Hi,

Here's the summary of the previous community meeting.

---

COMMUNITY MEETING

Place: #openvpn-devel on irc.freenode.net
List-Post: openvpn-devel@lists.sourceforge.net
Date: Thursday, 15th Jul 2010
Time: 18:00 UTC

Planned meeting topics for this meeting were on this page:

<https://community.openvpn.net/openvpn/wiki/Topics-2010-07-15>

Next meeting next week, same place, same time. Your local meeting time
is easy to check from services such as

<http://www.timeanddate.com/worldclock>

or with

$ date -u


SUMMARY

Discussed handling of security vulnerabilities. Historically security
issues have been reported by security researchers directly to James
Yonan and fixed within days. Decided to

- use a closed security mailinglist for receiving and discussing
undisclosed security vulnerabilities
- encrypt communications on the security ml using PGP
- include key OpenVPN community members in the mailinglist
- include key package maintainers / distributors in the mailinglist (to
give them time to prepare for repackaging)

Also discussed fixing and disclosing of security vulnerabilities. Agreed
that we should disclose security issues in 3 weeks - or less, if a fix
is ready. If a fix is not ready in 3 weeks we should disclose the issue,
provide workarounds (if any) and then fix the issue a.s.a.p.

Agreed that all security issues - whether they're theoretical or being
exploited - should be fixed. Also agreed that our users should be
informed about vulnerabilities in external software OpenVPN depends on
(e.g. OpenSSL). This will be done after developers of the external
software have already disclosed the vulnerability.

Discussed various mechanisms to make security vulnerability discussions
secure. Sending of security vulnerability reports to us could be done
securely with a simple HTTPS webapp. Alternatively, we could make an
official PGP public key available for sending in reports. There are two
options for securing discussions on the security mailinglist:

- everybody uses the same PGP public/private keypair which expires, say,
after one year
- everybody uses personal PGP keys for communication: all need to have
the public keys of everyone else and each mail has to be encrypted once
for every recipient

Agreed that the second option is better, if mail clients can be
configured to do multiple encryption automatically. Samuli promised to
check if Thunderbird + Enigmail supports this. Samuli also promised to
check if SF.net mailinglists could be used for the -security ml.

--

Discussed the "Build failure on OpenBSD 4.7 IFF_MULTICAST" bug:

<https://community.openvpn.net/openvpn/ticket/17>

Cron2 is still awaiting test reports from krzee and fkr.

--

Discussed our buildbot install briefly. It already does the continuous
integration stuff by automatically building OpenVPN "allmerged" branch
and reporting of build problems. By the end of this month we should have
buildbot-created Debian/Ubuntu packages available. Agreed that we should
provide packages for both "beta2.2" and "allmerged" branches.

--

Discussed promises made in these meetings. Agreed that they're easy to
forget and hard to track. Decided to try using Trac for tracking the
promises:

<https://community.openvpn.net/openvpn/report/12>

Samuli promised to review latest meeting summaries and create Trac
tickets as required.

--

Discussed the broken bridge scripts. Waldner has now written the
bridging HOWTO, as promised:

