'id' => $key,
'name' => "openvpn"
];
}
}
return $services;
}
function openvpn_interfaces()
{
$interfaces = [];
if ((new OPNsense\OpenVPN\OpenVPN())->isEnabled()) {
$interfaces['openvpn'] = [
'enable' => true,
'if' => 'openvpn',
'descr' => 'OpenVPN',
'type' => 'group',
'virtual' => true,
'networks' => []
];
}
return $interfaces;
}
function openvpn_devices()
{
global $config;
$names = [];
foreach (['server', 'client'] as $mode) {
if (!empty($config['openvpn']["openvpn-{$mode}"])) {
foreach ($config['openvpn']["openvpn-{$mode}"] as $settings) {
$names["ovpn{$mode[0]}{$settings['vpnid']}"] = [
'descr' => sprintf('ovpn%s%s (OpenVPN %s %s)', $mode[0], $settings['vpnid'], $mode == 'server' ? gettext('Server') : gettext('Client'), $settings['description'] ?? ''),
'ifdescr' => sprintf('%s', $settings['description'] ?? ''),
'name' => "ovpn{$mode[0]}{$settings['vpnid']}",
];
}
}
}
foreach ((new OPNsense\OpenVPN\OpenVPN())->Instances->Instance->iterateItems() as $key => $node) {
$mode = ((string)$node->role)[0];
$name = "ovpn{$mode}{$node->vpnid}";
$names[$name] = [
'descr' => sprintf('ovpn%s%s (OpenVPN %s %s)', $mode, $node->vpnid, (string)$node->role == 'server' ? gettext('Server') : gettext('Client'), $node->description),
'ifdescr' => (string)$node->description,
'name' => $name
];
}
return [[
'function' => 'openvpn_prepare', /* XXX not the same as real configuration */
'configurable' => false,
'pattern' => '^ovpn',
'type' => 'openvpn',
'volatile' => true,
'names' => $names,
]];
}
function openvpn_xmlrpc_sync()
{
$result = array();
$result[] = array(
'description' => gettext('OpenVPN'),
'section' => 'openvpn,OPNsense.OpenVPN',
'id' => 'openvpn',
'services' => ["openvpn"],
);
return $result;
}
function openvpn_verbosity_level()
{
return array(
0 => gettext('0 (none)'),
1 => gettext('1 (default)'),
2 => gettext('2'),
3 => gettext('3 (recommended)'),
4 => gettext('4'),
5 => gettext('5'),
6 => gettext('6'),
7 => gettext('7'),
8 => gettext('8'),
9 => gettext('9'),
10 => gettext('10'),
11 => gettext('11'),
);
}
function openvpn_compression_modes()
{
return array(
'' => gettext('No Preference'),
'pfc' => sprintf(gettext('Partial - Packet framing for compression (%s)'), '--compress'),
'lz4' => sprintf(gettext('Enabled - LZ4 algorithm (%s)'), '--compress lz4'),
'lz4-v2' => sprintf(gettext('Enabled - LZ4 v2 algorithm (%s)'), '--compress lz4-v2'),
'lzo' => sprintf(gettext('Enabled - LZO algorithm (%s)'), '--compress lzo'),
'stub' => sprintf(gettext('Enabled - Stub algorithm (%s)'), '--compress stub'),
'stub-v2' => sprintf(gettext('Enabled - Stub v2 algorithm (%s)'), '--compress stub-v2'),
'no' => sprintf(gettext('Legacy - Disabled LZO algorithm (%s)'), '--comp-lzo no'),
'adaptive' => sprintf(gettext('Legacy - Enabled LZO algorithm with adaptive compression (%s)'), '--comp-lzo adaptive'),
'yes' => sprintf(gettext('Legacy - Enabled LZO algorithm without adaptive compression (%s)'), '--comp-lzo yes'),
);
}
function openvpn_get_protocols()
{
return array('UDP', 'UDP4', 'UDP6', 'TCP', 'TCP4', 'TCP6');
}
function openvpn_create_key()
{
$fp = popen("/usr/local/sbin/openvpn --genkey secret /dev/stdout 2>/dev/null", "r");
if (!$fp) {
return false;
}
$rslt = stream_get_contents($fp);
pclose($fp);
return $rslt;
}
function openvpn_vpnid_next()
{
$vpnids = (new OPNsense\OpenVPN\OpenVPN())->usedVPNIds();
for ($vpnid = 1; true; $vpnid++) {
if (!in_array($vpnid, $vpnids)) {
return $vpnid;
}
}
}
function openvpn_port_used($prot, $interface, $port, $curvpnid = 0)
{
global $config;
$this_proto = strlen($prot) > 3 ? $prot : $prot . "4";
if ($interface == "any") {
$this_address = $interface;
} elseif (stristr($prot, '6') !== false) {
$this_address = get_interface_ipv6($interface);
} else {
$this_address = get_interface_ip($interface);
}
foreach (['server', 'client'] as $component) {
$cnfsection = 'openvpn-' . $component;
if (isset($config['openvpn'][$cnfsection])) {
foreach ($config['openvpn'][$cnfsection] as $settings) {
if (isset($settings['disable'])) {
continue;
} elseif ($curvpnid != 0 && $curvpnid == $settings['vpnid']) {
continue;
} elseif (empty($settings['local_port'])) {
continue;
}
// any interface includes "this" interface, use same logic as "local " directive to match address
if ($interface == "any") {
$cnf_interface = $interface;
} else {
$cnf_interface = $settings['interface'] != 'any' ? $settings['interface'] : $interface;
}
// calculate which address would be configured
if ($cnf_interface == "any") {
$cnf_address = "any";
} elseif (is_ipaddr($settings['ipaddr'])) {
