need help on connman 0.63 configuration error

2010-11-17 Thread Xiong, Si Min
When trying to compile connam-0.63,  encountered configuration error: Xtables 
library is required.

What's that, how to work around this error?

Best Regards

Simin


___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


Re: need help on connman 0.63 configuration error

2010-11-17 Thread Rolf Offermanns
On 11/17/2010 09:10 AM, Xiong, Si Min wrote:
 When trying to compile connam-0.63,  encountered configuration error: Xtables 
 library is required.
 
 What's that, how to work around this error?

You need a newer iptables version. Are you on MeeGo? Last time I checked
they did not have a version  1.4.1. I use the 1.4.9 version from Fedora.

-Rolf

-- 
Rolf Offermanns rofferma...@sysgo.com
SYSGO AG Tel.: +49-6136-9948-0
Am Pfaffenstein 14   Fax: +49-6136-9948-10
55270 Klein-Winternheim  http://www.sysgo.com

Handelsregister: HRB Mainz 90 HRB 8066
Vorstand: Michael Tiedemann
Aufsichtsratsvorsitzender: Juergen Bullacher
USt(VAT)-Id-Nr.: DE 149062328
___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


[PATCH v0 2/2] openvpn: add static key setup support in connect-vpn

2010-11-17 Thread Daniel Wagner
From: Daniel Wagner daniel.wag...@bmw-carit.de

---
 test/connect-vpn |   26 ++
 1 files changed, 18 insertions(+), 8 deletions(-)

diff --git a/test/connect-vpn b/test/connect-vpn
index 1575804..757491e 100755
--- a/test/connect-vpn
+++ b/test/connect-vpn
@@ -8,7 +8,8 @@ if (len(sys.argv)  4):
print   type: openconnect
print   name host domain cookie [cafile]
print   type: openvpn
-   print   name host domain cafile certfile keyfile
+   print   TLS: name host domain cafile certfile keyfile
+   print   Static Key: name host domain static_key ifconfig
sys.exit(1)
 
 bus = dbus.SystemBus()
@@ -33,13 +34,22 @@ if sys.argv[1] == openconnect:
VPN.Domain: sys.argv[4],
OpenConnect.Cookie: sys.argv[5]}))
 elif sys.argv[1] == openvpn:
-   path = manager.ConnectProvider(({ Type: openvpn,
-   Name: sys.argv[2],
-   Host: sys.argv[3],
-   VPN.Domain: sys.argv[4],
-   OpenVPN.CACert: sys.argv[5],
-   OpenVPN.Cert: sys.argv[6],
-   OpenVPN.Key: sys.argv[7]}))
+   if (len(sys.argv)  6):
+   path = manager.ConnectProvider(({ Type: openvpn,
+ Name: sys.argv[2],
+ Host: sys.argv[3],
+ VPN.Domain: sys.argv[4],
+ OpenVPN.CACert: sys.argv[5],
+ OpenVPN.Cert: sys.argv[6],
+ OpenVPN.Key: sys.argv[7]}))
+   else if (len(sys.argv)  5):
+   path = manager.ConnectProvider(({ Type: openvpn,
+ Name: sys.argv[2],
+ Host: sys.argv[3],
+ VPN.Domain: sys.argv[4],
+ OpenVPN.StaticKey: 
sys.argv[5],
+ OpenVPN.Ifconfig: 
sys.argv[6]}))
+   
 else:
print Unknown VPN type
sys.exit(1)
-- 
1.7.3.2

___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


[PATCH v0 1/2] openvpn: add suport for static key setup

2010-11-17 Thread Daniel Wagner
From: Daniel Wagner daniel.wag...@bmw-carit.de

---
 plugins/openvpn.c |   25 +++--
 1 files changed, 19 insertions(+), 6 deletions(-)

diff --git a/plugins/openvpn.c b/plugins/openvpn.c
index 0da6c74..ed06b5d 100644
--- a/plugins/openvpn.c
+++ b/plugins/openvpn.c
@@ -130,6 +130,7 @@ static int ov_connect(struct connman_provider *provider,
struct connman_task *task, const char *if_name)
 {
const char *vpnhost, *cafile, *mtu, *certfile, *keyfile;
+   const char *static_key, *ifconfig;
int err, fd;
 
