summaryrefslogtreecommitdiff
path: root/README
Commit message (Collapse)AuthorAgeFilesLines
* wispr: Add online check url config optionsVAUTRIN Emmanuel (Canal Plus Prestataire)2021-08-291-0/+9
| | | | | | | Global config options, which allow to set the urls (IPv4 and IPv6 respectively) used during the online status check. Default values are http://ipv4.connman.net/online/status.html and http://ipv6.connman.net/online/status.html respectively.
* README: Add IRC channel infoDaniel Wagner2021-06-211-0/+4
| | | | | The ConnMan project moved to oftc recently. Add the IRC contact information.
* README: fix typoAlyssa Ross2021-06-091-1/+1
|
* README: Update mailing list infoDaniel Wagner2021-06-021-2/+8
| | | | | | ConnMan is hosted on lists.linux.dev from now on. Update the entry and also explain how to subscribe. While at it also mention the official archive.
* README: Remove the 01.org website and the 01.org JiraMarcel Holtmann2021-05-141-5/+1
|
* treewide: Fix typosTorstein Husebø2020-01-221-2/+2
|
* openvpn: Rewrite plugin to support VPN agent and encrypted private keysJussi Laakkonen2019-11-141-0/+9
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Co-authored-by: Matt Vogt <matthew.vogt@jollamobile.com> Co-authored-by: Slava Monich <slava.monich@jolla.com> This OpenVPN plugin rewrite contains numerous amount of fixes. Most importantly VPN agent is used to query credentials as well as the password for the encrypted private key. VPN agent support is done utilizing the management interface of OpenVPN. The management interface is opened at each connection attempt to get the potential requests for credentials, or encrypted private key password. OpenVPN process is started with the stored information and if there is some credential missing it will be queried via management interface. Each credential failure increases the authentication failed error counter in vpn-provider.c but does not indicate it as an error to be signaled. This is because the authentication failures are handled within the plugin->openvpn process and the openvpn process does not die in between. In case the credentials or the private key password is wrong OpenVPN requests them again via management channel. If the error would be signaled, connmand would have wrong indication of what is actually happening and would attempt to disconnect the VPN in question. The new VPN agent functionality is utilized to advise the VPN agent not to store the encrypted private key password. Encrypted private key password is kept in memory only, during the connman-vpnd lifetime. On some systems VPN agents may store the credentials into files and, thus it is imperative to not to save the encrypted private key password using the VPN agent as it is bad practice to have both encrypted file and its password stored on same storage space. Use of the vpn_agent_append_keep_credentials() is also needed to indicate VPN agent that the credentials should not be affected by the request to input encrypted private key password. It may be that some VPN agents would react to the storage and retrieval prevention values as the existing values should be removed. The private key password errors are not recorded as authentication errors but are handled internally within the plugin. The rationale is that since VPN agent is affected by the authentication errors and the VpnAgent.AuthFailure is sent in such case, and VPN agent is advised not to store the private key password, handling of the errors related to private key password should happen within the plugin. If the private key password stored in memory is wrong, it will be still attempted on first try but OpenVPN will requests new one via management interface after a failed attempt. The encrypted private key password failures are not reported by OpenVPN (at least version <= 2.4.5) via management interface and following patch is required in order for the failures to be reported: https://git.sailfishos.org/mer-core/openvpn/blob/ 4f4b4af116292a207416c8a990392e35a6fc41af/rpm/privatekey-passphrase- handling.diff - a note about this is added to README. Since the management channel unix socket is to be used by both vpnd and the OpenVPN process the socket is created under system temp (env TMPDIR). If env TMPDIR is omitted or empty, /tmp is used instead.
* README: mention address conflict detection, RFC 5227Peter Meerwald-Stadler2018-06-041-0/+1
|
* doc: added documentation for running without DNS resolving.Ismo Puustinen2017-10-051-0/+10
| | | | | | If '-r' option is used, do not use either dnsproxy or systemd-resolved backend. Instead update /etc/resolv.conf and let applications do the resolving.
* README: Add remark to 'wpa_supplicant configuration' sectionJose Blanquicet2017-08-241-1/+4
|
* doc: Update online check informationIngo Albrecht2017-04-041-5/+7
| | | | | | Update doc to reflect the new EnableOnlineCheck configuration option introduced with 4de35cde5a93271e785a3bb5a0f3d39aea34d77b Correct typo.
* doc: add online check informationIngo Albrecht2017-02-281-1/+5
| | | | | | Add new info from connman.net server admin to README. Mention the online check in the manual so that end users have a reference why the client opens an external route.
* README: Add GnuTLS seciont on GNUTLS_NO_EXPLICIT_INITDaniel Wagner2017-02-131-0/+16
| | | | | Warn users of GnuTLS about the behavior of gnutls_global_init() which might block the loading of ConnMan.
