-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 11/03/11 16:23, Federico Heinz wrote: > I'm sorry, folks, I'd like to ask for some clarification. > > My patch was NAK'd on implementation issues. I offered alternatives > to them. I got no answer to them. > > Should I bother implementing one of the alternatives, or will the > patch be disregarded nonetheless? If the patch does stand a chance to > be accepted with a better implemantation, should I go with > getiffadrs() or the current approach to get the interface's IP > address?
Sorry that you haven't received any response quickly. Most of us here are having full time jobs which is not directly related to OpenVPN. But I have been thinking about this a lot. And I decided to have a peek at what other open source products does. I checked against openssh-5.8, vsftpd-2.3.4, nginx-0.9.5, lighthttpd-1.4.28 and varnish (git HEAD = 7058d471b586151e). I also checked against the documentation for ISC BIND 9.8, None of these products supports network device name for setting up listen addresses. I chose these products as they are all aimed at being accessed from the "wild Internet", accepting connections from whoever who are not necessarily known to the server. Which makes their use cases closer to OpenVPN. After some pondering, I begin to wonder if this feature really is as clever as we believe it is. I do stand corrected in regards to dynamically changing the listening IP address, and in hindsight supporting such a feature probably makes things even worse. But to summarise it somehow, based on my pondering ... a quick pro/cons list: + makes config easier for sys-admins - OpenVPN will only listen to the first identified IP address, which will need to be both IPv4 and IPv6 aware. This will become a support issue pretty quickly. - 6 different open source products which has a similar usage profile (open access from the Internet) do not have this support. - Can cause some surprises, if people re-plug a network cable between two network devices. Suddenly OpenVPN is available on a network segment it should not be available on, due to not being restricted to particular a IP address. Of course it should be a firewall stopping it in front, but that might have been disabled as well - for unknown reasons. Surely this is a PEBKAC issue, but they do happen more often than we like to admit. So, is this really such a good idea? I'm not withdrawing my feature NACK now, but I'm suddenly not so convinced this is clever. Unless someone comes with convincing arguments. But please share your opinions - every one who got an opinion about this. kind regards, David Sommerseth -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/ iEYEARECAAYFAk16dFIACgkQDC186MBRfrpyPQCfVP2m20ZhWfYN1yPeic4FgSqy QPAAnRqym4IK77PSF7WIfzm4jd8ton3l =QE4V -----END PGP SIGNATURE-----