Commit Graph

30 Commits

Author SHA1 Message Date
Lucian Cristian 0f40d9f404 openfortivpn: update to 1.20.3
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2023-05-17 07:45:34 +08:00
Lucian Cristian 8297750346 openfortivpn: update to 1.19.0
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2022-10-25 15:53:04 +02:00
Lucian Cristian 25bd93c203 openfortivpn: update to 1.17.3
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2022-06-01 13:51:47 -07:00
Matthew Hagan bbf13f9d89 openfortivpn: add persistent reconnect option
Currently when the connection times out, the interface will disconnect.
Add capability to add persistent option to re-establish connectivity.

Signed-off-by: Matthew Hagan <mnhagan88@gmail.com>
2021-10-30 01:07:49 -07:00
Matthew Hagan 008d4afa5f openfortivpn: add user, key, CA PEM support
Allow authentication inputs by key/cert PEM.

Signed-off-by: Matthew Hagan <mnhagan88@gmail.com>
2021-10-30 01:07:49 -07:00
Lucian Cristian 0d84451371 openfortivpn: update to 1.17.1
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2021-09-19 15:19:37 -07:00
Aaron Goodman c4686691aa openfortivpn: fix shellcheck warnings
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-09-10 17:56:10 -04:00
Aaron Goodman 7d170b8f64 openfortivpn: tabify shell scripts
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-09-10 15:53:33 -04:00
Aaron Goodman f01714a250 openfortivpn: version bump to 1.15.0 and further upgrades
- remove patch that has been included upstream
- remove dependence on resolveip
- remove hotplug script that is handled by "proto_add_host_dependency"
- use openfortivpn default tunnel ip if none specified
- add status checking with uclient-fetch

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-09-09 18:16:18 -04:00
Aaron Goodman 24b4d9edab openfortivpn: use more standard config option names
change 'server' to 'peeraddr'
change 'iface_name' to 'tunlink'

fix some indentation issues

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-08-26 21:55:22 -04:00
Aaron Goodman 5facc084aa openfortivpn: fix routes passed to netifd
The openfortivpn routes are a bit different than the standard ppp
routes so we need to handle them with a custom ppp-up script.

Gateway should not be set, and src should be set to the PPP local ip
address.

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-08-22 13:21:14 -04:00
Aaron Goodman 176f363b5f openfortivpn: remove explicit handling of peerdns and defaultroute
netifd is clever enough to handle the peerdns and default route
arguments, so we can just let them get passed along, and when
ppp-up invokes proto_send_update, netifd will only apply what
is needed

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-31 21:43:06 -04:00
Aaron Goodman 991147ff43 openfortivpn: improve logging
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-30 20:47:34 -04:00
Aaron Goodman 93af5a19bb openfortivpn: add defaultroute option
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-30 20:47:34 -04:00
Aaron Goodman 7ec4881762 openfortivpn: use functions/network.sh to access interface params
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-30 20:47:34 -04:00
Aaron Goodman a541f0be8a openfortivpn: use proper method to access configuration in hotplug
Use functions.sh to get configuration variables rather than calling uci

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-30 20:47:33 -04:00
Aaron Goodman c8a8afe8c0 openfortivpn: version bump to 1.14.1-6
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-28 23:06:09 -04:00
Aaron Goodman d8b71f45a8 openfortivpn: don't report error if symlink already exists
If two openfortivpn scripts are started at the same time, a race
condition can occur where the conditional evaluates to true, but the
symlink exists by the time the other script tries to create it

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-28 23:06:09 -04:00
Aaron Goodman 7f109ec59f openfortivpn: minor formatting changes
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-28 23:06:09 -04:00
Aaron Goodman 2f9cfb036f openfortivpn: block restart after authentication failure
Block restart of the interface if the openfortivpn fails to authenticate.
Without this check, with a bad password, netifd will continually
hit the VPN endpoint with connection attempts

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-28 23:06:09 -04:00
Aaron Goodman d134b7ffbb openfortivpn: Only start autostart interfaces on hotplug event
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-21 22:01:46 -04:00
Aaron Goodman f32ad35870 openfortivpn: use standard 'peerdns' argument on netifd script
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-19 18:54:48 -04:00
Aaron Goodman 374ac6817d openfortivpn: add option to use ither curl or ping to test host status
allow use of curl rather than ping to test if a host
is up since a host may not respond to ping, but an
https request is part of the openfortivpn connection,
so this is a more reliable test

also clean up overly verbose logging

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-07-18 22:05:13 -04:00
Ryan Shi ee690da794 openfortivpn: bump PKG_RELEASE
Signed-off-by: Ryan Shi <qweaszxcdfsh@gmail.com>
2020-07-04 18:28:59 +08:00
Ryan Shi f25db3dede openfortivpn: Remove pingcheck and use l3_device instead
Signed-off-by: Ryan Shi <qweaszxcdfsh@gmail.com>
2020-07-02 15:47:13 +08:00
Aaron Goodman 36f77a171d openfortivpn: avoid flash writes on pppd script
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-06-04 16:55:11 -04:00
Aaron Goodman 9b0fce23d1 openfortivpn: Use netifd for script rather than init script
By using the netifd for open fortivpn we are able to set up multiple
VPN connections and manage them through the netifd toolset.

This also adds support for binding an openfortivpn client to a given
interface, in which case when that interface comes online, the vpn
will be initiated via a hotplug script.

This is a breaking commit and configurations will need to be migrated
from openfortivpn.config into the /etc/config/networks.

Example configuration via /etc/config/network:

config interface 'ftvpn'
        option proto 'openfortivpn'
        option server 'example.com'
        option username 'USERNAME'
        option password 'PASSWORD'
        # optional arguments follow
        option local_ip '192.0.5.1'
        option port '443'
        option iface_name 'wan'
        option trusted_cert 'CERT_HASH'
        option set_dns '0'
        option pppd_use_peerdns '0'
        option metric '10'

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-06-04 16:51:30 -04:00
Aaron Goodman 4f727bcc02 openfortivpn: version bump to 1.14.1
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-06-04 16:49:47 -04:00
Lucian Cristian b18c316cf5 openfortivpn: update to 1.13.2
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2020-03-25 18:43:53 +02:00
Lucian Cristian 559afd02c6 openfortivpn: add package
An open implementation of Fortinet's proprietary PPP+SSL VPN solution

Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2019-06-28 11:56:27 +03:00