Commeted out as "too many false positives".
Signed-off-by: Alon Bar-Lev <[email protected]>
---
src/openvpn/route.c | 1 -
src/openvpn/tun.c | 43 -------------------------------------------
src/openvpn/tun.h | 4 ----
3 files changed, 0 insertions(+), 48 deletions(-)
diff --git a/src/openvpn/route.c b/src/openvpn/route.c
index 7c25c77..f36c324 100644
--- a/src/openvpn/route.c
+++ b/src/openvpn/route.c
@@ -1030,7 +1030,6 @@ add_routes (struct route_list *rl, struct route_ipv6_list
*rl6, const struct tun
for (i = 0; i < rl->n; ++i)
{
struct route *r = &rl->routes[i];
- check_subnet_conflict (r->network, r->netmask, "route");
if (flags & ROUTE_DELETE_FIRST)
delete_route (r, tt, flags, &rl->rgi, es);
add_route (r, tt, flags, &rl->rgi, es);
diff --git a/src/openvpn/tun.c b/src/openvpn/tun.c
index 71abbf3..033c1e2 100644
--- a/src/openvpn/tun.c
+++ b/src/openvpn/tun.c
@@ -242,44 +242,6 @@ check_addr_clash (const char *name,
gc_free (&gc);
}
-/*
- * Issue a warning if ip/netmask (on the virtual IP network) conflicts with
- * the settings on the local LAN. This is designed to flag issues where
- * (for example) the OpenVPN server LAN is running on 192.168.1.x, but then
- * an OpenVPN client tries to connect from a public location that is also
running
- * off of a router set to 192.168.1.x.
- */
-void
-check_subnet_conflict (const in_addr_t ip,
- const in_addr_t netmask,
- const char *prefix)
-{
-#if 0 /* too many false positives */
- struct gc_arena gc = gc_new ();
- in_addr_t lan_gw = 0;
- in_addr_t lan_netmask = 0;
-
- if (get_default_gateway (&lan_gw, &lan_netmask) && lan_netmask)
- {
- const in_addr_t lan_network = lan_gw & lan_netmask;
- const in_addr_t network = ip & netmask;
-
- /* do the two subnets defined by network/netmask and
lan_network/lan_netmask intersect? */
- if ((network & lan_netmask) == lan_network
- || (lan_network & netmask) == network)
- {
- msg (M_WARN, "WARNING: potential %s subnet conflict between local LAN
[%s/%s] and remote VPN [%s/%s]",
- prefix,
- print_in_addr_t (lan_network, 0, &gc),
- print_in_addr_t (lan_netmask, 0, &gc),
- print_in_addr_t (network, 0, &gc),
- print_in_addr_t (netmask, 0, &gc));
- }
- }
- gc_free (&gc);
-#endif
-}
-
void
warn_on_use_of_common_subnets (void)
{
@@ -485,11 +447,6 @@ init_tun (const char *dev, /* --dev option */
remote_public,
tt->local,
tt->remote_netmask);
-
- if (tt->type == DEV_TYPE_TAP || (tt->type == DEV_TYPE_TUN &&
tt->topology == TOP_SUBNET))
- check_subnet_conflict (tt->local, tt->remote_netmask, "TUN/TAP
adapter");
- else if (tt->type == DEV_TYPE_TUN)
- check_subnet_conflict (tt->local, IPV4_NETMASK_HOST, "TUN/TAP
adapter");
}
/*
diff --git a/src/openvpn/tun.h b/src/openvpn/tun.h
index 9bd990f..bea1554 100644
--- a/src/openvpn/tun.h
+++ b/src/openvpn/tun.h
@@ -251,10 +251,6 @@ const char *ifconfig_options_string (const struct tuntap*
tt, bool remote, bool
bool is_tun_p2p (const struct tuntap *tt);
-void check_subnet_conflict (const in_addr_t ip,
- const in_addr_t netmask,
- const char *prefix);
-
void warn_on_use_of_common_subnets (void);
/*
--
1.7.3.4