$cnf_address = $settings['ipaddr'];
} else {
if (stristr($settings['protocol'], '6') !== false) {
$cnf_address = get_interface_ipv6($cnf_interface);
} else {
$cnf_address = get_interface_ip($cnf_interface);
}
}
$cnf_proto = strlen($settings['protocol']) > 3 ? $settings['protocol'] : $settings['protocol'] . "4";
if ($cnf_proto == $this_proto && $this_address == $cnf_address && $settings['local_port'] == $port) {
return true;
}
}
}
}
return false;
}
function openvpn_port_next($prot, $interface = "wan")
{
$port = 1194;
while (openvpn_port_used($prot, $interface, $port)) {
$port++;
}
while (openvpn_port_used($prot, "any", $port)) {
$port++;
}
return $port;
}
function openvpn_get_cipherlist()
{
$ciphers = ["" => gettext("None")];
exec('/usr/local/sbin/openvpn --show-ciphers', $lines);
foreach ($lines as $line) {
if (strstr($line, ' (') !== false) {
$cipher = explode(' ', $line)[0];
$ciphers[$cipher] = $line;
}
}
ksort($ciphers, SORT_STRING | SORT_FLAG_CASE);
return $ciphers;
}
function openvpn_get_digestlist()
{
$digests = array();
exec('/usr/local/sbin/openvpn --show-digests', $lines);
foreach ($lines as $line) {
if (strstr($line, 'digest size') !== false) {
$digest = explode(' ', $line)[0];
$bits = explode(' ', explode('bit', $line)[0])[1];
$digests[$digest] = $digest . " (" . $bits . "-bit)";
}
}
ksort($digests);
$digests["none"] = gettext("None (No Authentication)");
return $digests;
}
function openvpn_validate_port($value, $name)
{
$value = trim($value);
if (empty($value) || !is_numeric($value) || $value < 0 || ($value > 65535)) {
return sprintf(gettext("The field '%s' must contain a valid port, ranging from 0 to 65535."), $name);
}
return false;
}
function openvpn_validate_cidr($value, $name, $multiple = false, $ipproto = 'ipv4')
{
$error_multi = gettext("'%s' in '%s' may only contain valid %s CIDR range(s) separated by commas.");
$error_single = gettext("'%s' in '%s' is not a single valid %s CIDR range");
$error = false;
if (!empty($value)) {
$networks = explode(',', $value);
if (!$multiple && (count($networks) > 1)) {
return sprintf($error_single, $value, $name, $ipproto);
} else {
foreach ($networks as $network) {
list($ip, $prefix) = explode('/', $network);
if ($error) {
break;
} elseif ($ipproto == 'ipv4') {
$error = !is_ipaddrv4($ip) || !is_numeric($prefix) || $prefix > 32 || $prefix < 0;
} else {
$error = !is_ipaddrv6($ip) || (!empty($prefix) && (!is_numeric($prefix) || $prefix > 128 || $prefix < 0));
}
}
}
}
if ($error && !$multiple) {
return sprintf($error_single, $value, $name, $ipproto);
} elseif ($error) {
return sprintf($error_multi, $value, $name, $ipproto);
} else {
return $error;
}
}
function openvpn_add_dhcpopts(&$settings, &$conf)
{
if (!empty($settings['dns_domain'])) {
$conf .= "push \"dhcp-option DOMAIN {$settings['dns_domain']}\"\n";
}
if (!empty($settings['dns_domain_search'])) {
foreach (explode(",", $settings['dns_domain_search']) as $domain) {
$conf .= "push \"dhcp-option DOMAIN-SEARCH {$domain}\"\n";
}
}
if (!empty($settings['dns_server1'])) {
$conf .= "push \"dhcp-option DNS {$settings['dns_server1']}\"\n";
}
if (!empty($settings['dns_server2'])) {
$conf .= "push \"dhcp-option DNS {$settings['dns_server2']}\"\n";
}
if (!empty($settings['dns_server3'])) {
$conf .= "push \"dhcp-option DNS {$settings['dns_server3']}\"\n";
}
if (!empty($settings['dns_server4'])) {
$conf .= "push \"dhcp-option DNS {$settings['dns_server4']}\"\n";
}
if (!empty($settings['push_register_dns'])) {
$conf .= "push \"register-dns\"\n";
}
if (!empty($settings['push_block_outside_dns'])) {
$conf .= "push \"block-outside-dns\"\n";
}
if (!empty($settings['ntp_server1'])) {
$conf .= "push \"dhcp-option NTP {$settings['ntp_server1']}\"\n";
}
if (!empty($settings['ntp_server2'])) {
$conf .= "push \"dhcp-option NTP {$settings['ntp_server2']}\"\n";
}
if (!empty($settings['netbios_enable'])) {
if (!empty($settings['dhcp_nbttype']) && ($settings['dhcp_nbttype'] != 0)) {
$conf .= "push \"dhcp-option NBT {$settings['dhcp_nbttype']}\"\n";
}
if (!empty($settings['dhcp_nbtscope'])) {
$conf .= "push \"dhcp-option NBS {$settings['dhcp_nbtscope']}\"\n";
}
if (!empty($settings['wins_server1'])) {
$conf .= "push \"dhcp-option WINS {$settings['wins_server1']}\"\n";
}
if (!empty($settings['wins_server2'])) {
$conf .= "push \"dhcp-option WINS {$settings['wins_server2']}\"\n";
}
}
if (!empty($settings['route_gateway'])) {
$conf .= "push \"route-gateway {$settings['route_gateway']}\"\n";
}
if (!empty($settings['redirect_gateway'])) {
