311 lines
12 KiB
C
311 lines
12 KiB
C
// SoftEther VPN Source Code - Stable Edition Repository
|
|
// Cedar Communication Module
|
|
//
|
|
// SoftEther VPN Server, Client and Bridge are free software under the Apache License, Version 2.0.
|
|
//
|
|
// Copyright (c) Daiyuu Nobori.
|
|
// Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
|
|
// Copyright (c) SoftEther Corporation.
|
|
// Copyright (c) all contributors on SoftEther VPN project in GitHub.
|
|
//
|
|
// All Rights Reserved.
|
|
//
|
|
// http://www.softether.org/
|
|
//
|
|
// This stable branch is officially managed by Daiyuu Nobori, the owner of SoftEther VPN Project.
|
|
// Pull requests should be sent to the Developer Edition Master Repository on https://github.com/SoftEtherVPN/SoftEtherVPN
|
|
//
|
|
// License: The Apache License, Version 2.0
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// DISCLAIMER
|
|
// ==========
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
// SOFTWARE.
|
|
//
|
|
// THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN, UNDER
|
|
// JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY, MERGE, PUBLISH,
|
|
// DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS SOFTWARE, THAT ANY
|
|
// JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS SOFTWARE OR ITS CONTENTS,
|
|
// AGAINST US (SOFTETHER PROJECT, SOFTETHER CORPORATION, DAIYUU NOBORI OR OTHER
|
|
// SUPPLIERS), OR ANY JURIDICAL DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND
|
|
// OF USING, COPYING, MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING,
|
|
// AND/OR SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
|
|
// CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO EXCLUSIVE
|
|
// JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO, JAPAN. YOU MUST WAIVE
|
|
// ALL DEFENSES OF LACK OF PERSONAL JURISDICTION AND FORUM NON CONVENIENS.
|
|
// PROCESS MAY BE SERVED ON EITHER PARTY IN THE MANNER AUTHORIZED BY APPLICABLE
|
|
// LAW OR COURT RULE.
|
|
//
|
|
// USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS YOU HAVE
|
|
// A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY CRIMINAL LAWS OR CIVIL
|
|
// RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS SOFTWARE IN OTHER COUNTRIES IS
|
|
// COMPLETELY AT YOUR OWN RISK. THE SOFTETHER VPN PROJECT HAS DEVELOPED AND
|
|
// DISTRIBUTED THIS SOFTWARE TO COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING
|
|
// CIVIL RIGHTS INCLUDING PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER
|
|
// COUNTRIES' LAWS OR CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES.
|
|
// WE HAVE NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
|
|
// INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+ COUNTRIES
|
|
// AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE WORLD, WITH
|
|
// DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY COUNTRIES' LAWS, REGULATIONS
|
|
// AND CIVIL RIGHTS TO MAKE THE SOFTWARE COMPLY WITH ALL COUNTRIES' LAWS BY THE
|
|
// PROJECT. EVEN IF YOU WILL BE SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A
|
|
// PUBLIC SERVANT IN YOUR COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE
|
|
// LIABLE TO RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
|
|
// RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT JUST A
|
|
// STATEMENT FOR WARNING AND DISCLAIMER.
|
|
//
|
|
// READ AND UNDERSTAND THE 'WARNING.TXT' FILE BEFORE USING THIS SOFTWARE.
|
|
// SOME SOFTWARE PROGRAMS FROM THIRD PARTIES ARE INCLUDED ON THIS SOFTWARE WITH
|
|
// LICENSE CONDITIONS WHICH ARE DESCRIBED ON THE 'THIRD_PARTY.TXT' FILE.
|
|
//
|
|
//
|
|
// SOURCE CODE CONTRIBUTION
|
|
// ------------------------
|
|
//
|
|
// Your contribution to SoftEther VPN Project is much appreciated.
|
|
// Please send patches to us through GitHub.