<https://community.openvpn.net/openvpn/wiki/OpenVPNBridging>

---

Full chatlog as an attachment

-- 
Samuli Seppänen
Community Manager
OpenVPN Technologies, Inc

irc freenode net: mattock



(21:04:31) mattock: hi james!
(21:04:43) mattock: let's start the meeting!
(21:04:47) krzee: i wont have time to even look at servers for a bit, migration 
craziness
(21:04:58) krzee: (also wont be in the meeting, later guys!)
(21:05:13) mattock: krzee: later
(21:05:27) mattock: ok, so what about this: "How do we tackle security issues?  
(f.ex. CVE's)  How are they announced?"
(21:05:34) mattock: full topic list here: 
https://community.openvpn.net/openvpn/wiki/Topics-2010-07-15
(21:05:35) vpnHelper: Title: Topics-2010-07-15 – OpenVPN (at 
community.openvpn.net)
(21:06:47) mattock: dazo: is the CVE topic from you?
(21:07:08) dazo: A guy on #openvpn wondered about how we announce security 
issues and fixes
(21:07:14) mattock: dazo: ok
(21:07:33) mattock: jamesyonan: do we (=company) have a policy for CVE's? 
(21:07:38) jamesyonan: in the past, security issues that have been found are 
communicated to me confidentially
(21:07:59) dazo: and I can't say I remember having seen much of such 
announcement, especially of fixes ... I've seen one CVE, which was tackled in 
2.1_rc9
(21:08:11) jamesyonan: the security issue is then publicly announced at the 
same time a fix is released
(21:08:35) dazo: Yeah, that's the normal procedure
(21:08:48) dazo: Maybe it would make sense to have a "inner circle" of some 
people who will receive such issues?
(21:08:51) ecrist: personally, I think hiding vulnerabilities like that is not 
the right way to go about it
(21:09:11) mattock: at least if hiding leads to postponing the fixing
(21:09:26) dazo: It's not about hiding it, it will become visible ... but we 
need some time to get it fixed, so we don't put our users at risk immediately
(21:09:46) ecrist: or, when hiding leads to admins not knowing, especially when 
there are things that can be done to mitigate a vulnerability outside a code 
patch
(21:09:48) dazo: when the vulnerability is known, the attack vector is much 
more like
(21:09:52) dazo: likely
(21:10:02) ecrist: if it's a problem, they're already vulnerable
(21:10:10) mattock: ecrist: good point
(21:10:18) cron2: that's the old debate about reasonable disclosure
(21:10:23) ecrist: instead, the only people that know about it are a few 
coders, and potential hackers.
(21:10:30) ecrist: cron2: exactly
(21:10:33) dazo: yeah, but if it's not publicly known, attackers might not 
begin to look for vulnerable openvpn server as easily
(21:10:37) ecrist: I'm just stating my stance on the subject
(21:10:40) cron2: I'm all for disclosure, but at the same time, giving the 
developers "reasonable amount of time" to fix & rollout
(21:10:51) dazo: cron2:  +1
(21:11:01) ecrist: -1
(21:11:03) jamesyonan: I think this is a generally agreed on practice -- 
there's no perfect solution but the least-worst solution seems to be to delay 
the public disclosure by a reasonable amount of time so a fix can be developed
(21:11:32) dazo: full disclosure, but give a little reasonable time to get a 
fix out before it's announced ... usually such announcements are coordinated 
with MITRE or similar institutions too
(21:11:51) mattock: also, this depends on who has found the issue... and if 
it's already in the wild being exploited
(21:12:08) mattock: e.g. if a security researcher finds it, it may or may not 
be in the wild
(21:12:30) krzee ha abbandonato il canale (quit: Read error: Connection reset 
by peer).
(21:12:38) dazo: in such cases, CVE's are usually published immediately ... but 
CVE's which are not in the wild, are kept with a low profile until an agreed 
date
(21:13:36) dazo: but I agree with jamesyonan, this is usually the common 
practice, also within F/OSS
(21:15:10) mattock: what do we consider reasonable amount of time for a fix?
(21:15:23) mattock: probably not 12 months like Apple and Microsoft? :)
(21:15:43) ecrist: whenever the developers feel they want to, more than likely
(21:15:47) dazo: difficult to say, depends on the vulnerability ... < 4weeks, I 
would say
(21:16:41) ecrist: if you're going to adopt that policy, I think it's a fair 
trade off to stick to a max lifetime, say, 3 weeks.  if it's not patched at 3 
weeks, announce the vuln and allow the community to review
