| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
what configuration options are appropriate. The operational mode dictates
the authentication method. They are defines as follows ...
Peer to Peer ( SSL/TLS )
Peer to Peer ( Shared Key )
Remote Access ( SSL/TLS )
Remote Access ( User Auth )
Remote Access ( SSL/TLS + User Auth )
Some of these modes allow for user authentication using passwords. We now
use the etc/inc/openvpn.auth-user.php file to facilitate this by checking
the username and password supplied by OpenVPN against our centralized user
database.
The Server and Client user interfaces have also been updated to support
TLS packet authentication. This is an additional security option that is
optional.
|
| |
|
|
|
|
|
|
| |
originates from a private network to a distant OpenVPN network. We don't
want to unconditionally hide all traffic behind the vpn interface address.
If a admin wants to do this manually, nothing is stopping them.
|
|
|
|
|
| |
directory creation moved to the rc script, the path name was changed from
/var/etc/openvpn_csc to /var/etc/openvpn-csc. Update the code to match.
|
|
|
|
|
|
|
| |
filter.inc file. We now specify the openvpn device name which is actually
an os managed group. OpenVPN tap instances are added or removed from this
group when OpenVPN configurations are created or destroyed. Portions of
this patch were written by Ermal.
|
| |
|
|
|
|
|
|
|
| |
navigate away from the initial page twice to get somewhere. Remove some
of the cruft that was no longer used. Don't unconditionally redirect a
user to their homepage if another url was specified pre-login. This will
allow admins to create bookmarks to specific pfsense webui pages.
|
|
|
|
|
|
|
| |
feature was confusing and offered little utility that I could see. If we
really need to provide serialized access to sections of the webui, IMO it
should be a global lock option and enabled or disabled manually and not a
privilege that is on all the time.
|
|
|
|
| |
matched correctly. Reported by Seth.
|
|
|
|
| |
Prevents Fatal parse error
|
|
|
|
| |
tos options from being set correctly in configuration files.
|
| |
|
|
|
|
| |
we need an explicit call to write_config() to ensure the data is saved.
|
| |
|
|
|
|
|
| |
This handles the multiple openvpn interfaces retuned from the interface list.
This should probably review after the openvpn work
|
|
|
|
|
| |
Make sure our tmp has the correct permission so we can trigger filter
reloads.
|
|
|
|
| |
Maybe failover works now :)
|
|
|
|
|
| |
initialized by the rc scripts. I hope this will make the initial boot
process more pleasant during install. If not, I will revert this commit.
|
| |
|
|
|
|
|
| |
While in globals.inc, remove the easyrsa path and do some whitespace
cleanup.
|
|
|
|
| |
Noticed-by: cmb
|
| |
|
|
|
|
| |
now created during the bootup process.
|
|
|
|
| |
* Use @ to send error to /dev/null
|
|
|
|
| |
The other part is already done on pppoe_up script in /usr/local/sbin.
|
| |
|
| |
|
| |
|
|
|
|
| |
NOTE: that the function link_int_to_bridge_interface needs a friendly interface as a parameter now i.e. "wan/lan/optX".
|
| |
|
|
|
|
|
| |
override existed. A space was omitted in the listtags array which was
causing the openvpn-csc tag to be merged with the following field.
|
|
|
|
| |
arrays before treating them as such.
|
| |
|
|
|
|
|
| |
* Add sethaltonerror()
* Cleanup error on text handling
|
| |
|
| |
|
|
|
|
|
| |
it is not generated each time on embedded systems. Problem reported by
Scott.
|
|
|
|
| |
http://forum.pfsense.org/index.php/topic,10581.0.html
|
|
|
|
| |
last revision.
|
|
|
|
| |
fixes the long standing bug of my voip phones being broken.
|
| |
|
|
|
|
|
| |
More work pending, this seems to generate proper configs
needs much more testing though
|
|
|
|
|
| |
of command line utilities for encypting and decrypting the files format
is available from the tools/config-crypto directory.
|
|
|
|
|
|
|
|
| |
a tcp management port option to each OpenVPN server. Instead of rooting
through the OpenVPN logs once a minute for status updates, we now submit a
request to the management port to obtain informaiton. We probably need to
add a pf rule to prevent management ports from being accessed by unwanted
processes.
|
|
|
|
|
|
|
|
|
|
|
| |
on data that wasn't necessarily a valid array.
Modify the OpenVPN code to stop passing the array index around and then
immediately obtaining a reference to the array entry. We already have a
reference to the data, just pass it instead. Also add some check to make
certain tap configuration steps more conditional. Make sure we remove
configuration and pid files when they are no longer required. Fix a few
other OpenVPN related bugs.
|
|
|
|
|
| |
Add functions and interface code to handle local port conflict detection
and resolution.
|
| |
|
|
|
|
|
|
|
|
|
|
| |
this information in the configuration as its not specific to the server.
It only contains the parameters ( a safe large prime number ) that is
used during a DH key exchange. Instead, we now use a system wide dh file
that is generated when the /var/etc/openvpn directory is setup. This
shaves 10 to 30 seconds off of the server config creation process. Also
correct a bug in the hack I added to work around carp related issues
that prevented filter re-configuration from working properly.
|
|
|
|
|
|
|
|
|
|
| |
not use the pkg system and the configuration has been migrated to an
openvpn prefix. The centralized user and certificate manager is now used
to support the openvpn configurations. Most of the files removed in this
commit were not being referenced.
This commit also splits out the certificate management components into a
new system menu item.
|
| |
|