summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2013-06-11ipoe: introduced 'gw-ip-address=x.x.x.x/mask' option to use it as server ↵Kozlov Dmitry
address and mask if radius can assign only client address
2013-06-07ppp: handle LCP DiscardReqKozlov Dmitry
2013-06-06doc: Fix a few rendering issues in manpageGuillaume Nault
Fix indentation of sections 'log' and 'ip-pool'. Remove space before comma in section 'chap-secret/username-hash'. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-06-06l2tp: Add src/dst port selection for creating tunnelsGuillaume Nault
Add two options to the 'l2tp create tunnel' command: * 'peer-port' allows to specify the destination port of the SCCRQ packet (instead of standard port 1701). This allows to connect to a peer listening on a non standard port. * 'host-port' allows to specify the source port of the SCCRQ packet (instead of an arbitrary free port). Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-06-06l2tp: Optionally deactivate ephemeral portsGuillaume Nault
Define option 'use-ephemeral-ports' for accel-ppp.conf. When set to 0, this option deactivates the use of ephemeral ports. That is, accel-ppp won't choose an arbitrary source port when replying to a tunnel establishment request, but will use the SCCRQ's destination port instead. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-06-06l2tp: Revert to automatic source port selectionGuillaume Nault
Commit 05bb6859 "pptp,l2tp: bind to port options" assigns fixed source port for every L2TP tunnel. This removes support for ephemeral ports (as described in RFC 2661 section 8.1) and statically sets the source port when accel-ppp initiates tunnel connections. This patch reverts to the previous behaviour (automatic source port selection) while keeping the ability to listen for incoming connections on a port different from 1701 (which was the purpose of commit 05bb6859). Support for disabling usage of ephemeral ports and for manual port selection upon tunnel creation will be added later on by means of configuration options. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-06-06l2tp: Define conf_port as staticGuillaume Nault
This variable doesn't need to be visible outside of its compilation unit. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-06-04ipoe: check opt82 changeKozlov Dmitry
2013-06-04use /var/lib/accel-ppp instead /var/run/accel-pppKozlov Dmitry
2013-06-04Merge branch 'master' of ssh://git.code.sf.net/p/accel-ppp/codeKozlov Dmitry
2013-05-31ipoe: change level of session start/finish messagesKozlov Dmitry
2013-05-31pptp,l2tp: bind to port optionsKozlov Dmitry
2013-05-23cli: fixed 'restart' command (do soft restart, i.e. terminate sessions by ↵Dmitry Kozlov
default)
2013-05-23shaper: fixed 'shaper restore' commandDmitry Kozlov
2013-05-23chap-secrets: add netmask supportDmitry Kozlov
2013-05-23ipoe: implemented nat option (default 0)Dmitry Kozlov
2013-05-01l2tp: Fix PPP channel nameGuillaume Nault
Allocate space for the terminationg null byte, to avoid truncating PPP channel name. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-05-01initscript: Fix LSB runlevels and ACCEL_PPPD_OPTS checkGuillaume Nault
* Stop daemon upon halt and reboot * Protect the ACCEL_PPPD_OPTS variable in the existence check to allow space charaters. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-04-26ipoe: fix dhcp release handlingKozlov Dmitry
2013-04-25ipoe: do not control shared interfacesKozlov Dmitry
2013-04-25ipoe: detect giaddr if not specifiedKozlov Dmitry
2013-04-22ipoe: add relay port to config (relay=addr[:port])Dmitry Kozlov
2013-04-22ipoe: use interface's ifindex as Nas-PortDmitry Kozlov
2013-04-22l2tp: Check for connection limits upon session creation requestsGuillaume Nault
Since multiple sessions may be created in each tunnel, a client may bypass the connlimit module by creating many sessions in an existing tunnel (connlimit is only used upon reception of SCCRQ messages). This patch adds connlimit checks when handling session creation requests (ICRQ and OCRQ) so that connection limits get enforced in every case. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-04-22doc: Fix typo in accel-ppp.conf(5) (default-realm)Guillaume Nault
Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-04-22triton: Automatic setting of thread-count parameterGuillaume Nault
Use the number of available processors to set the thread-count option if not given in configuration file. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-04-22shaper: install shaper in SES_PRE_UPDmitry Kozlov
2013-04-22pppd_compat: create radattr file in SES_PRE_UPDmitry Kozlov
2013-04-22ipoe: start dhcp socket on ipoe interfaces for unicast dhcp messagesDmitry Kozlov
2013-04-19ipoe: fixed start=dhcpv4,shared=1 modeKozlov Dmitry
2013-04-19Merge branch 'master' of ssh://git.code.sf.net/p/accel-ppp/codeKozlov Dmitry
2013-04-19ipoe: accept packets only from specified interfacesKozlov Dmitry
2013-04-19ipoe: fix local-net handlingKozlov Dmitry
2013-04-17l2tp: Handle 64 bits attributesGuillaume Nault
Define l2tp_packet_add_int64() to create attributes of 64 bits long integers. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-04-17l2tp: Use random length Challenge AVPGuillaume Nault