|
|
// Read the SoftEther VPN Patch Acceptance Policy in advance:
|
|
// http://www.softether.org/5-download/src/9.patch
|
|
//
|
|
//
|
|
// DEAR SECURITY EXPERTS
|
|
// ---------------------
|
|
//
|
|
// If you find a bug or a security vulnerability please kindly inform us
|
|
// about the problem immediately so that we can fix the security problem
|
|
// to protect a lot of users around the world as soon as possible.
|
|
//
|
|
// Our e-mail address for security reports is:
|
|
// softether-vpn-security [at] softether.org
|
|
//
|
|
// Please note that the above e-mail address is not a technical support
|
|
// inquiry address. If you need technical assistance, please visit
|
|
// http://www.softether.org/ and ask your question on the users forum.
|
|
//
|
|
// Thank you for your cooperation.
|
|
//
|
|
//
|
|
// NO MEMORY OR RESOURCE LEAKS
|
|
// ---------------------------
|
|
//
|
|
// The memory-leaks and resource-leaks verification under the stress
|
|
// test has been passed before release this source code.
|
|
|
|
|
|
// Account.h
|
|
// Header of Account.c
|
|
|
|
#ifndef ACCOUNT_H
|
|
#define ACCOUNT_H
|
|
|
|
// Policy item
|
|
struct POLICY_ITEM
|
|
{
|
|
UINT Index;
|
|
bool TypeInt;
|
|
bool AllowZero;
|
|
UINT MinValue;
|
|
UINT MaxValue;
|
|
UINT DefaultValue;
|
|
char *FormatStr;
|
|
};
|
|
|
|
// Policy
|
|
struct POLICY
|
|
{
|
|
// For Ver 2.0
|
|
bool Access; // Grant access
|
|
bool DHCPFilter; // Filter DHCP packets (IPv4)
|
|
bool DHCPNoServer; // Prohibit the behavior of the DHCP server (IPv4)
|
|
bool DHCPForce; // Force DHCP-assigned IP address (IPv4)
|
|
bool NoBridge; // Prohibit the bridge behavior
|
|
bool NoRouting; // Prohibit the router behavior (IPv4)
|
|
bool CheckMac; // Prohibit the duplicate MAC address
|
|
bool CheckIP; // Prohibit a duplicate IP address (IPv4)
|
|
bool ArpDhcpOnly; // Prohibit the broadcast other than ARP, DHCP, ICMPv6
|
|
bool PrivacyFilter; // Privacy filter mode
|
|
bool NoServer; // Prohibit to operate as a TCP/IP server (IPv4)
|
|
bool NoBroadcastLimiter; // Not to limit the number of broadcast
|
|
bool MonitorPort; // Allow monitoring mode
|
|
UINT MaxConnection; // Maximum number of TCP connections
|
|
UINT TimeOut; // Communication time-out period
|
|
UINT MaxMac; // Maximum number of MAC address
|
|
UINT MaxIP; // Maximum number of IP address (IPv4)
|
|
UINT MaxUpload; // Upload bandwidth
|
|
UINT MaxDownload; // Download bandwidth
|
|
bool FixPassword; // User can not change password
|
|
UINT MultiLogins; // Multiple logins limit
|
|
bool NoQoS; // Prohibit the use of VoIP / QoS features
|
|
|
|
// For Ver 3.0
|
|
bool RSandRAFilter; // Filter the Router Solicitation / Advertising packet (IPv6)
|
|
bool RAFilter; // Filter the router advertisement packet (IPv6)
|
|
bool DHCPv6Filter; // Filter DHCP packets (IPv6)
|
|
bool DHCPv6NoServer; // Prohibit the behavior of the DHCP server (IPv6)