(21:16:45) dazo: 4 weeks gives time to investigate, fix and test the fix 
without being way too stressed, but still having pressure
(21:16:59) ecrist: a month is a long time
(21:17:09) ecrist: I think 3 weeks it too long, tbh
(21:18:05) dazo: I'm not sure what's the common everywhere practice .... but 
some places I know it's up to 6-8 weeks ... but in those cases, it's been 
coordinating with other vendors as well
(21:18:33) jamesyonan: historically, most OpenVPN security issues have been 
fixed within days
(21:19:55) ecrist: if that's the case, put a 2 week lifetime on it
(21:20:49) dazo: I think ecrist got a good point, though ... fix internally 
within 3 weeks ... and if not, the -devel list must be involved somehow ... but 
not like announcing a vulnerability which we must fix
(21:20:52) mattock: there's also the delay before upstream fixes reach 
distributors (e.g. software repos)
(21:21:14) dazo: true
(21:21:15) ecrist: mattock: I think that's where the -devel comes in
(21:21:21) ecrist: and, really, it's up to them
(21:21:27) mattock: yep
(21:21:49) ecrist: so, ideally, upon notice, reveal to security@ (include repo 
owners) and patch/release
(21:21:58) ecrist: if it's not patched in time, release to -devel
(21:22:12) dazo: when we have a fix and have published it, then yes - it's 
their "problem" .... but until a fix is ready, it's actually our main 
responsibility
(21:22:33) dazo: ecrist:  +1
(21:22:57) ecrist: if it's patched in a couple days, staying inside that 
timeout is possible, even with rerolling packages
(21:23:06) mattock: I agree that repo owners should be notified of any security 
issues... so that they can prepare for repackaging
(21:23:08) ecrist: but the timeout can still be a drop0dead
(21:24:00) ecrist: I think non-devs (such as myself) should be members of such 
a list, however, to keep things honest.
(21:24:06) ecrist: and disclosed.
(21:24:06) mattock: jamesyonan: could we have a closed mailinglist or something 
for security issues?
(21:24:36) mattock: with a few key members from the community
(21:24:45) jamesyonan: yes, I agree that makes sense
(21:25:15) mattock: any ideas how to implement the list?
(21:26:01) dazo: a mail alias with the allowed people on @openvpn.net ?
(21:26:11) ecrist: just need to create a closed list on sf, where the other 
lists are
(21:26:15) ecrist: you can lock them down
(21:26:23) mattock: ecrist: ok, did not know that
(21:26:37) mattock: perhaps that'd be the easiest way
(21:26:39) dazo: Do we trust sf.net enough?
(21:27:08) ecrist: I don't see why we couldn't
(21:27:24) ecrist: would be bad pub for them for such a thing to be opened up
(21:27:29) mattock: the mails go through countless of mail servers anyways, 
so...
(21:28:03) dazo: that's true enough ... I was more worried if somebody at 
sf.net managed to leak out mails on our locked down list
(21:28:13) ecrist: I don't think this sort of thing needs to be that secretive
(21:28:29) ***dazo is just very careful by nature
(21:28:38) mattock: as long as we fix the issues in a timely manner we should 
not need to worry
(21:28:55) dazo: fair enough
(21:29:39) mattock: and I don't many try to sells exploits that are known to 
the vendor already... if dazo was thinking along those lines
(21:29:53) jamesyonan: the members of the security team could always exchange 
PGP public keys and use them to discuss issues of critical sensitivity
(21:30:04) mattock: yep, that's true
(21:30:08) ecrist: that is an option
(21:31:13) dazo: agreed
(21:32:17) mattock: what if we do this:
(21:32:17) mattock: - create a closed security mailinglist
(21:32:17) mattock: - disclose the issues in 3 weeks or less, if a fix is ready
(21:32:17) mattock: - if a fix is not ready in 3 weeks, disclose the issue (and 
provide workarounds, if any), then fix the issue a.s.a.p.
(21:32:17) mattock: - inform (some) package maintainers about upcoming fixes, 
before disclosure
(21:32:37) mattock: - include key community members in the security mailinglist
(21:33:01) ecrist: I think all major package maintainers and vendors should be 
allowed on the list.
(21:33:11) dazo: +1
(21:33:19) ecrist: i.e. Snom who has an OpenVPN client on their VOIP phones.
(21:33:49) jamesyonan: +1
(21:34:10) mattock: +1, as long as we can somehow verify the trustworthiness of 
those on the list
(21:34:22) dazo: jamesyonan:  when you received such alerts earlier ... can you 
describe that process?  Whom contacted you?  How did they contact you?  When 