$redirgw = str_replace(',', ' ', $settings['redirect_gateway']);
$conf .= "push \"redirect-gateway {$redirgw}\"\n";
} elseif (!empty($settings['gwredir'])) {
$conf .= "push \"redirect-gateway def1\"\n";
}
}
function openvpn_add_custom(&$settings, &$conf)
{
if (!empty($settings['custom_options'])) {
$options = explode(';', $settings['custom_options']);
if (is_array($options)) {
foreach ($options as $option) {
$conf .= "$option\n";
}
} else {
$conf .= "{$settings['custom_options']}\n";
}
}
}
function openvpn_add_keyfile($data, &$conf, $mode_id, $directive, $opt = '')
{
$fpath = "/var/etc/openvpn/{$mode_id}.{$directive}";
openvpn_create_dirs();
$data = !empty($data) ? str_replace("\r", "", base64_decode($data)) : '';
@touch($fpath);
@chmod($fpath, 0600);
file_put_contents($fpath, str_replace("\n\n", "\n", $data));
$conf .= "{$directive} {$fpath} {$opt}\n";
}
function openvpn_reconfigure($mode, $settings, $device_only = false)
{
if (empty($settings)) {
return null;
}
openvpn_create_dirs();
$vpnid = $settings['vpnid'];
$mode_id = $mode . $vpnid;
if (!isset($settings['dev_mode'])) {
/* defaults to tun */
$settings['dev_mode'] = "tun";
}
$devnode = "{$settings['dev_mode']}{$vpnid}";
if ($mode == "server") {
$devname = "ovpns{$vpnid}";
} else {
$devname = "ovpnc{$vpnid}";
}
if (!does_interface_exist($devname)) {
if (in_array($settings['dev_mode'], ['tun', 'tap'])) {
if (!file_exists("/dev/{$devnode}")) {
mwexecf('/sbin/ifconfig %s create', array($devnode));
}
mwexecf('/sbin/ifconfig %s name %s', array($devnode, $devname));
} else {
/**
* XXX: DCO uses non standard matching, normally create should use "ifconfig ovpnX create"
* ref: https://github.com/opnsense/src/blob/b0130349e8/sys/net/if_ovpn.c#L2392-L2400
*/
mwexecf('/sbin/ifconfig %s create', array($devname));
}
mwexecf('/sbin/ifconfig %s group openvpn', array($devname));
}
if ($device_only || isset($settings['disable'])) {
return $devname;
}
mwexecf('/sbin/ifconfig %s down', array($devname));
$proto = strtolower($settings['protocol']);
if (substr($settings['protocol'], 0, 3) == "TCP") {
$proto = "{$proto}-{$mode}";
}
$cipher = $settings['crypto'] ?? '';
/* defaults to SHA1, so use it when unset to maintain compatibility */
$digest = !empty($settings['digest']) ? $settings['digest'] : 'SHA1';
/*
* If a specific IP address (VIP) is requested, use it.
* Otherwise, if a specific interface is requested, use
* it unless "any" interface was selected, then the local
* directive will be omitted.
*/
if (is_ipaddr($settings['ipaddr'] ?? '')) {
$iface_ip = $settings['ipaddr'];
} elseif ($settings['interface'] != 'any') {
if (stristr($settings['protocol'], '6') !== false) {
$iface_ip = get_interface_ipv6($settings['interface']);
} else {
$iface_ip = get_interface_ip($settings['interface']);
}
}
$conf = "dev {$devname}\n";
if (isset($settings['verbosity_level'])) {
$conf .= "verb {$settings['verbosity_level']}\n";
}
$conf .= "dev-type {$settings['dev_mode']}\n";
if ($settings['dev_mode'] == 'tun') {
/* legacy does not support DCO */
$conf .= "disable-dco\n";
}
$conf .= "dev-node /dev/{$devnode}\n";
$conf .= "writepid /var/run/openvpn_{$mode_id}.pid\n";
$conf .= "script-security 3\n";
$conf .= "daemon openvpn_{$mode_id}\n";
$conf .= "keepalive 10 60\n";
$conf .= "ping-timer-rem\n";
$conf .= "persist-tun\n";
$conf .= "persist-key\n";
$conf .= "proto {$proto}\n";
/* can both be '' or 'none' depending on the age of the config */
if (!empty($cipher) && $cipher != 'none') {
$conf .= "cipher {$cipher}\n";
}
$conf .= "auth {$digest}\n";
$conf .= "up /usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkup\n";
$conf .= "down /usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkdown\n";
if (!empty($iface_ip)) {
$conf .= "local {$iface_ip}\n";
} elseif (!empty($settings['interface']) && $settings['interface'] == 'any' && substr($settings['protocol'], 0, 3) == 'UDP') {
$conf .= "multihome\n";
}
// server specific settings
if ($mode == 'server') {
list($ip, $cidr) = explode('/', $settings['tunnel_network'] ?? '/');
list($ipv6, $prefix) = explode('/', $settings['tunnel_networkv6'] ?? '/');
$mask = gen_subnet_mask($cidr);
// client connect and disconnect handling
switch ($settings['mode']) {
case 'server_user':
case 'server_tls_user':
$conf .= "client-disconnect \"/usr/local/opnsense/scripts/openvpn/ovpn_event.py '{$vpnid}'\"\n";
break;
case 'server_tls':
// For non user auth types setup client specific overrides,
// user authenticated ones are commissioned using the auth
// script in option auth-user-pass-verify.