|
|
bool NoRoutingV6; // Prohibit the router behavior (IPv6)
|
|
bool CheckIPv6; // Prohibit the duplicate IP address (IPv6)
|
|
bool NoServerV6; // Prohibit to operate as a TCP/IP server (IPv6)
|
|
UINT MaxIPv6; // Maximum number of IP address (IPv6)
|
|
bool NoSavePassword; // Prohibit to save the password in the VPN Client
|
|
UINT AutoDisconnect; // Disconnect the VPN Client automatically at a certain period of time
|
|
bool FilterIPv4; // Filter all IPv4 packets
|
|
bool FilterIPv6; // Filter all IPv6 packets
|
|
bool FilterNonIP; // Filter all non-IP packets
|
|
bool NoIPv6DefaultRouterInRA; // Delete the default router specification from the IPv6 router advertisement
|
|
bool NoIPv6DefaultRouterInRAWhenIPv6; // Delete the default router specification from the IPv6 router advertisement (Enable IPv6 connection)
|
|
UINT VLanId; // Specify the VLAN ID
|
|
|
|
bool Ver3; // Whether version 3.0
|
|
};
|
|
|
|
// Group
|
|
struct USERGROUP
|
|
{
|
|
LOCK *lock; // Lock
|
|
REF *ref; // Reference counter
|
|
char *Name; // Group name
|
|
wchar_t *RealName; // Display name
|
|
wchar_t *Note; // Note
|
|
POLICY *Policy; // Policy
|
|
TRAFFIC *Traffic; // Traffic data
|
|
};
|
|
|
|
// User
|
|
struct USER
|
|
{
|
|
LOCK *lock; // Lock
|
|
REF *ref; // Reference counter
|
|
char *Name; // User name
|
|
wchar_t *RealName; // Real name
|
|
wchar_t *Note; // Note
|
|
char *GroupName; // Group name
|
|
USERGROUP *Group; // Group
|
|
UINT AuthType; // Authentication type
|
|
void *AuthData; // Authentication data
|
|
UINT64 CreatedTime; // Creation date and time
|
|
UINT64 UpdatedTime; // Updating date
|
|
UINT64 ExpireTime; // Expiration date
|
|
UINT64 LastLoginTime; // Last login time
|
|
UINT NumLogin; // Total number of logins
|
|
POLICY *Policy; // Policy
|
|
TRAFFIC *Traffic; // Traffic data
|
|
};
|
|
|
|
// Password authentication data
|
|
struct AUTHPASSWORD
|
|
{
|
|
UCHAR HashedKey[SHA1_SIZE]; // Hashed passwords
|
|
UCHAR NtLmSecureHash[MD5_SIZE]; // Encrypted password for the NTLM
|
|
};
|
|
|
|
// User certificate authentication data
|
|
struct AUTHUSERCERT
|
|
{
|
|
X *UserX; // X509 certificate for the user
|
|
};
|
|
|
|
// Root certification authority authentication data
|
|
struct AUTHROOTCERT
|
|
{
|
|
X_SERIAL *Serial; // Serial number
|
|
wchar_t *CommonName; // CommonName
|
|
};
|
|
|
|
// Radius authentication data
|
|
struct AUTHRADIUS
|
|
{
|
|
wchar_t *RadiusUsername; // User name in the Radius
|
|
};
|
|
|
|
// Windows NT authentication data
|
|
struct AUTHNT
|
|
{
|
|
wchar_t *NtUsername; // User name on NT
|
|
};
|
|
|
|
|
|
|
|
// Macro
|
|
#define POLICY_CURRENT_VERSION 3
|
|
#define NUM_POLICY_ITEM ((sizeof(POLICY) / sizeof(UINT)) - 1)
|
|
#define NUM_POLICY_ITEM_FOR_VER2 22
|
|
#define NUM_POLICY_ITEM_FOR_VER3 38
|
|
|
|
#define IS_POLICY_FOR_VER2(index) (((index) >= 0) && ((index) < NUM_POLICY_ITEM_FOR_VER2))