and how did it get disclosed?
(21:34:23) mattock: common sense helps, of course :)
(21:35:10) jamesyonan: usually these issues are first found by security 
researchers
(21:35:48) jamesyonan: they communicate the issue to me via encrypted email
(21:36:13) jamesyonan: There's different classes of issues
(21:37:02) jamesyonan: Some issues are theoretical only (these are often found 
by automated source code analysis tools)
(21:37:32) jamesyonan: Some issues are really issues in other software but that 
affect OpenVPN
(21:38:07) jamesyonan: An example of the latter is the infamous random number 
bug that was introduced a few years ago into debian OpenSSL
(21:39:23) mattock: I think the "external software issues" should be disclosed 
a.s.a.p.
(21:39:33) dazo: mattock:  +1
(21:39:39) jamesyonan: the latter bug would cause keys to lack entropy
(21:39:42) mattock: and perhaps the theoretical ones, too
(21:39:50) ecrist: but a workaround should be available, as well.
(21:40:08) ecrist: I think the theoretical ones should be patched, the same as 
other critical ones.
(21:40:23) dazo: mattock:  but!  it such announcements needs in these 
situations to be coordinated with the other group ... so that we don't announce 
something which they need more time on to fix
(21:40:33) jamesyonan: yes the  "external software issues" are usually 
announced without any coordination with the OpenVPN project
(21:41:37) jamesyonan: In the case of the Debian random number bug, there 
wasn't much the OpenVPN project could do except to encourage people to update 
their OpenSSL package
(21:41:43) dazo: as long as we're not in the loop, then that's very fine ... 
but if we get to know about an "external" issue, we need to respect any embargo 
defined by the "external" part
(21:42:16) mattock: dazo: agreed
(21:43:02) dazo: re: theoretical issues ... yes, we can disclose it almost 
asap, as soon as we have evaluated it to really be theoretical
(21:43:57) jamesyonan: many OpenSSL vulnerabilities that have occurred over the 
years could be protected against by using tls-auth
(21:43:58) dazo: but I would be more careful there ... as there's enough clever 
guys on the internet who can make theoretical work in practice
(21:44:19) mattock: we can also discuss each issue separately on the security 
mailinglist
(21:44:23) mattock: if there are bordercases
(21:44:29) dazo: +1
(21:44:58) mattock: and I agree with ecrist that all, even theoretical, issues 
should be fixed
(21:45:16) dazo: +1
(21:45:39) mattock: of course, I have not seen what amount of noise automated 
code analysis tools create, so... 
(21:45:51) jamesyonan: the policy of the project has always been to fix all 
potential security issues, even theoretical issues for which there is no known 
exploit
(21:46:05) mattock: I think that's a good policy
(21:46:30) dazo: agreed
(21:48:07) mattock: ok, so in a nutshell:
(21:48:07) mattock: - inform our users of problems in external software (and 
possible workarounds) after the external party has disclosed the vulnerability
(21:48:07) mattock: - fix all security issues (theoretical and real) in the 
given time
(21:48:07) mattock: - if necessary, discuss issues on a case-by-case basis on 
-security ml
(21:48:36) mattock: do we want to use PGP?
(21:48:44) dazo: pgp, please
(21:48:45) cron2: yes
(21:49:26) mattock: ok, what if I add "check what SF.net mailing lists can do 
for us" to my TODO list?
(21:49:37) ecrist: works for me
(21:49:44) mattock: and then proceed with discussing who's gonna be on the list
(21:49:59) dazo: +1
(21:50:06) ecrist: +1
(21:50:15) jamesyonan: +1
(21:50:48) mattock: jamesyonan: what about the initial mails from security 
analysts? could they go directly to the mailinglist?
(21:50:56) mattock: or do they need to go through you first?
(21:51:08) jamesyonan: usually they go to me first
(21:51:35) jamesyonan: the researcher might not know about the existence of the 
list unless we publicize it
(21:52:01) ecrist: I think an effort to publish the existence of the list is 
appropriate
(21:52:13) mattock: ecrist: agreed
(21:52:16) dazo: it might be reasonable to consider mentioning it on the 
official web pages and community pages
(21:52:45) mattock: let's do that when the list is up and working
(21:52:51) mattock: the publishing part I mean
(21:53:02) jamesyonan: if we wanted to set up a system for security researchers 