$conf .= "client-connect \"/usr/local/opnsense/scripts/openvpn/ovpn_event.py '{$vpnid}'\"\n";
break;
case 'p2p_tls':
// same as server_tls, but only valid if cidr < 30, without
// server directive client-connect is not valid.
// XXX: IPv6 is likely flawed, see "server" directive too.
if (!empty($ip) && !empty($mask) && ($cidr < 30)) {
$conf .= "client-connect \"/usr/local/opnsense/scripts/openvpn/ovpn_event.py '{$vpnid}'\"\n";
}
break;
default:
break;
}
// configure tls modes
switch ($settings['mode']) {
case 'p2p_tls':
case 'server_tls':
case 'server_user':
case 'server_tls_user':
$conf .= "tls-server\n";
break;
}
// configure p2p/server modes
switch ($settings['mode']) {
case 'p2p_tls':
if (!empty($ip) || !empty($ipv6)) {
// If the CIDR is less than a /30, OpenVPN will complain if you try to
// use the server directive. It works for a single client without it.
// See ticket #1417
if (is_ipaddrv4($ip) && !empty($mask) && $cidr < 30) {
$conf .= "server {$ip} {$mask}\n";
$conf .= "client-config-dir /var/etc/openvpn-csc/" . $vpnid . "\n";
}
if (is_ipaddrv6($ipv6) && !empty($prefix)) {
$conf .= "server-ipv6 {$ipv6}/{$prefix}\n";
$conf .= "client-config-dir /var/etc/openvpn-csc/" . $vpnid . "\n";
}
}
/* XXX FALLTHROUGH */
case 'p2p_shared_key':
if (!empty($ip) && !empty($mask)) {
list($ip1, $ip2) = openvpn_get_interface_ip($ip, $mask);
if ($settings['dev_mode'] == 'tun') {
$conf .= "ifconfig {$ip1} {$ip2}\n";
} else {
$conf .= "ifconfig {$ip1} {$mask}\n";
}
}
if (!empty($ipv6) && !empty($prefix)) {
list($ipv6_1, $ipv6_2) = openvpn_get_interface_ipv6($ipv6, $prefix);
if ($settings['dev_mode'] == 'tun') {
$conf .= "ifconfig-ipv6 {$ipv6_1} {$ipv6_2}\n";
} else {
$conf .= "ifconfig-ipv6 {$ipv6_1} {$prefix}\n";
}
}
break;
case 'server_tls':
case 'server_user':
case 'server_tls_user':
if (!empty($ip) || !empty($ipv6)) {
if (is_ipaddrv4($ip) && !empty($mask)) {
$conf .= "server {$ip} {$mask}\n";
$conf .= "client-config-dir /var/etc/openvpn-csc/" . $vpnid . "\n";
}
if (is_ipaddrv6($ipv6) && !empty($prefix)) {
$conf .= "server-ipv6 {$ipv6}/{$prefix}\n";
$conf .= "client-config-dir /var/etc/openvpn-csc/" . $vpnid . "\n";
}
} else {
if ($settings['serverbridge_dhcp']) {
if (
!empty($settings['serverbridge_interface']) &&
strcmp($settings['serverbridge_interface'], "none")
) {
/* XXX emulates older code, but does VIP support make sense here anyway? */
list ($biface_ip,, $biface_sn) = interfaces_primary_address(explode('_vip', $settings['serverbridge_interface'])[0]);
if (
is_ipaddrv4($biface_ip) && is_ipaddrv4($settings['serverbridge_dhcp_start']) &&
is_ipaddrv4($settings['serverbridge_dhcp_end'])
) {
$biface_sm = gen_subnet_mask($biface_sn);
$conf .= "server-bridge {$biface_ip} {$biface_sm} " .
