Commeted out as "too many false positives".

Signed-off-by: Alon Bar-Lev <alon.bar...@gmail.com>
---
 src/openvpn/route.c |    1 -
 src/openvpn/tun.c   |   43 -------------------------------------------
 src/openvpn/tun.h   |    4 ----
 3 files changed, 0 insertions(+), 48 deletions(-)

diff --git a/src/openvpn/route.c b/src/openvpn/route.c
index 7c25c77..f36c324 100644
--- a/src/openvpn/route.c
+++ b/src/openvpn/route.c
@@ -1030,7 +1030,6 @@ add_routes (struct route_list *rl, struct route_ipv6_list 
*rl6, const struct tun
       for (i = 0; i < rl->n; ++i)
        {
          struct route *r = &rl->routes[i];
-         check_subnet_conflict (r->network, r->netmask, "route");
          if (flags & ROUTE_DELETE_FIRST)
            delete_route (r, tt, flags, &rl->rgi, es);
          add_route (r, tt, flags, &rl->rgi, es);
diff --git a/src/openvpn/tun.c b/src/openvpn/tun.c
index 71abbf3..033c1e2 100644
--- a/src/openvpn/tun.c
+++ b/src/openvpn/tun.c
@@ -242,44 +242,6 @@ check_addr_clash (const char *name,
   gc_free (&gc);
 }

-/*
- * Issue a warning if ip/netmask (on the virtual IP network) conflicts with
- * the settings on the local LAN.  This is designed to flag issues where
- * (for example) the OpenVPN server LAN is running on 192.168.1.x, but then
- * an OpenVPN client tries to connect from a public location that is also 
running
- * off of a router set to 192.168.1.x.
- */
-void
-check_subnet_conflict (const in_addr_t ip,
-                      const in_addr_t netmask,
-                      const char *prefix)
-{
-#if 0 /* too many false positives */
-  struct gc_arena gc = gc_new ();
-  in_addr_t lan_gw = 0;
-  in_addr_t lan_netmask = 0;
-
-  if (get_default_gateway (&lan_gw, &lan_netmask) && lan_netmask)
-    {
-      const in_addr_t lan_network = lan_gw & lan_netmask; 
-      const in_addr_t network = ip & netmask;
-
-      /* do the two subnets defined by network/netmask and 
lan_network/lan_netmask intersect? */
-      if ((network & lan_netmask) == lan_network
-         || (lan_network & netmask) == network)
-       {
-         msg (M_WARN, "WARNING: potential %s subnet conflict between local LAN 
[%s/%s] and remote VPN [%s/%s]",
-              prefix,
-              print_in_addr_t (lan_network, 0, &gc),
-              print_in_addr_t (lan_netmask, 0, &gc),
-              print_in_addr_t (network, 0, &gc),
-              print_in_addr_t (netmask, 0, &gc));
-       }
-    }
-  gc_free (&gc);
-#endif
-}
-
 void
 warn_on_use_of_common_subnets (void)
 {
@@ -485,11 +447,6 @@ init_tun (const char *dev,       /* --dev option */
                            remote_public,
                            tt->local,
                            tt->remote_netmask);
-
-         if (tt->type == DEV_TYPE_TAP || (tt->type == DEV_TYPE_TUN && 
tt->topology == TOP_SUBNET))
-           check_subnet_conflict (tt->local, tt->remote_netmask, "TUN/TAP 
adapter");
-         else if (tt->type == DEV_TYPE_TUN)
-           check_subnet_conflict (tt->local, IPV4_NETMASK_HOST, "TUN/TAP 
adapter");
        }

       /*
diff --git a/src/openvpn/tun.h b/src/openvpn/tun.h
index 9bd990f..bea1554 100644
--- a/src/openvpn/tun.h
+++ b/src/openvpn/tun.h
@@ -251,10 +251,6 @@ const char *ifconfig_options_string (const struct tuntap* 
tt, bool remote, bool

 bool is_tun_p2p (const struct tuntap *tt);

-void check_subnet_conflict (const in_addr_t ip,
-                           const in_addr_t netmask,
-                           const char *prefix);
-
 void warn_on_use_of_common_subnets (void);

 /*
-- 
1.7.3.4


Reply via email to