or other members of the general public to submit security concerns, it might be 
reasonable to set up an official PGP public key that could be used to encrypt 
the communications.
(21:53:21) mattock: +1
(21:53:22) ecrist: and distribute that key to members?
(21:53:42) jamesyonan: We could also provide a basic security issue submission 
web app over https.
(21:53:54) ecrist: auto-send to the list
(21:53:56) mattock: I was just wondering how PGP works in a mailing list 
scenario...
(21:54:19) dazo: mattock:  you need to encrypt with all recipients pubkeys, 
afaik
(21:54:26) ecrist: I think the only way to do it is to either know everyone on 
the list and encrypt to each, or have one key pair for the whole list
(21:54:37) dazo: I like the submission webapp ... that sounds "simpler"
(21:54:50) mattock: perhaps one keypair is simpler for everyone
(21:55:36) ecrist: we could change it every 12 mos, perhaps
(21:55:38) dazo: but more difficult to track authenticity ... can you trust 
that nobody didn't loose the key (with or without knowing it)?
(21:56:02) ecrist: dazo, I think it's not so important to authenticate the 
message as it is to keep it private
(21:56:33) dazo: yeah, with a recycling, that makes sense ... but you'll still 
need to save the old keys to read old messages
(21:56:35) mattock: if somebody's key is compromised, the attacker still needs 
to somehow receive that person's mails
(21:59:06) mattock: I mean, is there any security benefit to using separate PGP 
keys and encrypting the same mail 10 times over?
(21:59:18) mattock: or rather 10 times in a row
(21:59:51) dazo: True ... but in a long term perspective, I think it might be  
better to have a webapp ... which will take the message, encrypt it with all 
pubkeys it got available and send it to the mailing list
(21:59:54) ecrist: mattock: the issue comes from having to get all members' 
keys, and the potential to miss keys for new members
(22:00:19) ecrist: dazo, we need to consider the email exchange that would take 
place in the process
(22:00:48) mattock: ecrist: agreed... there might be a lot of email exchange 
after the initial submission 
(22:01:03) mattock: in which case sending mails so that everyone can read them 
can be a terrible pain
(22:01:09) mattock: depending on the mail client, I guess
(22:01:20) dazo: ecrist:  if the webapp get the message from the reporter via 
https ... webapp encrypts the message with X pubkeys ... it will send one mail 
to the mailing list which can be decrypted by all recipients
(22:01:37) ecrist: I know.
(22:01:43) mattock: dazo: what about the response to that initial mail?
(22:01:45) ecrist: but what happens when I want to respond to that message
(22:02:10) mattock: the response has to be encrypted by the responding user 
several times with separate keys... which may be an issue
(22:02:17) dazo: the webapp would simply request a valid e-mail address ... and 
use that as From: in the mail header
(22:02:33) dazo: ahh
(22:03:00) mattock: dazo: did you see the light? :)
(22:03:26) ecrist: I use apple mail, so I have to do all this by hand (since 
I'm not interested in changing client)
(22:03:31) ecrist: which makes it really difficult
(22:03:38) dazo: maybe ... it would require much more of the sender to add all 
the pubkeys to the encryption, yes
(22:03:43) mattock: I guess it's the same with Thunderbird
(22:04:19) dazo: Enigmail do have some clever tricks up the sleeve, I think ... 
with some aliasing ... or "add these keys when sending to xxxx"
(22:04:43) ecrist: GPGMail for OS X up to 10.5 was nice, but apple breaks many 
nice plugins
(22:04:44) ecrist: :\
(22:05:07) mattock: if there's a concrete benefit in using separate keys then 
we should reconsider... but if not, using one keypair makes more sense
(22:05:32) mattock: I think we should reconsider this after a good night's sleep
(22:05:46) mattock: no need to carve this into a stone right now
(22:06:06) dazo: mattock:  pro for one key pair - easy to setup and get 
started, cons: more vulnerable if key is lost + need to rekey regularly
(22:07:01) ecrist: unless we were to setup some remailer, to which we encrypted 
the message, it decrypted, and re-encrypted to each user.
(22:07:49) dazo: mattock:  pro for several key pairs - individial setup per 
recipient requires no maintenance from ML admin ... cons: might miss new-comers 
+ some mail clients are more tricky + (I forgot now)