"{$settings['serverbridge_dhcp_start']} {$settings['serverbridge_dhcp_end']}\n";
$conf .= "client-config-dir /var/etc/openvpn-csc/" . $vpnid . "\n";
} else {
$conf .= "mode server\n";
}
} else {
$conf .= "mode server\n";
}
}
}
break;
}
// configure user auth modes
switch ($settings['mode']) {
case 'server_user':
$conf .= "verify-client-cert none\n";
/* FALLTHROUGH */
case 'server_tls_user':
/* username-as-common-name is not compatible with server-bridge */
if (stristr($conf, "server-bridge") === false && empty($settings['use-common-name'])) {
$conf .= "username-as-common-name\n";
}
if (!empty($settings['authmode'])) {
$conf .= "auth-user-pass-verify \"/usr/local/opnsense/scripts/openvpn/ovpn_event.py --defer '{$vpnid}'\" via-env\n";
$conf .= "learn-address \"/usr/local/opnsense/scripts/openvpn/ovpn_event.py '{$vpnid}'\"\n";
}
break;
}
if ($mode == 'server' && (strstr($settings['mode'], 'tls'))) {
$conf .= "tls-verify \"/usr/local/opnsense/scripts/openvpn/ovpn_event.py '{$vpnid}'\"\n";
}
// The local port to listen on
$conf .= "lport {$settings['local_port']}\n";
// The management port to listen on
$conf .= "management /var/etc/openvpn/{$mode_id}.sock unix\n";
if (!empty($settings['maxclients'])) {
$conf .= "max-clients {$settings['maxclients']}\n";
}
// Can we push routes
if (!empty($settings['local_network'])) {
$conf .= openvpn_gen_routes($settings['local_network'], "ipv4", true);
}
if (!empty($settings['local_networkv6'])) {
$conf .= openvpn_gen_routes($settings['local_networkv6'], "ipv6", true);
}
switch ($settings['mode']) {
case 'server_tls':
case 'server_user':
case 'server_tls_user':
// Configure client dhcp options
openvpn_add_dhcpopts($settings, $conf);
if (!empty($settings['client2client'])) {
$conf .= "client-to-client\n";
}
break;
}
if (isset($settings['duplicate_cn'])) {
$conf .= "duplicate-cn\n";
}
}
// client specific settings
if ($mode == 'client') {
// configure p2p mode
switch ($settings['mode']) {
case 'p2p_tls':
$conf .= "tls-client\n";
/* XXX FALLTHROUGH */
case 'shared_key':
$conf .= "client\n";
break;
}
// If there is no bind option at all (ip and/or port), add "nobind" directive
// Otherwise, use the local port if defined, failing that, use lport 0 to
// ensure a random source port.
if ((empty($iface_ip)) && (!$settings['local_port'])) {
$conf .= "nobind\n";
} elseif ($settings['local_port']) {
$conf .= "lport {$settings['local_port']}\n";
} else {
$conf .= "lport 0\n";
}
// Use unix socket to overcome the problem on any type of server
$conf .= "management /var/etc/openvpn/{$mode_id}.sock unix\n";
// The remote server
$server_addr_a = explode(',', $settings['server_addr']);
$server_port_a = explode(',', $settings['server_port']);
foreach (array_keys($server_addr_a) as $i) {
$conf .= "remote {$server_addr_a[$i]} {$server_port_a[$i]}\n";
}
if (!empty($settings['use_shaper'])) {
$conf .= "shaper {$settings['use_shaper']}\n";
}
if (!empty($settings['tunnel_network'])) {
list($ip, $mask) = explode('/', $settings['tunnel_network']);
$mask = gen_subnet_mask($mask);
list($ip1, $ip2) = openvpn_get_interface_ip($ip, $mask);
if ($settings['dev_mode'] == 'tun') {
$conf .= "ifconfig {$ip2} {$ip1}\n";
} else {
$conf .= "ifconfig {$ip2} {$mask}\n";
}
}
if (!empty($settings['tunnel_networkv6'])) {
list($ipv6, $prefix) = explode('/', $settings['tunnel_networkv6']);
list($ipv6_1, $ipv6_2) = openvpn_get_interface_ipv6($ipv6, $prefix);
if ($settings['dev_mode'] == 'tun') {
$conf .= "ifconfig-ipv6 {$ipv6_2} {$ipv6_1}\n";
} else {
$conf .= "ifconfig-ipv6 {$ipv6_2} {$prefix}\n";
}
}
if ($settings['auth_user'] && $settings['auth_pass']) {
$up_file = "/var/etc/openvpn/{$mode_id}.up";
$conf .= "auth-user-pass {$up_file}\n";
$userpass = "{$settings['auth_user']}\n";
$userpass .= "{$settings['auth_pass']}\n";
file_put_contents($up_file, $userpass);
}
if ($settings['proxy_addr']) {
$conf .= "http-proxy {$settings['proxy_addr']} {$settings['proxy_port']}";
if ($settings['proxy_authtype'] != "none") {
$conf .= " /var/etc/openvpn/{$mode_id}.pas {$settings['proxy_authtype']}";
$proxypas = "{$settings['proxy_user']}\n";
$proxypas .= "{$settings['proxy_passwd']}\n";
file_put_contents("/var/etc/openvpn/{$mode_id}.pas", $proxypas);
}
$conf .= " \n";
}
}
if (
!empty($settings['remote_network']) &&
openvpn_validate_cidr($settings['remote_network'], '', true, 'ipv4') === false
) {
$conf .= openvpn_gen_routes($settings['remote_network'], 'ipv4', false);
}
if (
