need help on connman 0.63 configuration error
When trying to compile connam-0.63, encountered configuration error: Xtables library is required. What's that, how to work around this error? Best Regards Simin ___ connman mailing list connman@connman.net http://lists.connman.net/listinfo/connman
Re: need help on connman 0.63 configuration error
On 11/17/2010 09:10 AM, Xiong, Si Min wrote: When trying to compile connam-0.63, encountered configuration error: Xtables library is required. What's that, how to work around this error? You need a newer iptables version. Are you on MeeGo? Last time I checked they did not have a version 1.4.1. I use the 1.4.9 version from Fedora. -Rolf -- Rolf Offermanns rofferma...@sysgo.com SYSGO AG Tel.: +49-6136-9948-0 Am Pfaffenstein 14 Fax: +49-6136-9948-10 55270 Klein-Winternheim http://www.sysgo.com Handelsregister: HRB Mainz 90 HRB 8066 Vorstand: Michael Tiedemann Aufsichtsratsvorsitzender: Juergen Bullacher USt(VAT)-Id-Nr.: DE 149062328 ___ connman mailing list connman@connman.net http://lists.connman.net/listinfo/connman
[PATCH v0 2/2] openvpn: add static key setup support in connect-vpn
From: Daniel Wagner daniel.wag...@bmw-carit.de --- test/connect-vpn | 26 ++ 1 files changed, 18 insertions(+), 8 deletions(-) diff --git a/test/connect-vpn b/test/connect-vpn index 1575804..757491e 100755 --- a/test/connect-vpn +++ b/test/connect-vpn @@ -8,7 +8,8 @@ if (len(sys.argv) 4): print type: openconnect print name host domain cookie [cafile] print type: openvpn - print name host domain cafile certfile keyfile + print TLS: name host domain cafile certfile keyfile + print Static Key: name host domain static_key ifconfig sys.exit(1) bus = dbus.SystemBus() @@ -33,13 +34,22 @@ if sys.argv[1] == openconnect: VPN.Domain: sys.argv[4], OpenConnect.Cookie: sys.argv[5]})) elif sys.argv[1] == openvpn: - path = manager.ConnectProvider(({ Type: openvpn, - Name: sys.argv[2], - Host: sys.argv[3], - VPN.Domain: sys.argv[4], - OpenVPN.CACert: sys.argv[5], - OpenVPN.Cert: sys.argv[6], - OpenVPN.Key: sys.argv[7]})) + if (len(sys.argv) 6): + path = manager.ConnectProvider(({ Type: openvpn, + Name: sys.argv[2], + Host: sys.argv[3], + VPN.Domain: sys.argv[4], + OpenVPN.CACert: sys.argv[5], + OpenVPN.Cert: sys.argv[6], + OpenVPN.Key: sys.argv[7]})) + else if (len(sys.argv) 5): + path = manager.ConnectProvider(({ Type: openvpn, + Name: sys.argv[2], + Host: sys.argv[3], + VPN.Domain: sys.argv[4], + OpenVPN.StaticKey: sys.argv[5], + OpenVPN.Ifconfig: sys.argv[6]})) + else: print Unknown VPN type sys.exit(1) -- 1.7.3.2 ___ connman mailing list connman@connman.net http://lists.connman.net/listinfo/connman
[PATCH v0 1/2] openvpn: add suport for static key setup
From: Daniel Wagner daniel.wag...@bmw-carit.de --- plugins/openvpn.c | 25 +++-- 1 files changed, 19 insertions(+), 6 deletions(-) diff --git a/plugins/openvpn.c b/plugins/openvpn.c index 0da6c74..ed06b5d 100644 --- a/plugins/openvpn.c +++ b/plugins/openvpn.c @@ -130,6 +130,7 @@ static int ov_connect(struct connman_provider *provider, struct connman_task *task, const char *if_name) { const char *vpnhost, *cafile, *mtu, *certfile, *keyfile; + const char *static_key, *ifconfig; int err, fd; vpnhost = connman_provider_get_string(provider, Host); @@ -141,6 +142,10 @@ static int ov_connect(struct connman_provider *provider, cafile = connman_provider_get_string(provider, OpenVPN.CACert); certfile = connman_provider_get_string(provider, OpenVPN.Cert); keyfile = connman_provider_get_string(provider, OpenVPN.Key); + + static_key = connman_provider_get_string(provider, OpenVPN.StaticKey); + ifconfig = connman_provider_get_string(provider, OpenVPN.Ifconfig); + mtu = connman_provider_get_string(provider, VPN.MTU); if (mtu) @@ -188,21 +193,29 @@ static int ov_connect(struct connman_provider *provider, */ connman_task_add_argument(task, --ping-restart, 0); - connman_task_add_argument(task, --client, NULL); + if (cafile != NULL certfile != NULL keyfile != NULL) { + /* connection type: TLS */ + connman_task_add_argument(task, --client, NULL); - if (cafile) { connman_task_add_argument(task, --ca, (char *)cafile); - } - if (certfile) { connman_task_add_argument(task, --cert, (char *)certfile); - } - if (keyfile) { connman_task_add_argument(task, --key, (char *)keyfile); + } else if (static_key != NULL ifconfig != NULL) { + /* connection type: static key */ + connman_task_add_argument(task, --secret, + (char *)static_key); + + connman_task_add_argument(task, --ifconfig, + (char *)ifconfig); + } else { + connman_error(Unknown connection type configuration + (either tls or static key needed)); + return -EINVAL; } fd = fileno(stderr); -- 1.7.3.2 ___ connman mailing list connman@connman.net http://lists.connman.net/listinfo/connman
Re: Add OpenVPN support
Hi Jeff, On Wed, Nov 17, 2010 at 01:58:26PM +0800, Zheng, Jeff wrote: How can I use connect-vpn script? I can connect to a point to point server with: openvpn --config config The content of config is: remote xfzheng.sh.intel.com dev tun ifconfig 10.8.0.2 10.8.0.1 secret static.key Currently the plugin can handly only the tls setup. In order to support the static key mode there is need for some more openvpn argument handling. In this config file I don't see cafile and certfile that connect-vpn needs So I ignore these two parameters in script but it still complains: # connect-vpn openvpn myvpn xfzheng.sh.intel.com mydomain.com 1 1 static.key Yeah, that wont work right now. First the script needs get smarter and then the key has to passed in the provider and the openvpn plugin has to pass this to the openvpn argument list. Can you give the patches I'll append to this mail a try? Only compiled, not really tested. I think the 'ifconfig' argument is not really working since it needs to arguments. daniel ___ connman mailing list connman@connman.net http://lists.connman.net/listinfo/connman
Re: Add OpenVPN support
Can you give the patches I'll append to this mail a try? Only compiled, not really tested. I think the 'ifconfig' argument is not really working since it needs to arguments. ... it needs two arguments. ___ connman mailing list connman@connman.net http://lists.connman.net/listinfo/connman
Re: [PATCH 2/2] add zeroconf-lib support
Hi Julien, On Wed, Nov 17, 2010 at 10:24:37AM +, Julien Massot wrote: I also always thought of the link local configuration highly integrated into the DHCP support. Do you think that i have to use the structure GDHCPClient? Yes, that would be better. Meaning that the DHCP client falls back to link local in case it can not retrieve a valid lease. Should we really bother with link local only network configurations? Do you mean that the link local negociation should be launch on each dhcp fail ? That would make sense, yes. And that should be done by the GDHCPClient. If we later see a need for cases where one wants LL only or no LL at all, we can extend the GDHCP types to support that. Apologies for not having reviewed your patches earlier. I should be able to do that by tomorrow or Friday. Cheers, Samuel. It's what we want to do for our own need. Regards Marcel ___ connman mailing list connman@connman.net http://lists.connman.net/listinfo/connman Regards, -- Massot Julien Operating System engineer Aldebaran Robotics +33 1 77 37 17 60 ___ connman mailing list connman@connman.net http://lists.connman.net/listinfo/connman -- Intel Open Source Technology Centre http://oss.intel.com/ ___ connman mailing list connman@connman.net http://lists.connman.net/listinfo/connman
Re: building connman-0.63 fails against 2.6.37-rc1 headers
Hi Samuel, Am 16.11.2010 15:09, schrieb Samuel Ortiz: It should be fixed now. thanks, its fixed :-) greetings Stephan -- ### OpenELEC.tv ### The free and open Mediacenter Distribution 4 you http://www.openelec.tv ___ connman mailing list connman@connman.net http://lists.connman.net/listinfo/connman
Re: [PATCH 0/3] Add more support for proxy internal.
