**ORIGINAL REPO WAS DELETED OR HIDDEN (https://github.com/passepartoutvpn)** VPN client library for Apple platforms.
Go to file
Davide De Rosa fabd59f9e3 Add basic CLA 2018-08-28 12:53:12 +02:00
.github Update contribution guidelines 2018-08-23 12:19:46 +02:00
Demo Enable LZO framing for the sake of Demo 2018-08-24 00:27:45 +02:00
TunnelKit Improve split naming 2018-08-24 12:44:17 +02:00
TunnelKit-iOS Rename library to TunnelKit 2018-08-23 12:10:41 +02:00
TunnelKit-macOS Rename library to TunnelKit 2018-08-23 12:10:41 +02:00
TunnelKit.xcodeproj Move a few classes inside SessionProxy 2018-08-23 18:51:36 +02:00
TunnelKit.xcworkspace Rename library to TunnelKit 2018-08-23 12:10:41 +02:00
TunnelKitHost Finish up renaming in headers and prefixes 2018-08-23 12:10:56 +02:00
TunnelKitTests Use MTU configuration for the link instead 2018-08-24 12:37:09 +02:00
.gitignore Initial commit 2018-08-23 10:19:25 +02:00
.jazzy.yaml Move a few classes inside SessionProxy 2018-08-23 18:51:36 +02:00
.swift-version Initial commit 2018-08-23 10:19:25 +02:00
CLA.rst Add basic CLA 2018-08-28 12:53:12 +02:00
CONTRIBUTING.md Update contribution guidelines 2018-08-23 12:19:46 +02:00
LICENSE Relicense to GPLv3 2018-08-23 12:14:53 +02:00
Podfile Rename library to TunnelKit 2018-08-23 12:10:41 +02:00
Podfile.lock Rename library to TunnelKit 2018-08-23 12:10:41 +02:00
README.md Add basic CLA 2018-08-28 12:53:12 +02:00
TunnelKit.podspec Bump minor version 2018-08-23 18:55:46 +02:00

README.md

TunnelKit

This library provides a simplified Swift/Obj-C implementation of the OpenVPN® protocol for the Apple platforms. The crypto layer is built on top of OpenSSL 1.1.0h, which in turn enables support for a certain range of encryption and digest algorithms.

Contacts

Twitter: @keeshux

Website: davidederosa.com

Getting started

The client is known to work with OpenVPN® 2.3+ servers. Key renegotiation and replay protection are also included, but full-fledged configuration files (.ovpn) are not currently supported.

  • Handshake and tunneling over UDP or TCP
  • Client-initiated renegotiation
  • Replay protection (hardcoded window)
  • Data encryption
    • AES-CBC (128 and 256 bit)
    • AES-GCM (128 and 256 bit)
  • HMAC digest
    • SHA-1
    • SHA-256
  • TLS CA validation

The library does not currently support compression, so you must disable it server-side in order to avoid a confusing loss of data packets. The TunnelKitProvider.Configuration.LZOFraming option is deprecated and only provided for interoperability with comp-lzo no.

Installation

Requirements

  • iOS 9.0+ / macOS 10.11+
  • Xcode 9+ (Swift 4)
  • Git (preinstalled with Xcode Command Line Tools)
  • Ruby (preinstalled with macOS)
  • CocoaPods 1.5.0
  • jazzy (optional, for documentation)

It's highly recommended to use the Git and Ruby packages provided by Homebrew.

CocoaPods

To use with CocoaPods just add this to your Podfile:

pod 'TunnelKit'

Testing

Download the library codebase locally:

$ git clone https://github.com/keeshux/TunnelKit.git

Assuming you have a working CocoaPods environment, setting up the library workspace only requires installing the pod dependencies:

$ pod install

After that, open TunnelKit.xcworkspace in Xcode and run the unit tests found in the TunnelKitTests target. A simple CMD+U while on TunnelKit-iOS should do that as well.

Demo

There is a Demo directory containing a simple app for testing the tunnel, called BasicTunnel. As usual, prepare for CocoaPods:

$ pod install

then open Demo.xcworkspace and run the BasicTunnel-iOS target.

For the VPN to work properly, the BasicTunnel demo requires:

  • App Groups and Keychain Sharing capabilities
  • App IDs with Packet Tunnel entitlements

both in the main app and the tunnel extension target.

In order to test connection to your own server, modify the file Demo/BasicTunnel-[iOS|macOS]/ViewController.swift and make sure to set builder.ca to the PEM encoded certificate of your VPN server's CA (or nil if none).

Example:

builder.endpointProtocols = [TunnelKitProvider.EndpointProtocol(.udp, 1194)]
builder.ca = """
-----BEGIN CERTIFICATE-----
MIIFJDCC...
-----END CERTIFICATE-----
"""

Documentation

The library is split into two modules, in order to decouple the low-level protocol implementation from the platform-specific bridging, namely the NetworkExtension VPN framework.

Full documentation of the public interface is available and can be generated with jazzy. After installing the jazzy Ruby gem with:

$ gem install jazzy

enter the root directory of the repository and run:

$ jazzy

The generated output is stored into the docs directory in HTML format.

Core

Here you will find the low-level entities on top of which the connection is established. Code is mixed Swift and Obj-C, most of it is not exposed to consumers. The Core module depends on OpenSSL and is mostly platform-agnostic.

The entry point is the SessionProxy class. The networking layer is fully abstract and delegated externally with the use of opaque IOInterface (LinkInterface and TunnelInterface) and SessionProxyDelegate protocols.

AppExtension

The goal of this module is packaging up a black box implementation of a NEPacketTunnelProvider, which is the essential part of a Packet Tunnel Provider app extension. You will find the main implementation in the TunnelKitProvider class.

Currently, the extension supports VPN over both UDP and TCP sockets. A debug log snapshot is optionally maintained and shared to host apps via UserDefaults in a shared App Group.

Contributing

By contributing to this project you are agreeing to the terms stated in the Contributor License Agreement (CLA).

For more details please see CONTRIBUTING.

License

This project is licensed under the GPLv3 license, which can be found here.

Credits

This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (https://www.openssl.org/)

© 2002-2018 OpenVPN Inc. - OpenVPN is a registered trademark of OpenVPN Inc.

Donations

TunnelKit is free software, donations are extremely welcome.

Bitcoin address: 16w2AWamiH2SS68NYSMDcrbh5MnZ1c5eju