!empty($settings['remote_networkv6']) &&
openvpn_validate_cidr($settings['remote_networkv6'], '', true, 'ipv6') === false
) {
$conf .= openvpn_gen_routes($settings['remote_networkv6'], 'ipv6', false);
}
// Write the settings for the keys
switch ($settings['mode']) {
case 'p2p_shared_key':
openvpn_add_keyfile($settings['shared_key'], $conf, $mode_id, "secret");
break;
case 'p2p_tls':
case 'server_tls':
case 'server_tls_user':
case 'server_user':
$ca = base64_encode(ca_chain($settings));
openvpn_add_keyfile($ca, $conf, $mode_id, "ca");
if (!empty($settings['certref'])) {
$cert = lookup_cert($settings['certref']);
openvpn_add_keyfile($cert['crt'], $conf, $mode_id, "cert");
openvpn_add_keyfile($cert['prv'], $conf, $mode_id, "key");
}
if ($mode == 'server') {
$conf .= "dh /usr/local/etc/inc/plugins.inc.d/openvpn/dh.rfc7919\n";
}
if (!empty($settings['crlref'])) {
$crl = lookup_crl($settings['crlref']);
openvpn_add_keyfile($crl['text'] ?? '', $conf, $mode_id, "crl-verify");
}
if (!empty($settings['tls'])) {
if ($settings['tlsmode'] == "crypt") {
openvpn_add_keyfile($settings['tls'], $conf, $mode_id, "tls-crypt");
} else {
openvpn_add_keyfile($settings['tls'], $conf, $mode_id, "tls-auth", $mode == "server" ? 0 : 1);
}
}
break;
}
if (!empty($settings['compression'])) {
switch ($settings['compression']) {
case 'no':
case 'adaptive':
case 'yes':
$conf .= "comp-lzo {$settings['compression']}\n";
break;
case 'pfc':
$conf .= "compress\n";
break;
default:
$conf .= "compress {$settings['compression']}\n";
break;
}
}
if (!empty($settings['passtos'])) {
$conf .= "passtos\n";
}
if (!empty($settings['dynamic_ip'])) {
$conf .= "persist-remote-ip\n";
$conf .= "float\n";
}
if (!empty($settings['topology_subnet'])) {
$conf .= "topology subnet\n";
}
if ($mode == "client") {
if (!empty($settings['route_no_pull'])) {
$conf .= "route-nopull\n";
}
if (!empty($settings['route_no_exec'])) {
$conf .= "route-noexec\n";
}
if (!empty($settings['resolve_retry'])) {
$conf .= "resolv-retry infinite\n";
}
if (!empty($settings['remote_random'])) {
$conf .= "remote-random\n";
}
}
if (isset($settings['reneg-sec']) && $settings['reneg-sec'] != '') {
$conf .= "reneg-sec {$settings['reneg-sec']}\n";
}
openvpn_add_custom($settings, $conf);
@touch("/var/etc/openvpn/{$mode_id}.conf");
@chmod("/var/etc/openvpn/{$mode_id}.conf", 0600);
file_put_contents("/var/etc/openvpn/{$mode_id}.conf", $conf);
}
function openvpn_restart($mode, $settings, $carp_event = false)
{
$vpnid = $settings['vpnid'];
$mode_id = $mode . $vpnid;
if ($carp_event && $mode == 'server' && isvalidpid("/var/run/openvpn_{$mode_id}.pid")) {
/* do not stop or restart a server if we are handling a CARP event */
return;
}
killbypid("/var/run/openvpn_{$mode_id}.pid");
if (isset($settings['disable'])) {
return;
}
if (
strstr($settings['interface'], '_vip') && $mode == 'client'
) {
list ($interface, $vhid) = explode("_vip", $settings['interface']);
$interface_details = legacy_interface_details(get_real_interface($interface));
if (
!empty($interface_details) && !empty($interface_details['carp'][$vhid]) &&
in_array($interface_details['carp'][$vhid]['status'], ['BACKUP' ,'INIT'])
) {
/* do not restart a client if we are a CARP backup instance or unplugged (init)*/
return;
}
}
@unlink("/var/etc/openvpn/{$mode_id}.sock");
@unlink("/var/run/openvpn_{$mode_id}.pid");
openvpn_clear_route($mode, $settings);
if (!mwexecf('/usr/local/sbin/openvpn --config %s', "/var/etc/openvpn/{$mode_id}.conf")) {
$pid = waitforpid("/var/run/openvpn_{$mode_id}.pid", 10);
if ($pid) {
log_msg(sprintf('OpenVPN %s %s instance started on PID %s.', $mode, $vpnid, $pid));
} else {
log_msg(sprintf('OpenVPN %s %s instance start timed out.', $mode, $vpnid), LOG_WARNING);
}
}
}
function openvpn_delete($mode, &$settings)
{
$vpnid = $settings['vpnid'];
$mode_id = $mode . $vpnid;
if ($mode == "server") {
$devname = "ovpns{$vpnid}";
} else {
$devname = "ovpnc{$vpnid}";
}
killbypid("/var/run/openvpn_{$mode_id}.pid");
mwexecf('/sbin/ifconfig %s destroy', array($devname));
@array_map('unlink', glob("/var/etc/openvpn/{$mode_id}.*"));
}
/**
* generate config (text) data for a single client specific override
* @param array $settings csc item
* @param array $server openvpn server item
* @param string $target_filename write to filename, or use configured/generated path when empty
* @return string|boolean filename or false when unable to (missing common name or vpnid)
*/