vpnhost = connman_provider_get_string(provider, Host);
@@ -141,6 +142,10 @@ static int ov_connect(struct connman_provider *provider,
cafile = connman_provider_get_string(provider, OpenVPN.CACert);
certfile = connman_provider_get_string(provider, OpenVPN.Cert);
keyfile = connman_provider_get_string(provider, OpenVPN.Key);
+
+   static_key = connman_provider_get_string(provider, OpenVPN.StaticKey);
+   ifconfig = connman_provider_get_string(provider, OpenVPN.Ifconfig);
+
mtu = connman_provider_get_string(provider, VPN.MTU);
 
if (mtu)
@@ -188,21 +193,29 @@ static int ov_connect(struct connman_provider *provider,
 */
connman_task_add_argument(task, --ping-restart, 0);
 
-   connman_task_add_argument(task, --client, NULL);
+   if (cafile != NULL  certfile != NULL  keyfile != NULL) {
+   /* connection type: TLS */
+   connman_task_add_argument(task, --client, NULL);
 
-   if (cafile) {
connman_task_add_argument(task, --ca,
(char *)cafile);
-   }
 
-   if (certfile) {
connman_task_add_argument(task, --cert,
(char *)certfile);
-   }
 
-   if (keyfile) {
connman_task_add_argument(task, --key,
(char *)keyfile);
+   } else if (static_key != NULL  ifconfig != NULL) {
+   /* connection type: static key */
+   connman_task_add_argument(task, --secret,
+   (char *)static_key);
+
+   connman_task_add_argument(task, --ifconfig,
+   (char *)ifconfig);
+   } else {
+   connman_error(Unknown connection type configuration 
+   (either tls or static key needed));
+   return -EINVAL;
}
 
fd = fileno(stderr);
-- 
1.7.3.2

___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


Re: Add OpenVPN support

2010-11-17 Thread Daniel Wagner
Hi Jeff,

On Wed, Nov 17, 2010 at 01:58:26PM +0800, Zheng, Jeff wrote:
 How can I use connect-vpn script? 
 
 I can connect to a point to point server with:
 openvpn --config config
 
 The content of config is:
 remote xfzheng.sh.intel.com
 dev tun
 ifconfig 10.8.0.2 10.8.0.1
 secret static.key

Currently the plugin can handly only the tls setup. In order to
support the static key mode there is need for some more openvpn
argument handling.

 In this config file I don't see cafile and certfile that connect-vpn needs
 
 So I ignore these two parameters in script but it still complains:
 # connect-vpn openvpn myvpn xfzheng.sh.intel.com mydomain.com 1 1 static.key

Yeah, that wont work right now. First the script needs get smarter and
then the key has to passed in the provider and the openvpn plugin has
to pass this to the openvpn argument list.

Can you give the patches I'll append to this mail a try? Only compiled,
not really tested. I think the 'ifconfig' argument is not really
working since it needs to arguments.

daniel

___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


Re: Add OpenVPN support

2010-11-17 Thread Daniel Wagner
 Can you give the patches I'll append to this mail a try? Only compiled,
 not really tested. I think the 'ifconfig' argument is not really
 working since it needs to arguments.

... it needs two arguments.
___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


Re: [PATCH 2/2] add zeroconf-lib support

2010-11-17 Thread Samuel Ortiz
Hi Julien,

On Wed, Nov 17, 2010 at 10:24:37AM +, Julien Massot wrote:
 
  I also always thought of the link local configuration highly integrated
  into the DHCP support.
 
 Do you think that i have to use the structure GDHCPClient?
Yes, that would be better.

 Meaning that the DHCP client falls back to link
  local in case it can not retrieve a valid lease. Should we really bother
  with link local only network configurations?
 
 Do you mean that the link local negociation should be launch on each dhcp
 fail ?
That would make sense, yes. And that should be done by the GDHCPClient. If we
later see a need for cases where one wants LL only or no LL at all, we can
extend the GDHCP types to support that.

Apologies for not having reviewed your patches earlier. I should be able to do
that by tomorrow or Friday.

Cheers,
Samuel.


 It's what we want to do for our own need.
 