Set Challenge attribute using a random length so that its size can't be guessed when hide-avps is on. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-04-17l2tp: Full hidden AVPs supportGuillaume Nault
Add option "hide-avps" in the "l2tp" section for hiding attributes sent to peer. This same option is also made available on accel-ppp's command line interface: accel-ppp# tunnel create tunnel peer-addr 192.0.2.1 hide-avps 1 Attribute hiding is performed upon attribute creation (in the l2tp_packet_add_*() functions family) rather than upon packet sending. This avoid running the cipher for every retransmission; the counterpart is that l2tp_packet_print() can't dump original attributes of hidden AVPs. Currently, only one random vector is used for all hidden AVPs in a packet. This is easily extensible though, as the 'last_RV' field in struct l2tp_packet_t may be overridden to use new vectors for next AVPs. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-04-17utils: Add random buffer generation functionGuillaume Nault
Define and export the u_randbuf() function that fills a buffer with random data. Convert L2TP's challenge generation code for using it. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-04-17l2tp: Handle incoming hidden AVPsGuillaume Nault
Decode hidden AVPs on reception. This is transparent for functions in l2tp.c (except for the presence of the Random Vector AVP). Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-04-17l2tp: Store length of conf_secretGuillaume Nault
Secret length is used quite often especially when handling hidden AVPs. Store conf_secret length together with conf_secret to avoid calling strlen(conf_secret) every time. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-04-17l2tp: Fix endianness of 64 bits AVPs (reception)Guillaume Nault
Received attributes of type ATTR_TYPE_INT64 are transferred to upper layer in network byte order while any other integer type uses host byte order. This patch converts int64 values to host byte order so that they can be used like other integer types. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-04-17l2tp: Fix double string AVP copyGuillaume Nault
When adding a string AVP to an L2TP packet, the attribute value is allocated and set using strdup(). There's no need to memcpy() it again afterwards. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-04-15ipoe: fixed ses->client_id and ses->relay_agent initializationDmitry Kozlov
2013-04-11radius: implemented default-realm optionKozlov Dmitry
2013-03-28l2tp: Add general packet processing log messagesGuillaume Nault
Use "info2" log messages to inform about packets sent or processed. For HELLO and ZLB messages, the log level is set to "debug" as these are transmitted quite often and don't bring much information (this same logging policy is used for logging packets when conf_verbose is on). Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-03-28l2tp: Log packet retransmission informationGuillaume Nault
Log message for any packet retransmission action using log_tunnel() and level "info2". Remove l2tp_conn_log() since it is no longer used. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-03-28l2tp: Log all discarded messages in the same wayGuillaume Nault
Add a log message (warn level) for any discarded message type. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-03-28l2tp: Log session establishment/disconnection informationGuillaume Nault
Use info1 messages to log information about main session establishment and disconnection steps. These messages are: * establishment requests and their origin (CLI, ICRQ or OCRQ) * establishment confirmation (when session is really established) * PPP establishment * disconnection requests and their reason Other information of interest use info2. These include: * Peer Session ID setting * Session internal structure freeing Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-03-28l2tp: Log tunnel establishment/disconnection informationGuillaume Nault
Use info1 messages to log information about main tunnel establishment and disconnection steps. These messages are: * establishment requests and their origin (CLI or SCCRQ) * establishment confirmation (when tunnel is really established) * disconnection requests and their reason Other information of interest use info2. These include: * Peer port update * Peer Tunnel ID setting * Tunnel internal structure freeing Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-03-28l2tp: Use consistent packet logging policyGuillaume Nault
Adapt packet logging policy to make it consistent across L2TP packet handling functions: * Don't log messages if conf_verbose is off. * Log HELLO and ZLB messages with log_debug and use log_info2 for any other message type. * Log retransmissions with log_info2, no matter the message type. * Log outgoing messages right before sending them. * Log incoming messages right before analysing their message type. This unifies the way l2tp_conn_read() and l2tp_udp_read() log incoming messages. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
2013-03-28l2tp: Handle WEN messagesGuillaume Nault
Implement minimal WEN messages processing, so that they get properly acknowledged. Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>