function openvpn_csc_conf_write($settings, $server, $target_filename = null)
{
if (empty($settings['common_name']) || empty($server['vpnid'])) {
return false;
}
$conf = '';
if (!empty($settings['block'])) {
$conf .= "disable\n";
}
if (!empty($settings['push_reset'])) {
$conf .= "push-reset\n";
}
if (!empty($settings['tunnel_network'])) {
list($ip, $mask) = explode('/', $settings['tunnel_network']);
if ($server['dev_mode'] == 'tun' && empty($server['topology_subnet'])) {
$baselong = ip2long32($ip) & gen_subnet_mask_long($mask);
$serverip = long2ip32($baselong + 1);
$clientip = long2ip32($baselong + 2);
$conf .= "ifconfig-push {$clientip} {$serverip}\n";
} else {
$conf .= "ifconfig-push {$ip} " . gen_subnet_mask($mask) . "\n";
}
}
if (!empty($settings['tunnel_networkv6'])) {
list($ipv6, $prefix) = explode('/', $settings['tunnel_networkv6']);
list($ipv6_1, $ipv6_2) = openvpn_get_interface_ipv6($ipv6, $prefix);
if ($server['dev_mode'] == 'tun' && empty($server['topology_subnet'])) {
$conf .= "ifconfig-ipv6-push {$ipv6_2} {$ipv6_1}\n";
} else {
$conf .= "ifconfig-ipv6-push {$settings['tunnel_networkv6']} {$ipv6_1}\n";
}
}
if (!empty($settings['local_network'])) {
$conf .= openvpn_gen_routes($settings['local_network'], "ipv4", true);
}
if (!empty($settings['local_networkv6'])) {
$conf .= openvpn_gen_routes($settings['local_networkv6'], "ipv6", true);
}
if (
!empty($settings['remote_network']) &&
openvpn_validate_cidr($settings['remote_network'], '', true, 'ipv4') === false
) {
$conf .= openvpn_gen_routes($settings['remote_network'], 'ipv4', false, true);
}
if (
!empty($settings['remote_networkv6']) &&
openvpn_validate_cidr($settings['remote_networkv6'], '', true, 'ipv6') === false
) {
$conf .= openvpn_gen_routes($settings['remote_networkv6'], 'ipv6', false, true);
}
openvpn_add_dhcpopts($settings, $conf);
$vpnid = filter_var($server['vpnid'], FILTER_SANITIZE_NUMBER_INT);
if (empty($target_filename)) {
$target_filename = "/var/etc/openvpn-csc/" . $vpnid . "/" . $settings['common_name'];
}
if (!empty($conf)) {
file_put_contents($target_filename, $conf);
chown($target_filename, 'nobody');
chgrp($target_filename, 'nobody');
return $target_filename;
}
/* nothing was configured */
if (is_file($target_filename)) {
unlink($target_filename);
}
return null;
}
function openvpn_prepare($device)
{
$settings = (new OPNsense\OpenVPN\OpenVPN())->getInstanceById(preg_replace('/[^0-9]/', '', $device));
if (empty($settings)) {
return null;
}
// XXX: split device creation and legacy configure?
return openvpn_reconfigure($settings['role'], $settings, true);
}
function openvpn_configure_single($id)
{
global $config;
foreach (array('server', 'client') as $mode) {
if (isset($config['openvpn']["openvpn-{$mode}"])) {
foreach ($config['openvpn']["openvpn-{$mode}"] as $settings) {
if ($id != $settings['vpnid']) {
continue;
}
openvpn_reconfigure($mode, $settings);
openvpn_restart($mode, $settings);
configd_run('filter reload'); /* XXX required for NAT rules, but needs coalescing */
return;
}
}
}
}
function openvpn_configure_do($verbose = false, $interface_map = null, $carp_event = false)
{
global $config;
openvpn_create_dirs();
if (!isset($config['openvpn'])) {
return;
}
if (!plugins_argument_map($interface_map)) {
return;
}
service_log('Syncing OpenVPN settings...', $verbose);
$reconfigured = false;
foreach (array('server', 'client') as $mode) {
if (isset($config['openvpn']["openvpn-{$mode}"])) {
foreach ($config['openvpn']["openvpn-{$mode}"] as $settings) {
if (empty($interface_map) || in_array($settings['interface'], $interface_map)) {
openvpn_reconfigure($mode, $settings, $carp_event);
openvpn_restart($mode, $settings, $carp_event);
$reconfigured = true;
}
}
}
}
if ($reconfigured) {
configd_run('filter reload'); /* XXX required for NAT rules, but needs coalescing */
}
service_log("done.\n", $verbose);
}
function openvpn_create_dirs()
{
@mkdir('/var/etc/openvpn-csc', 0750);
@mkdir('/var/etc/openvpn', 0750);
foreach (openvpn_get_remote_access_servers() as $server) {
$vpnid = filter_var($server['vpnid'], FILTER_SANITIZE_NUMBER_INT);
$csc_path = '/var/etc/openvpn-csc/' . $vpnid;
if (is_file($csc_path)) {
// if the vpnid exists as file, remove it first
unlink($csc_path);
}
@mkdir($csc_path, 0750);
}
}
function openvpn_get_interface_ip($ip, $mask)
{
$masklong = ip2long($mask);
$baselong = ip2long32($ip) & $masklong;
// Special case for /31 networks which lack network and broadcast addresses.