(22:08:53) jamesyonan: for the security submission web app, I would just have a 
script that loops through each recipient's public key and remails to them.
(22:09:12) dazo: ecrist:  good idea, probably the best solution though ... but 
someone need time to do it
(22:09:22) jamesyonan: I'm not a big fan of shared private keys
(22:09:32) mattock: however, if the "global" private key is lost, the attacker 
still needs to get to the actual encrypted mails somehow... and if he does not 
have access to a mail account on -security mailing list, how can he read the 
mails?
(22:10:02) mattock: and if some of us gets his/her machine cracked, then it's 
irrelevant if it was a "global" key or the person's own PGP key
(22:10:03) mattock: right?
(22:10:09) dazo: jamesyonan:  you wouldn't need much changes to the webapp to 
just add '-r <recipient>' to a gpg encryption process in that iteration 
instead, and send it once to the ML
(22:10:27) jamesyonan: dazo: yes
(22:10:33) ecrist: honestly, the timeframe we're looking at, I think this all 
may be a little overkill
(22:10:50) mattock: ecrist: agreed, hence ^
(22:11:24) dazo: but temporary solutions have a tendency to become "temporary" 
for a long time, especially if it does its job pretty decent
(22:11:27) ecrist: I'm still more for the idea of an annual mailing list key 
pair
(22:11:46) ecrist: we can distribute through an ssh/sftp account to ml users
(22:11:47) mattock: me too
(22:13:32) mattock: did somebody understand what I was after in my monologue 
above?
(22:14:10) dazo: mattock:  I did
(22:14:15) mattock: =me don't see problem in our scenario with using global keys
(22:15:12) mattock: I'm just trying to keep things simple
(22:15:26) dazo: mattock:  I can agree to that, as long as ML members don't use 
that key to encrypt messages to the ML ... because communication on that ML 
should be possible to authenticate some how
(22:15:56) mattock: ok, I see
(22:17:02) ecrist: I'll download thunderbird and play with some mailing lists I 
have control of and test some things out
(22:17:44) mattock: on the other hand, we are constantly communicating with 
each other without any authentication (IRC, mailinglists)
(22:17:45) dazo: I just checked the Enigmail add-on ... you can set up rules to 
add public keys when sending mails to specific recipients
(22:17:52) mattock: but let's do some more research
(22:18:14) mattock: if separate PGP keys is doable, then let's by all means do 
it
(22:18:21) mattock: that'd be optimal
(22:18:36) dazo: who does that research?
(22:18:51) mattock: ecrist volunteered I guess :)
(22:19:07) mattock: in fact, I can test Thunderbird + Enigmail, as I have it 
installed alrady
(22:19:08) mattock: already
(22:19:09) cron2: it's doable, but it depends on the mailing list software in 
use
(22:19:37) mattock: I'll check the SF.net mailinglists... what they can do
(22:20:14) mattock: could somebody else check how other email clients work with 
PGP multiple keys per mail?
(22:21:18) mattock: any Outlook users? :)
(22:21:33) dazo: poor bastards ...
(22:21:38) ***dazo hides
(22:23:25) mattock: ok, should we discuss something else for a while... I'll do 
some research tomorrow and send mail to -devel
(22:23:53) mattock: I think the "Release cycle" stuff would take too long, it's 
getting late
(22:24:02) dazo: agreed, next week
(22:24:11) mattock: cron2: what about the OpenBSD build failure?
(22:24:22) mattock: which is this: 
https://community.openvpn.net/openvpn/ticket/17
(22:24:23) vpnHelper: Title: #17 (build failure on OpenBSD 4.7 IFF_MULTICAST) 
– OpenVPN (at community.openvpn.net)
(22:24:26) cron2: well, I need an ACK on the patch... :-)
(22:24:44) dazo: I've looked at the patch ... looks sensible to me, but I don't 
have any *BSD systems to test it on right now
(22:25:04) cron2: mattock: how is buildbot coming along?
(22:25:31) dazo: cron2:  when it's tested ... I'll condense your 2 patches into 
one and commit it, hope you don't mind that
(22:25:47) mattock: cron2: haven't touched it in ~1,5 weeks, been working on 
forums.openvpn.net
(22:25:55) cron2: dazo: I'm fine with that.  It just happened to happen that way
(22:26:09) dazo: :)
(22:26:19) mattock: however, I should be able to manage to make first 
Debian/Ubuntu packages using buildbot before end of this month
(22:26:38) mattock: forums have been progressing pretty nicely