* iwd: Add infrastructure for iwd pluginDaniel Wagner2016-11-151-0/+9
| | | | | The plugin is disabled by default. The upstream project hasn't released any version so far.
* README: Remove bogus advice on wpa_supplicant building settingTomasz Bursztyka2015-01-261-7/+0
| | | | | | The autoscan module in wpa_supplicant cannot handle hidden SSIDs, where connman's autoscan policy does it properly so let's use this later one only.
* README: Add information on how online check is doneJukka Rissanen2014-06-101-0/+40
| | | | Clarify how ConnMan does portal detection and online check in more detail.
* README: Clarify what iptables are needed forJukka Rissanen2014-06-101-1/+1
| | | | Document that iptables is needed for tethering.
* plugins: Refactor Gadget into separate plugin and file.Glenn Schmottlach2014-02-141-0/+8
| | | | | | | | Move Linux Gadget, i.e. USB client, device support into a separate plug-in instead of being combined with the Ethernet plug-in. Change the prefix of several ethernet driver function names to be more consistent with the underlying driver (e.g. cable_ -> eth_network_, ethernet_ -> eth_dev_, eth_ -> eth_tech_).
* README: Update recommended wpa_supplicant version and web page infoPatrik Flykt2014-02-031-1/+3
|
* readme: Document kernel options needed by sessionJukka Rissanen2013-08-261-0/+3
| | | | | | | Session networking code needs these kernel options to work. CONFIG_NETFILTER_XT_CONNMARK CONFIG_NETFILTER_XT_TARGET_CONNMARK CONFIG_NETFILTER_XT_MATCH_CONNMARK
* README: Add info how to create traces with timestampsDaniel Wagner2013-08-061-0/+6
| | | | | This is very handy to debug timing related issues, especially when anohter demon is involved, e.g. ofonod.
* readme: USB gadget tethering kernel options addedJukka Rissanen2013-07-221-0/+6
|
* readme: Add bug reporting informationJukka Rissanen2013-07-031-0/+2
|
* readme: Clarify how the wpa_supplicant D-Bus autostart behavesJukka Rissanen2013-07-011-0/+6
|
* README: Add kernel config options for full Session supportDaniel Wagner2013-06-191-0/+7
|
* README: Update information about wpa_supplicant configurationTomasz Bursztyka2013-05-171-2/+9
|
* doc: Information about activating debugging in ConnManJukka Rissanen2013-03-141-0/+43
|
* README: Add kernel options needed for tetheringPatrik Flykt2013-01-301-0/+17
|
* README: Add extra empty line between sectionsMarcel Holtmann2012-12-111-0/+1
|
* selinux: Add Type Enforcement rule compilationJukka Rissanen2012-11-231-0/+11
| | | | | | | The SELinux rules are needed for VPN. They allow various vpn clients to send notifications to connman-vpnd via net.connman.Task dbus interface if the connman processes are run under systemd and the system is in enforcing mode.
* README: Add information about network interface clearing at startupJukka Rissanen2012-11-051-0/+5
|
* README: Mention readline and command line client disable switchPatrik Flykt2012-09-261-0/+10
|
* README: Add information about mailing list and siteLucas De Marchi2012-06-181-0/+10
|
* README: Add --disable-dundee documentationDaniel Wagner2012-06-041-0/+13
|
* README: Fix whitespace and typo issuesDaniel Wagner2012-06-041-2/+2
|
* README: Add description for --disable-wispr optionMarcel Holtmann2012-05-221-1/+19
|
* README: Add comment on OpenVPN version to useDaniel Wagner2012-05-111-0/+10
|
* README: Move the VPN entry downDaniel Wagner2012-05-111-15/+15
| | | | So it is under the "Configuration and options" section.
* README: Fix minor spelling mistakeMarcel Holtmann2012-05-081-1/+1
|
* README: Fix version number typoPatrik Flykt2012-04-301-1/+1
|
* README: Mention wpa_supplicant version detailsMarcel Holtmann2012-04-291-2/+5
|
* README: adding necessary configuration hints about wpa_supplicantTomasz Bursztyka2012-04-241-0/+16
|
* doc: Update README to actually reflect realityMarcel Holtmann2012-04-231-18/+85
|
* readme: Add l2tp and pptp informationJukka Rissanen2011-11-151-0/+15
|
* dnsproxy: Move from plugins to coreDaniel Wagner2011-01-261-16/+1
|
* Remove support for dhclient pluginMarcel Holtmann2010-11-261-12/+0
|
* Remove dependency on udevMarcel Holtmann2010-10-041-1/+0
|
* Remove udhcp pluginMarcel Holtmann2010-07-271-8/+1
|
* Remove resolvconf pluginMarcel Holtmann2010-07-271-15/+1
|
* Update copyright informationMarcel Holtmann2010-01-011-1/+1
|