aboutsummaryrefslogtreecommitdiff
path: root/net/openfortivpn
Commit message (Collapse)AuthorAge
* openfortivpn: update to 1.19.0Lucian Cristian2022-10-25
| | | | Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
* openfortivpn: update to 1.17.3Lucian Cristian2022-06-01
| | | | Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
* openfortivpn: add persistent reconnect optionMatthew Hagan2021-10-30
| | | | | | | Currently when the connection times out, the interface will disconnect. Add capability to add persistent option to re-establish connectivity. Signed-off-by: Matthew Hagan <mnhagan88@gmail.com>
* openfortivpn: add user, key, CA PEM supportMatthew Hagan2021-10-30
| | | | | | Allow authentication inputs by key/cert PEM. Signed-off-by: Matthew Hagan <mnhagan88@gmail.com>
* openfortivpn: update to 1.17.1Lucian Cristian2021-09-19
| | | | Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
* openfortivpn: fix shellcheck warningsAaron Goodman2020-09-10
| | | | Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: tabify shell scriptsAaron Goodman2020-09-10
| | | | Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: version bump to 1.15.0 and further upgradesAaron Goodman2020-09-09
| | | | | | | | | | - remove patch that has been included upstream - remove dependence on resolveip - remove hotplug script that is handled by "proto_add_host_dependency" - use openfortivpn default tunnel ip if none specified - add status checking with uclient-fetch Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: use more standard config option namesAaron Goodman2020-08-26
| | | | | | | | | change 'server' to 'peeraddr' change 'iface_name' to 'tunlink' fix some indentation issues Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: fix routes passed to netifdAaron Goodman2020-08-22
| | | | | | | | | | The openfortivpn routes are a bit different than the standard ppp routes so we need to handle them with a custom ppp-up script. Gateway should not be set, and src should be set to the PPP local ip address. Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: remove explicit handling of peerdns and defaultrouteAaron Goodman2020-07-31
| | | | | | | | | netifd is clever enough to handle the peerdns and default route arguments, so we can just let them get passed along, and when ppp-up invokes proto_send_update, netifd will only apply what is needed Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: improve loggingAaron Goodman2020-07-30
| | | | Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: add defaultroute optionAaron Goodman2020-07-30
| | | | Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: use functions/network.sh to access interface paramsAaron Goodman2020-07-30
| | | | Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: use proper method to access configuration in hotplugAaron Goodman2020-07-30
| | | | | | Use functions.sh to get configuration variables rather than calling uci Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: version bump to 1.14.1-6Aaron Goodman2020-07-28
| | | | Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: don't report error if symlink already existsAaron Goodman2020-07-28
| | | | | | | | If two openfortivpn scripts are started at the same time, a race condition can occur where the conditional evaluates to true, but the symlink exists by the time the other script tries to create it Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: minor formatting changesAaron Goodman2020-07-28
| | | | Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: block restart after authentication failureAaron Goodman2020-07-28
| | | | | | | | Block restart of the interface if the openfortivpn fails to authenticate. Without this check, with a bad password, netifd will continually hit the VPN endpoint with connection attempts Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: Only start autostart interfaces on hotplug eventAaron Goodman2020-07-21
| | | | Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: use standard 'peerdns' argument on netifd scriptAaron Goodman2020-07-19
| | | | Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: add option to use ither curl or ping to test host statusAaron Goodman2020-07-18
| | | | | | | | | | | allow use of curl rather than ping to test if a host is up since a host may not respond to ping, but an https request is part of the openfortivpn connection, so this is a more reliable test also clean up overly verbose logging Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: bump PKG_RELEASERyan Shi2020-07-04
| | | | Signed-off-by: Ryan Shi <qweaszxcdfsh@gmail.com>
* openfortivpn: Remove pingcheck and use l3_device insteadRyan Shi2020-07-02
| | | | Signed-off-by: Ryan Shi <qweaszxcdfsh@gmail.com>
* openfortivpn: avoid flash writes on pppd scriptAaron Goodman2020-06-04
| | | | Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: Use netifd for script rather than init scriptAaron Goodman2020-06-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | By using the netifd for open fortivpn we are able to set up multiple VPN connections and manage them through the netifd toolset. This also adds support for binding an openfortivpn client to a given interface, in which case when that interface comes online, the vpn will be initiated via a hotplug script. This is a breaking commit and configurations will need to be migrated from openfortivpn.config into the /etc/config/networks. Example configuration via /etc/config/network: config interface 'ftvpn' option proto 'openfortivpn' option server 'example.com' option username 'USERNAME' option password 'PASSWORD' # optional arguments follow option local_ip '192.0.5.1' option port '443' option iface_name 'wan' option trusted_cert 'CERT_HASH' option set_dns '0' option pppd_use_peerdns '0' option metric '10' Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: version bump to 1.14.1Aaron Goodman2020-06-04
| | | | Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
* openfortivpn: update to 1.13.2Lucian Cristian2020-03-25
| | | | Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
* openfortivpn: add packageLucian Cristian2019-06-28
An open implementation of Fortinet's proprietary PPP+SSL VPN solution Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>