(22:27:19) ***dazo will spend some time rebasing the beta2.2 branch, to fix up 
some issues with wrongly based wintap branch
(22:27:33) cron2: well, so it's up to krzee and frk to test the patch and 
report back...
(22:27:50) dazo: fkr, I believe you meant :)
(22:27:56) mattock: dazo: should the first buildbot packages be from beta2.2 
branch? 
(22:28:01) mattock: or "allmerged"?
(22:28:01) cron2: yes
(22:28:20) mattock: although both can be provided pretty easily
(22:28:21) dazo: mattock:  yes please! :-P
(22:28:29) cron2: +2
(22:29:04) dazo: It makes sense to build both ... the difference is quite big 
already, with beta2.2 missing ipv6 stuff basically
(22:29:30) mattock: cron2: just in case you haven't heard the status of 
buildbot... I managed to get it to build OpenVPN ("allmerged") and report any 
build problems via email to me
(22:29:44) cron2: mattock: no I missed that.  Cool!
(22:29:48) cron2: which platform?
(22:29:52) mattock: now it's just packaging stuff
(22:29:58) mattock: Debian Lenny
(22:30:50) mattock: I'll start with packaging for Debian Lenny, Ubuntu 9.10 and 
10.04 ... I have easy access to all of those
(22:31:09) mattock: and they're almost the same packaging-vise
(22:32:57) mattock: dazo: I remember you talked about having a public task (or 
promise) list...
(22:33:19) dazo: yeah ... that can basically be these meeting minutes
(22:33:45) dazo: just list up subject, description and owner ... and we'll nag 
people to do their job until it's out of the list
(22:34:42) mattock: could we use Trac tasks for that?
(22:35:08) dazo: possibly, yes ... there's actually already a TODO list tracker 
there, iirc
(22:36:32) dazo: (it just needs a report query on Type: TODO)
(22:36:53) mattock: I think that'd be nicer than having a wiki page
(22:37:25) mattock: dazo: could you create the query?
(22:37:36) dazo: mattock:  sure can do :)
(22:37:51) vpnHelper ha abbandonato il canale (quit: Read error: Connection 
reset by peer).
(22:37:54) vpnHelper [~vpn@unaffiliated/krzee/bot/vpnhelper] è entrato nel 
canale.
(22:38:04) mattock: do I need to enter my own tasks to Trac, too? I have my own 
TODO list already ;)
(22:38:15) openvpn2009 ha abbandonato il canale (quit: Ping timeout: 240 
seconds).
(22:38:23) Guest12047 [~ad...@adsl-71-140-186-190.dsl.pltn13.pacbell.net] è 
entrato nel canale.
(22:38:27) dazo: those important ones would be nice
(22:39:15) mattock: I think it's nice if you guys can remember what I 
promised... although I (almost) always do what I promise
(22:39:50) mattock: let's try the Trac TODO list tomorrow
(22:39:54) mattock: see how it turns out
(22:40:37) dazo: https://community.openvpn.net/openvpn/report/12
(22:40:38) vpnHelper: Title: Public TODO list – OpenVPN (at 
community.openvpn.net)
(22:40:39) dazo: here you go :)
(22:41:20) mattock: ok
(22:41:46) mattock: are we done for today?
(22:42:12) ***dazo thinks so
(22:42:46) ***dazo hears thunder ... and is looking fwd to the rain after it 
... just hopes it comes close enough ...
(22:43:16) mattock: ok, I'll summarize the meeting tomorrow and test how Trac 
works for tracking promises :)
(22:43:28) dazo: :)
(22:43:58) mattock: I'll check the latest meeting summaries to see what 
promises are still unfulfilled and add them as tasks
(22:44:12) dazo: mattock:  thanks a lot!!!
(22:44:18) mattock: I vaguely remember some bridge scripts...
(22:44:21) mattock: no probs!
(22:44:45) dazo: waldner was the one on that one, iirc
(22:45:22) mattock: yep, my memory served me well :)
(22:45:45) ***dazo is more concerned about my forgotten tasks :-P
(22:46:00) waldner: https://community.openvpn.net/openvpn/wiki/OpenVPNBridging
(22:46:01) vpnHelper: Title: OpenVPNBridging – OpenVPN (at 
community.openvpn.net)
(22:46:22) waldner: (I didn't post it because I thought it was too late already)
(22:46:35) mattock: waldner: great!
(22:46:41) waldner: :)
(22:47:22) waldner: unfortunately I don't have a chance to test OS X or Solaris 
(and few for *BSD), so somebody will probably need to fill those in
(22:47:29) dazo: waldner:  I think we're just in the door, about to leave the 
meeting room ... it's now all the interesting discussions surfaces ... those 
hallway discussions :-P
(22:47:29) mattock: excellent stuff!
(22:47:52) waldner: the ASCII asrt diagram sucks, but I think is adequate for 
the purpose
(22:48:10) waldner: dazo: true
(22:49:10) dazo: nah, ascii art is more than good enough

Reply via email to