Thank you,

Yes, I understand.

If I narrow this to "feature requests", basically we say that:
1. we want direct tun management to the management interface.
2. we want to have some logic when openvpn socket is opened.
3. Pass pre opened tun.

(1)  - direct tun management to the management interface

Until now I thought it should go to the plugin interface as in any
privilege separation model, the user will not be able to do any change
in networking.

But... I think it will be fairly simple to do so, with the new tun
interface[1] I am working of.

It introduces a tun engine, with a standard interface, it will be easy
to support several tun engines at same time selecting one by
configuration.

So we can have tun-engine-management.c to delegate all to the
management interface. It can be used if management interface is tcp as
well...

For example the linux tune engine[2] is very simple.

A management engine can be stacked overriding the tun_ifconfig, tun_init*.

BUT: I still think that currently it will be much simpler to do this
using iproute2 wrapper that uses the android API.

For (2) - custom socket creation

I still think that the plugin API is the right approach, you simply
implement openvpn-plugin-android, that opens the socket for the
openvpn process. It is not more complex than passing this via the
management interface, and can be used if management interface is not
unix domain socket...

(3) pre opened tun

This should be simple, as fd can be created and inherited by the
openvpn process.

What do you think?

Alon


[1] https://github.com/alonbl/openvpn/tree/tun
[2] 
https://github.com/alonbl/openvpn/blob/0205f085e8b77c6a6d49c38f20f9e49f41154f61/src/openvpn/tun-engine-linux.c

On Thu, May 10, 2012 at 10:00 AM, Adriaan de Jong <dej...@fox-it.com> wrote:
> That would be another option. In the model we were using (which might be 
> different), the order is as follows:
>
> 1. openvpn is started
> 2. openvpn opens a socket to the remote host
> 2. openvpn establishes the control channel across this socket
> 3. openvpn passes socket and control channel data (IP, routing, DNS, etc) 
> through the management interface to the android app
> 4. android app passes these to the VPNService and receives an opened tun
> 5. android app passes the tun to openvpn
> 6. openvpn proceeds as usual
>
> To answer your follow up:
> There's no need for the extra complexity of a plugin here. The management 
> interface is a great tool, completely separating OpenVPN from its management 
> interface.
>
> Adriaan
>
>> -----Original Message-----
>> From: Alon Bar-Lev [mailto:alon.bar...@gmail.com]
>> Sent: donderdag 10 mei 2012 8:49
>> To: Adriaan de Jong
>> Cc: Arne Schwabe; openvpn-devel@lists.sourceforge.net
>> Subject: Re: [Openvpn-devel] [PATCH] Openvpn for Android 4.0 Changeset
>>
>> On Thu, May 10, 2012 at 9:35 AM, Adriaan de Jong <dej...@fox-it.com>
>> wrote:
>> >> -----Original Message-----
>> >> From: Alon Bar-Lev [mailto:alon.bar...@gmail.com]
>> >> Sent: donderdag 10 mei 2012 2:10
>> >> To: Arne Schwabe
>> >> Cc: openvpn-devel@lists.sourceforge.net
>> >> Subject: Re: [Openvpn-devel] [PATCH] Openvpn for Android 4.0
>> >> Changeset
>> >>
>> >> On Thu, May 10, 2012 at 3:01 AM, Arne Schwabe <a...@rfc2549.org>
>> wrote:
>> >> > Am 10.05.12 01:39, schrieb Alon Bar-Lev:
>> >> >> On Thu, May 10, 2012 at 2:24 AM, Arne Schwabe <a...@rfc2549.org>
>> >> wrote:
>> >> >>>> I need a better description of the tun process... so far I did
>> >> >>>> not understand why you cannot use standard approach of creating
>> >> >>>> persistent tun with non root access and then use the iproute2
>> >> >>>> wrapper with suid or sudo to setup its configuration.
>> >> >>>>
>> >> >>>> Alon.
>> >> >>> I have no root access on the telephone. But Android 4.0 provides
>> >> >>> an API for VPNs
>> >> >>>
>> >>
>> (http://developer.android.com/reference/android/net/VpnService.html).
>> >> >>> Looking at my method at the method that opens the tun device to
>> >> >>> passed over managment socket might also give an idea how it is
>> >> >>> done
>> >> in Android:
>> >> >>> http://code.google.com/p/ics-
>> >> openvpn/source/browse/src/de/blinkt/ope
>> >> >>> nvpn/OpenVpnService.java#220
>> >> >>>
>> >> >>> Arne
>> >> >> I understand.
>> >> >>
>> >> >> But... let's discuss another approach...
>> >> >>
>> >> >> Implement android-ip program that uses the Android API, and put
>> >> >> "iproute2 android-ip" in configuration.
>> >> >>
>> >> >> Now, the interface of the program is similar to what iproute is
>> >> >> receiving, but instead of netlink it does android API.
>> >> >>
>> >> >> So actually you can receive requests from openvpn via this
>> >> >> interface without modifying openvpn...
>> >> >>
>> >> >> Maybe I am missing something, please bear with me.
>> >> >>
>> >> > The android API in this case is Java.  There is no C API that can
>> >> > be used. Opening the tun device requires passing the fd of the tun
>> >> device
>> >> > to openvpn. Also the for sockets that should not be routed over
>> the
>> >> > tun device the Java API provides a protect(int fd) API. That means
>> >> the
>> >> > socket from openvpn needs to passed to the Java GUI to call the
>> >> > protect method.
>> >> >
>> >> > I see 2 way to accomplish this:
>> >> >
>> >> > - Using the the java native interface to directly call into java
>> >> > from c and vice versa. This worked but since openvpn was not
>> really
>> >> > usable as a library I got other problem (the google code
>> repository
>> >> > has earlier version of the code which uses this.)
>> >> > - Keep openvpn as seperate process and pass the fd over a unix
>> >> socket.
>> >> > (One of the more obscure Unix apis)
>> >> >
>> >> > The requirement that all information as ip addresses, dns and
>> >> > routes must be available means that the persist-tun device cannot
>> >> > be used if I also want to be to use pull.
>> >> >
>> >> > Calling an external programs could eliminate the "ROUTE" , "DNS",
>> >> > "DOMAIN" , "IFCONFIG" management commands I have introduced. But
>> >> > the patched implements also two fd passing managment commands
>> >> > "PROTECT-
>> >> FD"
>> >> > (passes fd from openvpn to GUI) and "OPENTUN" (passes fd from GUI
>> >> > to openvpn).
>> >> >
>> >> > Arne
>> >> >
>> >>
>> >> Great, so we can first shrink the patch!
>> >>
>> >> So two features you implied...
>> >>
>> >> 1. pass pre-opened tun device
>> >>
>> >> are you sure there are no alternatives to this? how does the java
>> api
>> >> receives the handle anyway?
>> >>
>> >
>> > I agree with Arne's approach of letting the tun driver be passed
>> through the management interface. This is the way things work in
>> Android VPNService land. I still need to go through the code though.
>> >
>> >> 2. the "protect" API.
>> >>
>> >> Can you please explain more about the functionality of the "protect"
>> >> API? why is this actually required? maybe there are alternatives.
>> >>
>> >
>> > About the protect API: The VPNService API routes all traffic through
>> the VPN by default. The socket used by OpenVPN needs to be "protected"
>> from this, using a special function call. Therefore, Android Java needs
>> this call.
>>
>> Thanks!
>>
>> So why can't we simply open the socket at the UI as well? similar to
>> the tun?
>>
>> Alon.

Reply via email to