|
|
#define IS_POLICY_FOR_VER3(index) (((index) >= 0) && ((index) < NUM_POLICY_ITEM_FOR_VER3))
|
|
|
|
#define IS_POLICY_FOR_CURRENT_VER(index, ver) ((ver) >= 3 ? IS_POLICY_FOR_VER3(index) : IS_POLICY_FOR_VER2(index))
|
|
|
|
#define POLICY_BOOL(p, i) (((bool *)(p))[(i)])
|
|
#define POLICY_INT(p, i) (((UINT *)(p))[(i)])
|
|
|
|
extern POLICY_ITEM policy_item[];
|
|
|
|
|
|
|
|
|
|
// Function prototype
|
|
int CompareUserName(void *p1, void *p2);
|
|
int CompareGroupName(void *p1, void *p2);
|
|
void AcLock(HUB *h);
|
|
void AcUnlock(HUB *h);
|
|
USERGROUP *NewGroup(char *name, wchar_t *realname, wchar_t *note);
|
|
void ReleaseGroup(USERGROUP *g);
|
|
void CleanupGroup(USERGROUP *g);
|
|
USER *NewUser(char *name, wchar_t *realname, wchar_t *note, UINT authtype, void *authdata);
|
|
void ReleaseUser(USER *u);
|
|
void CleanupUser(USER *u);
|
|
void FreeAuthData(UINT authtype, void *authdata);
|
|
bool AcAddUser(HUB *h, USER *u);
|
|
bool AcAddGroup(HUB *h, USERGROUP *g);
|
|
USER *AcGetUser(HUB *h, char *name);
|
|
USERGROUP *AcGetGroup(HUB *h, char *name);
|
|
bool AcIsUser(HUB *h, char *name);
|
|
bool AcIsGroup(HUB *h, char *name);
|
|
bool AcDeleteUser(HUB *h, char *name);
|
|
bool AcDeleteGroup(HUB *h, char *name);
|
|
void JoinUserToGroup(USER *u, USERGROUP *g);
|
|
void SetUserTraffic(USER *u, TRAFFIC *t);
|
|
void SetGroupTraffic(USERGROUP *g, TRAFFIC *t);
|
|
void AddUserTraffic(USER *u, TRAFFIC *diff);
|
|
void AddGroupTraffic(USERGROUP *g, TRAFFIC *diff);
|
|
void SetUserAuthData(USER *u, UINT authtype, void *authdata);
|
|
void *NewPasswordAuthData(char *username, char *password);
|
|
void *NewPasswordAuthDataRaw(UCHAR *hashed_password, UCHAR *ntlm_secure_hash);
|
|
void *NewUserCertAuthData(X *x);
|
|
void *NewRootCertAuthData(X_SERIAL *serial, wchar_t *common_name);
|
|
void *NewRadiusAuthData(wchar_t *username);
|
|
void *NewNTAuthData(wchar_t *username);
|
|
void HashPassword(void *dst, char *username, char *password);
|
|
POLICY *GetDefaultPolicy();
|
|
POLICY *ClonePolicy(POLICY *policy);
|
|
void SetUserPolicy(USER *u, POLICY *policy);
|
|
void OverwritePolicy(POLICY **target, POLICY *p);
|
|
POLICY *GetUserPolicy(USER *u);
|
|
void SetGroupPolicy(USERGROUP *g, POLICY *policy);
|
|
POLICY *GetGroupPolicy(USERGROUP *g);
|
|
wchar_t *GetPolicyTitle(UINT id);
|
|
wchar_t *GetPolicyDescription(UINT id);
|
|
bool IsUserName(char *name);
|
|
void *CopyAuthData(void *authdata, UINT authtype);
|
|
UINT PolicyNum();
|
|
bool PolicyIsSupportedForCascade(UINT i);
|
|
UINT PolicyStrToId(char *name);
|
|
char *PolicyIdToStr(UINT i);
|
|
POLICY_ITEM *GetPolicyItem(UINT id);
|
|
void GetPolicyValueRangeStr(wchar_t *str, UINT size, UINT id);
|
|
void FormatPolicyValue(wchar_t *str, UINT size, UINT id, UINT value);
|
|
char *NormalizePolicyName(char *name);
|
|
|
|
|
|
#endif // ACCOUNT_H
|
|
|
|
|