 
 
  Regards
 
  Marcel
 
 
  ___
  connman mailing list
  connman@connman.net
  http://lists.connman.net/listinfo/connman
 
 
 Regards,
 
 -- 
 Massot Julien
 Operating System engineer
 Aldebaran Robotics
 +33 1 77 37 17 60
 ___
 connman mailing list
 connman@connman.net
 http://lists.connman.net/listinfo/connman

-- 
Intel Open Source Technology Centre
http://oss.intel.com/
___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


Re: building connman-0.63 fails against 2.6.37-rc1 headers

2010-11-17 Thread Stephan Raue

Hi Samuel,

Am 16.11.2010 15:09, schrieb Samuel Ortiz:


It should be fixed now.


thanks, its fixed :-)

greetings

Stephan

--
  ### OpenELEC.tv ###
The free and open Mediacenter Distribution 4 you
 http://www.openelec.tv

___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


Re: [PATCH 0/3] Add more support for proxy internal.

2010-11-17 Thread Marcel Holtmann
Hi Mohamed,

 I still needed more information about srt/proxy.c
 so I hope the discussion of these patch will
 illustrate missing info.
 
 *I still dont know why service is needed in
 struct connman_proxy_driver {
 const char *name;
 int priority;
 int (*request_lookup) (struct connman_service *service,
 const char *url);
 void (*cancel_lookup) (struct connman_service *service,
 const char *url);
 };
 specially the caller never pass a service when call for
 proxy request.

you can have multiple active services which will map to different active
interfaces in your system. And you need to test for a proxy based on
what system you wanna use.

So for example you have an active 3G connection and consider switching
to a WiFi connection. 3G stays active and the default, then you connect
to your WiFi, but you have to run the portal check/WISPr on your WiFi
connection. And for that you need the proxy for a not yet default
service. Since if it fails, we can not make WiFi default, since that
would mean we loose our Internet connection.

Regards

Marcel


___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


RE: Add OpenVPN support

2010-11-17 Thread Zheng, Jeff
Hi Daniel,

Do you mean compile with patch  [PATCH v0 1/2] openvpn: add suport for
static key setup? compile passed.

But I still failed with SSL/TLS (not with the patch):

# connect-vpn openvpn openvpn xfzheng.sh.intel.com sh.intel.com 
/root/.openvpn/ca.crt /root/.openvpn/client1.crt /root/.openvpn/client1.key
sys.argv[7] is /root/.openvpn/client1.key
Traceback (most recent call last):
  File /usr/lib/connman/test/connect-vpn, line 42, in module
OpenVPN.Key: sys.argv[7]}))
  File /usr/lib/python2.6/site-packages/dbus/proxies.py, line 68, in __call__
return self._proxy_method(*args, **keywords)
  File /usr/lib/python2.6/site-packages/dbus/proxies.py, line 140, in __call__
**keywords)
  File /usr/lib/python2.6/site-packages/dbus/connection.py, line 630, in 
call_blocking
message, timeout)
dbus.exceptions.DBusException: org.moblin.connman.Error.NotSupported: Not 
supported

I can connect with openvpn directly. I'm using openvpn-2.1.3, both server and
client disable comp-lzo. server is in 64bit fedora11 and client in meego 1.1


Bests
Jeff

 -Original Message-
 From: Daniel Wagner [mailto:w...@monom.org]
 Sent: Wednesday, November 17, 2010 6:19 PM
 To: Zheng, Jeff
 Cc: connman@connman.net
 Subject: Re: Add OpenVPN support
 
 Hi Jeff,
 
 On Wed, Nov 17, 2010 at 01:58:26PM +0800, Zheng, Jeff wrote:
  How can I use connect-vpn script?
 
  I can connect to a point to point server with:
  openvpn --config config
 
  The content of config is:
  remote xfzheng.sh.intel.com
  dev tun
  ifconfig 10.8.0.2 10.8.0.1
  secret static.key
 
 Currently the plugin can handly only the tls setup. In order to
 support the static key mode there is need for some more openvpn
 argument handling.
 
  In this config file I don't see cafile and certfile that connect-vpn 
  needs
 
  So I ignore these two parameters in script but it still complains:
  # connect-vpn openvpn myvpn xfzheng.sh.intel.com mydomain.com 1 1
 static.key
 
 Yeah, that wont work right now. First the script needs get smarter and
 then the key has to passed in the provider and the openvpn plugin has
 to pass this to the openvpn argument list.
 
 Can you give the patches I'll append to this mail a try? Only compiled,
 not really tested. I think the 'ifconfig' argument is not really
 working since it needs to arguments.
 
 daniel

___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman