Hi,

Here's the summary of the previous community meeting.

---

COMMUNITY MEETING

Place: #openvpn-discussion on irc.freenode.net
List-Post: openvpn-devel@lists.sourceforge.net
Date: Thursday, 18th March 2010
Time: 18:00 UTC

Planned meeting topics for this meeting were on this page:

<http://www.secure-computing.net/wiki/index.php/OpenVPN/IRC_meetings/Topics-2010-03-18>

Next meeting next week, same place, same time. Your local meeting time
is easy to check from services such as

<http://www.timeanddate.com/worldclock>


SUMMARY

Discussed an issue that came up earlier in the mailinglists:

 <http://thread.gmane.org/gmane.network.openvpn.user/29304>

Agreed that allowing two clients to connect with the same certificate
without "duplicate-cn" being set (as in "first one to connect wins")
would be harmful and hence unimplementable.

Discussed a potential bug with global config file defaults (e.g. nobind)
not propagating to <connection> blocks. Agreed that this bug is almost
certainly invalid and was triggered by misconfiguration. However, Jan
will check if the OpenVPN man-page requires clarifications in this area.

Discussed Linux TUN/TAP performance and Jan's EPOLL modification
designed to improve it:

 <http://thread.gmane.org/gmane.network.openvpn.devel/3261/>

Agreed that switching from POLL to EPOLL does not improve overall
performance enough to justify the change. Also agreed that no action
should be taken for now, as the TUN/TAP performance is good enough.

Discussed this SF.net bug report which was found to be fixed in SVN r3128:

<http://sourceforge.net/tracker/?func=detail&atid=454719&aid=2015672&group_id=48978>

Discussed potential problems with disfunctional proxy servers:

<http://sourceforge.net/tracker/?func=detail&atid=454722&aid=1840041&group_id=48978>

RFC2817 clearly states that proxies need to use this syntax:

 CONNECT host:port/

However, according to the bug report some proxy servers require invalid
syntax:

 CONNECT http://host:port/

Samuli will try to contact the original bug reporter and will do some
additional research. If no widely used proxy servers require this
invalid syntax, this bug report will be closed as wontfix.

Discussed a potential bug where CN gets mixed up with certificate name
occasionally after disconnecting. This messes up iptables rulesets and
status files:

http://article.gmane.org/gmane.network.openvpn.user/29181

Agreed that this may indeed be a bug. Decided to do more research:

- check what happens if disconnect happens before connection has reached
  ACTIVE state
- check if this occurs when session is renegotiated (each hour)

Jan volunteered to do the testing.

---

Full chatlog as an attachment


-- 
Samuli Seppänen
Community Manager
OpenVPN Technologies, Inc

irc freenode net: mattock

(20:00:00) janjust: evening all...
(20:00:04) reiffert: hi
(20:00:51) mattock: hi all
(20:00:54) janjust: right room this time ;-) ?
(20:00:59) mattock: yep ;)
(20:01:14) mattock: ok, so how many devs we have here today? cron2, jamesyonan, 
who else?
(20:01:29) jamesyonan: hi everyone
(20:01:58) cron2: hi
(20:02:07) cron2: and janjust
(20:02:41) janjust: hehe yep, don't know what I am...developer, user, 
troublemaker ...
(20:03:16) mattock: that remains to be seen :)
(20:04:00) janjust: I just grabbed the agenda ... is there a particular order ?
(20:04:25) mattock: given that dazo is not here to ACK things, I suggest we 
cover the "possible bugs/issues" first (in 
http://www.secure-computing.net/wiki/index.php/OpenVPN/IRC_meetings/Topics-2010-03-18)
(20:04:26) vpnHelper: Title: OpenVPN/IRC meetings/Topics-2010-03-18 - Secure 
Computing Wiki (at www.secure-computing.net)
(20:04:33) mattock: janjust's stuff :)
(20:05:09) mattock: what do you think?
(20:05:24) cron2: go ahead :)
(20:05:33) mattock: great!
(20:05:40) janjust: sounds fine to me - I actually have a minor addition ...
(20:05:57) mattock: shoot
(20:06:04) janjust: I mean, a feature request that came up on the users list a 
few days ago
(20:06:27) mattock: do you have link to the thread?
(20:06:28) janjust: when 2 persons have the same cert (either by accident or by 
design) and the second person connects the first one is kicked out 
(20:06:51) mattock: oh, that one
(20:06:53) janjust: where's the openvpn-users archive?
(20:07:32) janjust: but the question is: how can one avoid this? when you use 
--server you automatically get --float , there's no way to do --nofloat
(20:07:46) janjust: and it seems to me that --float is causing the 
kick-behaviour
(20:07:59) jamesyonan: janjust: you can use --duplicate-cn to allow multiple 
users with the same cert to connect
(20:08:17) cron2: .oO(that was the option I was trying to remember :) )
(20:08:21) mattock: http://dir.gmane.org/gmane.network.openvpn.user
(20:08:23) vpnHelper: Title: Gmane -- Mail To News And Back Again (at 
dir.gmane.org)
(20:08:44) janjust: yep I know jamesyonan , but this person did not want that 
... I already told him that he should not give the same cert to multiple people 
unless he was using duplicate-cn
(20:09:30) cron2: so what does he want, then?
(20:09:53) cron2: "I want to be able to connect multiple users with the same 
cert, but I do not want to tell the server that this is OK"?
(20:10:44) janjust: what he wanted was a way to give a certificate to 2 persons 
but the first one who connects "wins"
(20:11:32) mattock: it's this one I guess: 
http://thread.gmane.org/gmane.network.openvpn.user/29304
(20:11:33) vpnHelper: Title: Gmane Loom (at thread.gmane.org)
(20:12:08) janjust: yep I was still trying to find it : that's the one
(20:12:55) janjust: but my general thought on this one was: should --no-float 
be a valid option?
(20:12:55) jamesyonan: OpenVPN doesn't support "first one wins" behavior right 
now -- that could be problematic because it could interfere with UDP reconnects
(20:13:07) janjust: true 
(20:13:26) jamesyonan: In many cases during a UDP reconnect, the server doesn't 
really know that the previous session was disconnected yet
(20:13:54) cron2: ... and unless keepalive is used, it might never notice
(20:14:25) janjust: yeah , that's another thing I was thinking of today: a 
client never sends a 'signoff' or 'disconnect' message, does it?
(20:15:18) cron2: no
(20:15:25) d12fk [~quassel@88.130.198.37] è entrato nel canale.
(20:15:27) jamesyonan: there's an "explicit-exit-notify" directive that does 
that
(20:15:36) d12fk: re
(20:15:45) janjust: great - thx jamesyonan , I already learned something from 
this meeting ;-)
(20:16:12) cron2: so did I - I have read the manpage, completely, and multiple 
times, but missed this option :)
(20:16:27) janjust: alright, let's forget the --no-float for a second, I don't 
think we'll come up with a solution
(20:16:43) janjust: the rest of the agenda: mattock asked me to go through the 
bugtracker
(20:16:47) mattock: yep
(20:17:08) janjust: which I did: I closed quite a few old bugs but actually 
found a few interesting ones that are still around
(20:17:11) mattock: one more thing, so the previous "feature" can't be 
implemented, right?
(20:17:14) mattock: in a clean way
(20:17:40) mattock: if so, I'll notify the author, pointing him to today's 
chatlog
(20:17:54) janjust: adding a --no-float option is a no-brainer but I would 
doubt that it solves the problem properly: he'd get all kinds of udp reconnect 
problems
(20:18:08) mattock: ok, I'll let him know that
(20:18:35) mattock: can we proceed to the <connection> block problem?
(20:18:39) janjust: sure
(20:19:01) mattock: janjust, could you briefly describe the problem?
(20:19:06) janjust: yep
(20:19:35) janjust: when people use <connection> blocks they HAVE TO put things 
like nobind inside the block, otherwise they cannot have multiple openvpn 
instances running
(20:19:53) janjust: the reason is that each <connection> block is treated in 
the code as a "connection entry" 
(20:20:15) janjust: each connection entry has a few properties, including 
bind/nobind, proxy, timeout and a few others
(20:20:48) janjust: if this is the designed behaviour then we need to document 
in the manpage what can and/or needs to go into a <connection> block
(20:20:58) cron2: mmmh, defaults not propagating
(20:21:07) cron2: (defaults and "global" settings)
(20:21:07) janjust: defintely not cron2 
(20:21:29) mattock: you mean defaults are not "inherited" (in object oriented 
programming parlance)
(20:21:33) janjust: so the questions are: should there be "global" settings 
which get propagated
(20:21:36) cron2: mattock: yes
(20:21:37) mattock: ok
(20:22:05) janjust: and the second question: is this the designed behaviour of 
the connection blocks? then the man pages should be updated to reflect this
(20:24:00) mattock: is there any way to show which options are used for each 
connection profile?
(20:24:04) ***cron2 points to jamesyonan "he's da man who knows answers"
(20:24:05) mattock: and which are global defaults?
(20:24:32) janjust: the global defaults are the one which are set outside of 
the <conn> blocks
(20:24:57) mattock: yep, but I assume OpenVPN has hardcoded defaults, too
(20:25:22) mattock: which can be overridden in global defaults or in connection 
blocks
(20:25:44) janjust: the hardcoded stuff is overridden properly (as far as I 
know the code)
(20:25:55) janjust: it's the stuff outside of the <conn> blocks that is 
"forgotten"
(20:26:09) cron2: the manpage I have is fairly clear that this is not what was 
intended
(20:26:13) cron2: quote:
(20:26:23) cron2:  defaulting mechanism exists for specifying options to apply 
to
(20:26:28) cron2: all  <connection>  profiles.   If any of the above options 
(with
(20:26:32) cron2: the exception of remote  )  appear  outside  of  a  
<connection>
(20:26:38) cron2: block,  but  in a configuration file which has one or more 
<con-
(20:26:42) cron2: nection> blocks, the option setting will be used  as  a  
default
(20:26:47) cron2: for  <connection>  blocks  which  follow it in the 
configuration
(20:26:52) cron2: file.
(20:27:01) cron2: -- end quote
(20:27:20) cron2: (after the example in the <connection> block of the man page)
(20:27:26) janjust: ok so that makes it both a bug and a manpage issue ;-)
(20:27:53) cron2: For example, suppose the nobind option were placed in the 
sample
(20:27:57) mattock: ok, so is this limited to nobind?
(20:27:57) cron2: configuration  file  above, near the top of the file, before 
the
(20:28:02) cron2: first <connection> block.  The effect would be as if nobind 
were
(20:28:06) cron2: declared in all <connection> blocks below it.
(20:28:10) cron2: (quoting again)
(20:28:47) janjust: ah interesting detail: I don't remember if the person who 
asked the question had the nobind before or after the <conn> block
(20:29:08) mattock: ok, so it might just be in the wrong place...
(20:29:35) fjutscha ha abbandonato il canale (quit: Quit: Leaving).
(20:29:55) janjust: yeah I just read his original posting: it was BELOW the 
conn block
(20:30:07) janjust: we'd have to test it with the statements in the right order
(20:30:08) mattock: problem solved? :)
(20:30:21) janjust: nope - the manpage might still need some updating
(20:30:35) cron2: janjust: does it?  I find it very clear
(20:30:57) janjust: cron2: I think I have to read *your* manpage more carefully 
....
(20:31:30) cron2: it's not my manpage, I just typed in "man openvpn" :-) - I 
didn't quote all of it, though, it has more details on what's allowed inside 
<connection> etc
(20:31:45) janjust: grin
(20:32:11) janjust: I'll read the 2.1 manpage more carefully and see if we need 
to add something regarding the <connection> blocks
(20:32:23) mattock: sounds good
(20:32:42) mattock: janjust, if there is something to be fixed, could you 
create a patch?
(20:33:26) janjust: yep will do
(20:33:29) mattock: great!
(20:33:34) mattock: on to the next one, shall we?
(20:33:38) cron2: ye
(20:33:42) mattock: which would be: 
http://thread.gmane.org/gmane.network.openvpn.devel/3261/
(20:33:44) vpnHelper: Title: Gmane Loom (at thread.gmane.org)
(20:34:02) janjust: oh that one ;-)
(20:34:06) mattock: any progress on this one?
(20:34:19) janjust: not from my side - I asked if somebody had more tests to try
(20:34:42) mattock: any ideas how to proceed with this, anyone?
(20:34:51) janjust: the thing that bugs me is that the performance is actually 
*better* when using POLL and when using EPOLL on a gigabit lan
(20:35:20) janjust: and the other thing which bugs me , of course, is that vtun 
is getting better performance than openvpn (both without encryption or 
compression)
(20:35:44) janjust: and when -> than when
(20:36:14) mattock: and both use the tun module in kernel?
(20:36:19) cron2: how big is the difference between poll and epoll?
(20:36:22) mattock: the same interface I mean?
(20:36:25) mattock: vtun and openvpn
(20:36:28) janjust: yep, that's why I choose vtun
(20:36:30) ***cron2 could imagine that for "just 2 file descriptors", poll has 
less overhead
(20:36:40) janjust: both were using tun0 on both ends
(20:37:18) janjust: I agree cron2  ... but the 'perf report' showed that my 
laptop was spending quite some time in read_hpet with poll; that time was gone 
when using epoll
(20:37:51) d12fk: epoll is the fastest on linux
(20:38:36) janjust: and the perf diff was ~ 32 MB/s using POLL vs ~24 MB/s 
using EPOLL
(20:38:48) janjust: (and vtun was getting ~ 41 MB/s ...)
(20:39:23) d12fk: poll faster than epoll?
(20:39:33) janjust: yep d12fk , for my tests it was
(20:39:44) cron2: ok, let me guess.  I'd assume that the CPU was not saturated 
on either end
(20:40:01) janjust: no encryption, no compression on 8 core machines ....
(20:40:01) cron2: i that case, TCP performance is usually dominated by latency
(20:40:45) cron2: so I'd suspect "number of system calls involved = latency"
(20:41:13) jamesyonan: it wouldn't surprise me if epoll has more initial setup 
inefficiency than poll
(20:41:22) janjust: BTW: the 2 centos5 hosts on the gigabit lan are connected 
to the same switch
(20:41:40) janjust: jamesyonan: true but I was transferring 512 MB files 
(20:42:21) mattock: has anybody tested this on latest kernel?
(20:42:34) janjust: or actually I was using 'dd if 512MB | nc -l 21000' on one 
end and 'nc host 21000 > /dev/null' at the other end
(20:44:18) janjust: my laptop tests (100Mbps lan, no gigabit on board) were 
with fc12 2.6.32
(20:44:34) janjust: I can't upgrade the centos5 boxes that easily to that 
kernel :-(
(20:44:48) mattock: janjust, true :)
(20:45:20) mattock: do you think this a kernel issue, or is something at 
openvpn also contributing to the problem?
(20:45:37) janjust: it's an interaction issue, I'm afraid... 
(20:45:57) mattock: can we fix this at the openvpn end?
(20:46:06) mattock: or are we screwed? ;)
(20:46:15) janjust: there is definitely some kernel overhead (a "direct" 
transfer gives a consistent 60 MB/s)
(20:46:20) jamesyonan: Re: openvpn vs. vtun performance differences, does vtun 
compute HMAC hash of each packet? 
(20:46:37) janjust: I had --auth none --cipher none for my test, jamesyonan 
(20:47:59) d12fk: janjust: what do you mean by "direct"? without openvpn?
(20:48:06) janjust: yes d12fk 
(20:48:37) janjust: using socat I was even able to max out the gigabit lan 
using udp :)
(20:48:49) d12fk: this is becaue there's no tun involved then
(20:49:45) janjust: what can we do on the openvpn end? at best we can achieve 
the same speeds as vtun
(20:49:59) janjust: but we'll always be faced with the overhead of the tun 
adapter
(20:50:14) janjust: however, getting 40 MB/s is still pretty good :) - we are 
talking luxury problem, I'd say
(20:50:31) cron2: the tun will always add latency and extra syscalls, but 
openvpn should be as good as vtun here, yes :-)
(20:50:42) d12fk: implement SSL in the kernel, but that would void the general 
idea of a userspace solution
(20:50:53) mattock: janjust, is it possible to ha --tls-auth enabled with 
--auth none and --cipher none?
(20:51:31) jamesyonan: janjust: did you use --fast-io on test (if UDP)
(20:52:02) janjust: yes jamesyonan , see my last posting on openvpn-devel on 
this
(20:52:44) janjust: unpatched version: ~31 MB/s
(20:52:44) janjust: patched version : ~25 MB/s
(20:52:44) janjust: (BTW: with --fast-io: ~31 MB/s) 
(20:53:11) janjust: so fast-io is about as fast as POLL, or so it seems
(20:53:48) janjust: if someone wants me to run more/other tests just let me 
know ... 
(20:54:49) mattock: can we agree that this is not critical issue?
(20:55:05) mattock: or even serious?
(20:55:12) janjust: fine with me , as long as we patch the poll vs epoll issue
(20:55:41) janjust: new topic: regarding 
http://sourceforge.net/tracker/?func=detail&atid=454719&aid=2015672&group_id=48978
(20:55:42) vpnHelper: Title: SourceForge.net: OpenVPN: Detail: 2015672 - 
buffer.{h,c} isn't defensively programmed (SECURITY?) (at sourceforge.net)
(20:56:06) jamesyonan: janjust: but isn't your test inconclusive about whether 
the epoll patch really helps in all cases?
(20:56:25) mattock: btw. where's the epoll patch?
(20:56:33) janjust: jamesyonan: true 
(20:56:46) janjust: mattock: there is no such thing yet, I simply removed a 
bunch of lines from event.c :)
(20:56:51) mattock: oh :)
(20:57:01) janjust: but epoll should definitely help when many clients are 
connecting
(20:57:25) jamesyonan: yes, but the current unpatched code does use epoll
(20:57:55) mattock: janjust: you could create a patch so that it can be 
reviewed by others
(20:57:57) janjust: does it? when why do I see all kinds of syscalls to poll in 
my original prof-callgraph?
(20:57:57) jamesyonan: your fix only forces epoll for all uses, even when 
OpenVPN would prefer to use poll (when small numbers of sockets are involved)
(20:58:35) janjust: ah so openvpn decides when to use poll vs epoll? what is 
that decision based on (I'm learning here again ;-) )
(20:59:08) jamesyonan: yes, that's what the  EVENT_METHOD_FAST flag is about
(20:59:14) mattock: what kind of benefit are we talking about when POLL is used 
(for small number of sockets)?
(20:59:46) mattock: janjust's EPOLL modification apparently does provide 
significant performance improvement (25MB vs. 31MB)
(20:59:49) janjust: mattock: on gigabit lans performance seems to be roughly 
20% better 
(21:00:09) mattock: you mean with EPOLL, not POLL?
(21:00:14) janjust: nope that's the other way round: on gigabit lans POLL works 
20% better then EPOLL
(21:00:18) mattock: ok
(21:00:20) mattock: :)
(21:00:41) janjust: jamesyonan: when is this EVENT_METHOD_FLAG set?
(21:00:42) jamesyonan: basically when OpenVPN want to poll on a small, fixed 
number of sockets, it uses EVENT_METHOD_FAST.  When it is polling a potentially 
a large number of sockets, it doesn't set the flag.
(21:00:47) d12fk: shatters my liitel epoll bubble i used to live in
(21:00:57) janjust: sorry d12fk  :)
(21:01:11) janjust: it could be my way of testing, of course ;-)
(21:02:10) mattock: ok, do we agree that current behavior is ok?
(21:02:16) mattock: after all :)
(21:02:23) janjust: let's leave the current behaviour as is for now
(21:02:42) janjust: the original question was from jamesyonan regarding the sys 
time when running 'time openvpn'
(21:02:47) janjust: I think we covered that by now ...
(21:02:52) mattock: yep
(21:03:47) mattock: a brief update at this point...
(21:03:53) janjust: now regarding 
http://sourceforge.net/tracker/?func=detail&atid=454719&aid=2015672&group_id=48978:
 I left a note for jamesyonan  to ask if buffer.{c,h} are now properly 
defensively programmed
(21:03:54) vpnHelper: Title: SourceForge.net: OpenVPN: Detail: 2015672 - 
buffer.{h,c} isn't defensively programmed (SECURITY?) (at sourceforge.net)
(21:04:02) mattock: oh yes, that one
(21:04:47) jamesyonan: buffer.{h,c} isn't defensively programmed: that was 
fixed a long time ago in r3129
(21:05:18) janjust: good, then that issue is closed (the sf robot had already 
closed it)
(21:05:19) jamesyonan: r3128 actually
(21:05:48) janjust: it was just an issue on the list that I wasn't sure enough 
about to simply close it
(21:06:20) janjust: next : 
http://sourceforge.net/tracker/?func=detail&atid=454722&aid=1840041&group_id=48978
(21:06:22) vpnHelper: Title: SourceForge.net: Detail: 1840041 - OpenVPN will 
not connect through certain HTTP proxies (at sourceforge.net)
(21:06:46) janjust: some proxies seem to need a 'CONNECT HTTP://host:port/' 
instead of 'CONNECT host:port'
(21:07:03) d12fk: actually i've never seen anything else
(21:07:11) cron2: *dig up RFC*
(21:07:18) jamesyonan: that makes sense
(21:07:19) janjust: well openvpn does 'CONNECT host:port' IIRC
(21:07:40) cron2: I have only ever seen "CONNECT host:port", this is why I'm 
searching for the RFC
(21:08:11) janjust: should we make this user-configurable?
(21:08:38) mattock: that'd probably be a good idea
(21:08:43) jamesyonan: interesting -- RFC uses host:port
(21:08:56) jamesyonan: not http://...
(21:09:18) cron2: jamesyonan: which RFC are you looking at?  I'm looking at 
RFC2616, but that's very vague
(21:09:23) janjust: makes more sense to me jamesyonan : you don't have to 
CONNECT to a http:// url per se, most likely it will be something else (https, 
ftp, whatever)
(21:09:38) jamesyonan: RFC2817
(21:09:59) cron2: ah, indeed, thanks.  Missed the "updated by..." bit
(21:10:29) jamesyonan: it's fairly explicit -- and it makes sense because 
host:port in most cases will NOT refer to an http server
(21:10:43) janjust: if the RFC states that one should use CONNECT host:port 
then I think we can close this bug with an 'won't fix'
(21:11:02) cron2: janjust: it does
(21:11:06) cron2: section 5.2
(21:11:15) mattock: or should we cater for disfunctional proxies?
(21:11:21) mattock: with a user-configurable parameter?
(21:11:48) janjust: hehe mattock: 
--use-disfunctional-broken-proxy-and-send-http-url 
(21:11:55) mattock: yep, something like that :)
(21:12:08) jamesyonan: any info on which proxies require the non-compliant form?
(21:12:16) janjust: not in the bugtracker ... 
(21:12:16) cron2: nothing in the bug
(21:12:41) mattock: I think we have to assume users can't fix the proxy, so if 
openvpn does not work with it, it's a showstopper
(21:13:01) mattock: e.g. if it's proprietary or out of user's control
(21:13:07) mattock: right?
(21:13:16) janjust: true, but I've never seen complaints about it on the 
openvpn-users list, just on this sf bugtracker
(21:13:26) cron2: empirical: CONNECT http:// is NOT going to work for at least 
squid
(21:13:33) cron2: CONNECT http://boyle.space.net:443 HTTP/1.0
(21:13:36) cron2: HTTP/1.0 404 Not Found
(21:13:40) cron2: X-Squid-Error: ERR_DNS_FAIL 0
(21:14:02) cron2: Unable to determine IP address from host name for <I>http</I>
(21:14:02) mattock: janjust: so all we have is this bug report...
(21:14:04) janjust: mattock: we cannot fix/work around every broken piece of 
software that's around
(21:14:09) mattock: true
(21:14:16) jamesyonan: I agree that we might want a flag for this, if there are 
closed source proxies out there in widespread use that require it
(21:14:37) janjust: ok, action item: let's try and find out if there are 
widespread used proxies around that require this
(21:14:37) mattock: if the problem is not widespread, I think we should not try 
to work around it
(21:14:48) mattock: janjust: good idea
(21:14:58) janjust: if we cannot find it using an hour of google then the issue 
is moot, I'd say
(21:15:00) mattock: I can try my luck and mail the original bug author
(21:15:25) cron2: Apache mod_proxy also fails with "CONNECT http://...";
(21:15:36) cron2: HTTP/1.1 400 Bad Request
(21:15:39) janjust: hehe cron2, alright, alright, you've made your point ;-)
(21:16:10) cron2: janjust: no, this more along the lines of "so, will it be 
harmful to change it?" - and the answer is, yes :-)
(21:16:30) mattock: so let's do a little research later on (e.g. tomorrow) and 
see if this is a real problem
(21:16:43) jamesyonan: The question in my mind is if MS proxies might require it
(21:16:43) mattock: I can mail the original bug author and ask what proxy did 
he use
(21:16:47) janjust: mattock, I agree
(21:17:04) janjust: that would classify as 'wide spread' , jamesyonan  :)
(21:17:47) mattock: wouldn't be the first time Microsoft "adjusts" RFC's 
slightly
(21:18:06) mattock: janjust: any other bug reports we need to handle?
(21:19:05) mattock: from your part
(21:20:12) janjust: one more 
(21:20:15) HotaruT: mattock: also ask which other client software would send 
connect-http:// at all
(21:20:33) janjust: JJK has identified possible missing code in 
multi_client_disconnect_setenv() [multi.c:447] setting the common_name 
environment variable 
(21:21:05) mattock: hotarut: I'll do some digging tomorrow and also ask our 
users at -users ml
(21:22:19) janjust: the original report is 
http://article.gmane.org/gmane.network.openvpn.user/29181
(21:22:20) vpnHelper: Title: Gmane -- Mail To News And Back Again (at 
article.gmane.org)
(21:23:15) cron2: I have to leave now - $wife said something about food and 
being angry with me if I don't come NOW.  See ya :-)
(21:23:30) janjust: hehe cron2, I'm signing off after this one as well
(21:23:38) janjust: enjoy your meal
(21:24:03) mattock: cron2: bye!
(21:24:09) jamesyonan: bye
(21:24:17) d12fk: cron2: n'guten
(21:24:26) mattock: I think we should all sign off after this one, btw... 1:24 
and going strong
(21:26:36) jamesyonan: multi_client_disconnect_setenv is just going to recycle 
the CN that was set when the connection was established
(21:27:15) janjust: the -users report mentioned that it wasn't set at 
disconnect ... 
(21:27:31) janjust: hmmm perhaps I should not believe the user report and test 
it myself ...
(21:28:08) mattock: janjust: if that's not too much trouble please go ahead :)
(21:28:24) mattock: it'd help in clarifying the problem
(21:28:27) janjust: ghe ghe somebody else could volunteer as well, of course ;-)
(21:28:29) mattock: if there is one
(21:28:54) jamesyonan: I could believe that the CN might not be set on 
disconnect if the user session never progressed to the ACTIVE state
(21:29:53) jamesyonan: but certainly the CN, if defined on connection setup, 
should not change during the course of the connection
(21:30:51) janjust: ah you mean that once it is set during _connect that the 
env var is not touched...
(21:31:08) janjust: OK,action item for me : I'll try to reproduce this tomorrow
(21:31:21) mattock: janjust: much appreciated!
(21:31:28) jamesyonan: yes -- that is how it SHOULD work
(21:32:07) mattock: seems like pretty nasty little problem, hard to spot 
(21:32:18) mattock: or rather, to weed out by testing
(21:32:22) jamesyonan: one data point to consider is whether the alleged bug 
occurs after a session renegotiation (at the one hour mark)
(21:32:41) janjust: the original posting mentioned a reconnect....
(21:33:30) janjust: but I'll test it tomorrow, including a reconnect/timeout
(21:33:39) jamesyonan: sounds good
(21:33:45) mattock: agreed
(21:33:53) mattock: I think we've covered enough for today
(21:33:58) janjust: yes
(21:34:14) mattock: I'll write summary tomorrow and see what we ended up with :)
(21:34:28) jamesyonan: great, thanks all
(21:34:44) mattock: great meeting, once again!
(21:34:58) mattock: let's continue the discussion on the mailinglists
(21:35:00) janjust: this was fruitful for me as well  - I learned quite a few 
things about openvpn :)
(21:35:23) mattock: you're never really ready :)
(21:35:41) mattock: anyways, good night, afternoon or whatever to everyone! ;)
(21:35:51) mattock: bye
(21:35:54) janjust: hehe bye everyone
(21:35:56) janjust ha abbandonato il canale (quit: Quit: Leaving).
(21:36:00) d12fk: see you next week
(21:36:12) mattock: you too

Reply via email to