Hi Mohamed, I still needed more information about srt/proxy.c so I hope the discussion of these patch will illustrate missing info. *I still dont know why service is needed in struct connman_proxy_driver { const char *name; int priority; int (*request_lookup) (struct connman_service *service, const char *url); void (*cancel_lookup) (struct connman_service *service, const char *url); }; specially the caller never pass a service when call for proxy request. you can have multiple active services which will map to different active interfaces in your system. And you need to test for a proxy based on what system you wanna use. So for example you have an active 3G connection and consider switching to a WiFi connection. 3G stays active and the default, then you connect to your WiFi, but you have to run the portal check/WISPr on your WiFi connection. And for that you need the proxy for a not yet default service. Since if it fails, we can not make WiFi default, since that would mean we loose our Internet connection. Regards Marcel ___ connman mailing list connman@connman.net http://lists.connman.net/listinfo/connman
RE: Add OpenVPN support
Hi Daniel, Do you mean compile with patch [PATCH v0 1/2] openvpn: add suport for static key setup? compile passed. But I still failed with SSL/TLS (not with the patch): # connect-vpn openvpn openvpn xfzheng.sh.intel.com sh.intel.com /root/.openvpn/ca.crt /root/.openvpn/client1.crt /root/.openvpn/client1.key sys.argv[7] is /root/.openvpn/client1.key Traceback (most recent call last): File /usr/lib/connman/test/connect-vpn, line 42, in module OpenVPN.Key: sys.argv[7]})) File /usr/lib/python2.6/site-packages/dbus/proxies.py, line 68, in __call__ return self._proxy_method(*args, **keywords) File /usr/lib/python2.6/site-packages/dbus/proxies.py, line 140, in __call__ **keywords) File /usr/lib/python2.6/site-packages/dbus/connection.py, line 630, in call_blocking message, timeout) dbus.exceptions.DBusException: org.moblin.connman.Error.NotSupported: Not supported I can connect with openvpn directly. I'm using openvpn-2.1.3, both server and client disable comp-lzo. server is in 64bit fedora11 and client in meego 1.1 Bests Jeff -Original Message- From: Daniel Wagner [mailto:w...@monom.org] Sent: Wednesday, November 17, 2010 6:19 PM To: Zheng, Jeff Cc: connman@connman.net Subject: Re: Add OpenVPN support Hi Jeff, On Wed, Nov 17, 2010 at 01:58:26PM +0800, Zheng, Jeff wrote: How can I use connect-vpn script? I can connect to a point to point server with: openvpn --config config The content of config is: remote xfzheng.sh.intel.com dev tun ifconfig 10.8.0.2 10.8.0.1 secret static.key Currently the plugin can handly only the tls setup. In order to support the static key mode there is need for some more openvpn argument handling. In this config file I don't see cafile and certfile that connect-vpn needs So I ignore these two parameters in script but it still complains: # connect-vpn openvpn myvpn xfzheng.sh.intel.com mydomain.com 1 1 static.key Yeah, that wont work right now. First the script needs get smarter and then the key has to passed in the provider and the openvpn plugin has to pass this to the openvpn argument list. Can you give the patches I'll append to this mail a try? Only compiled, not really tested. I think the 'ifconfig' argument is not really working since it needs to arguments. daniel ___ connman mailing list connman@connman.net http://lists.connman.net/listinfo/connman