Hi all, James, I'd like to ask for a couple of features (little ones) added to OpenVPN. Comments welcomed.
1) OpenVPN should refuse to start a connection based on shared secret when the file containing that key is world readable (or writable). Paranoia won't even like group readable :-) Really, that's an important piece (the most?) in that kind of VPN, we don't want it to be public. Just imagine an (non-chrooted) anonymous ftp server, a bad configured web server/cgi-script, a malicious user,... 2) Each OpenVPN daemon should delete its pidfile when stoping, since it was that very same daemon that created it. It has no sense to have the init.d scripts deleting these files (and stoping nonexistent daemons) since the daemon could have been killed before the init.d script tried to stop it. Thanks in advance for any comments. Best regards. -- Alberto Gonzalez Iniesta | They that give up essential liberty a...@agi.as | to obtain a little temporary safety Encrypted mail preferred | deserve neither liberty nor safety. Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3