// As per RFC3021, both addresses should be treated as host addresses.
if ($masklong == 0xfffffffe) {
$ip1 = long2ip32($baselong);
$ip2 = long2ip32($baselong + 1);
} else {
$ip1 = long2ip32($baselong + 1);
$ip2 = long2ip32($baselong + 2);
}
return array($ip1, $ip2);
}
function openvpn_get_interface_ipv6($ipv6, $prefix)
{
$basev6 = gen_subnetv6($ipv6, $prefix);
// Is there a better way to do this math?
$ipv6_arr = explode(':', $basev6);
$last = hexdec(array_pop($ipv6_arr));
$ipv6_1 = Net_IPv6::compress(Net_IPv6::uncompress(implode(':', $ipv6_arr) . ':' . dechex($last + 1)));
$ipv6_2 = Net_IPv6::compress(Net_IPv6::uncompress(implode(':', $ipv6_arr) . ':' . dechex($last + 2)));
return array($ipv6_1, $ipv6_2);
}
function openvpn_clear_route($mode, $settings)
{
if (empty($settings['tunnel_network'])) {
return;
}
list($ip, $cidr) = explode('/', $settings['tunnel_network']);
$mask = gen_subnet_mask($cidr);
$clear_route = false;
switch ($settings['mode']) {
case 'shared_key':
$clear_route = true;
break;
case 'p2p_tls':
case 'p2p_shared_key':
if ($cidr == 30) {
$clear_route = true;
}
break;
}
if ($clear_route && !empty($ip) && !empty($mask)) {
list($ip1, $ip2) = openvpn_get_interface_ip($ip, $mask);
$ip_to_clear = ($mode == "server") ? $ip1 : $ip2;
/* XXX: Family for route? */
mwexec("/sbin/route -q delete {$ip_to_clear}");
}
}
function openvpn_gen_routes($value, $ipproto = "ipv4", $push = false, $iroute = false)
{
$routes = "";
if (empty($value)) {
return "";
}
$networks = explode(',', $value);
foreach ($networks as $network) {
if ($ipproto == "ipv4") {
$route = openvpn_gen_route_ipv4($network, $iroute);
} else {
$route = openvpn_gen_route_ipv6($network, $iroute);
}
if ($push) {
$routes .= "push \"{$route}\"\n";
} else {
$routes .= "{$route}\n";
}
}
return $routes;
}
function openvpn_gen_route_ipv4($network, $iroute = false)
{
$i = ($iroute) ? "i" : "";
list($ip, $mask) = explode('/', trim($network));
$mask = gen_subnet_mask($mask);
return "{$i}route $ip $mask";
}
function openvpn_gen_route_ipv6($network, $iroute = false)
{
$i = ($iroute) ? "i" : "";
list($ipv6, $prefix) = explode('/', trim($network));
if (empty($prefix)) {
$prefix = "128";
}
return "{$i}route-ipv6 {$ipv6}/{$prefix}";
}
/**
* Retrieve a list of remote access servers, indexed by vpnid
*/
function openvpn_get_remote_access_servers()
{
global $config;
$result = array();
if (!empty($config['openvpn']['openvpn-server'])) {
foreach ($config['openvpn']['openvpn-server'] as $server) {
if (in_array($server['mode'], array('server_tls', 'server_user', 'server_tls_user', 'p2p_tls'))) {
$result[$server['vpnid']] = $server;
}
}
}
return $result;
}
function openvpn_refresh_crls()
{
global $config;
openvpn_create_dirs();
if (!empty($config['openvpn']['openvpn-server'])) {
foreach ($config['openvpn']['openvpn-server'] as $settings) {
if (empty($settings) || isset($settings['disable'])) {
continue;
}
// Write the settings for the keys
switch ($settings['mode']) {
case 'p2p_tls':
case 'server_tls':
case 'server_tls_user':
case 'server_user':
if (!empty($settings['crlref'])) {
$crl = lookup_crl($settings['crlref']);
$fpath = "/var/etc/openvpn/server{$settings['vpnid']}.crl-verify";
file_put_contents($fpath, !empty($crl['text']) ? base64_decode($crl['text']) : '');
@chmod($fpath, 0644);
}
break;
}
}
}
foreach ((new OPNsense\OpenVPN\OpenVPN())->Instances->Instance->iterateItems() as $key => $node) {
if (!empty((string)$node->enabled) && !empty((string)$node->crl)) {
$fpath = "/var/etc/openvpn/server-{$key}.crl-verify";
$crl = lookup_crl((string)$node->crl);
file_put_contents($fpath, !empty($crl['text']) ? base64_decode($crl['text']) : '');
@chmod($fpath, 0644);
}
}
}