Hi, Here's the summary of the previous IRC meeting / sprint.
Next meeting will be on Wednesday 3rd August at 17:00 UTC. In that meeting we continue reviewing the remaining verification functions. --- COMMUNITY MEETING Place: #openvpn-devel on irc.freenode.net List-Post: openvpn-devel@lists.sourceforge.net Date: Thursday, 28th July 2011 Time: 17:00 UTC Planned meeting topics for this meeting were on this page: <https://community.openvpn.net/openvpn/wiki/Topics-2011-07-28> Next meeting will be announced in advance, but will be on the same weekday and at the same time. Your local meeting time is easy to check from services such as <http://www.timeanddate.com/world clock> or with $ date -u SUMMARY andj, jamesyonan and mattock participated in this meeting. -- This meeting was sprint, where Adriaan's (andj's) PolarSSL patches were reviewed, fixed and ACKed on the fly. The sprint focused on the "Verification functions" patchset. <https://community.openvpn.net/openvpn/wiki/PolarSSLintegration?version=14#Verificationfunctions> The above page also shows the ACK status of patches after the meeting ended. The ACK status before the meeting is visible on version 6 of the same page. If you have any comments regarding any of the patches, please chime in. If there are no complaints, the ACKed patches will be merged to main Git repository soon. --- Full chatlog as an attachment -- Samuli Seppänen Community Manager OpenVPN Technologies, Inc irc freenode net: mattock
dazo 28/07/2011 20:04:07 mattock: I won't be able to join today (as announced earlier), but for general reviews, we should seriously look at Gerrit ... http://code.google.com/p/gerrit/ ... it changes our workflow slightly, but for reviewing purpose, it seems to simplify that process vpnhelper 28/07/2011 20:04:08 Title: gerrit - Gerrit Code Review - Google Project Hosting (at code.google.com) mattock 28/07/2011 20:04:27 james should be coming very soon 28/07/2011 20:04:37 dazo: ok, no problem 28/07/2011 20:04:53 let's take a good look at gerrit and maybe take it for a spin 28/07/2011 20:05:04 dazo heads out now 19:46 andj waves 19:46 andj 28/07/2011 20:14:25 hmm, could you send him a poke e-mail? mattock 28/07/2011 20:14:41 I poked him already, but I'll try again with "poky" subject line hmm, I think he was confused about the time 28/07/2011 20:15:50 he mailed me "I can attend" a few minutes ago 28/07/2011 20:16:02 jamesyonan 28/07/2011 20:17:06 hi andj 28/07/2011 20:17:10 hi mattock 28/07/2011 20:17:34 hi jamesyonan! oh, we actually don't have topic page, I'll make one as we go 28/07/2011 20:17:52 andj 28/07/2011 20:18:07 I've prepared a few diffs of diffs, and we have this one: https://community.openvpn.net/openvpn/wiki/PolarSSLintegration 28/07/2011 20:18:08 vpnhelper 28/07/2011 20:18:08 Title: PolarSSLintegration â OpenVPN Community (at community.openvpn.net) andj 28/07/2011 20:19:07 jamesyonan: I have a question about CRL verification. It looks like the CRL verification code doesn't work with chained CRLs So if you have CA->intCA->client 28/07/2011 20:19:53 and intCA is revoked 28/07/2011 20:19:57 It won't get detected 28/07/2011 20:20:02 jamesyonan 28/07/2011 20:20:33 yeah, I didn't write the current CRL code in ssl.c andj 28/07/2011 20:20:50 I know how to fix it in Polar, not quite sure about OpenSSL anyway, we'll hopefully meet that code somewhere later this evening 28/07/2011 20:21:11 mattock 28/07/2011 20:21:18 patch status for today is here: https://community.openvpn.net/openvpn/wiki/PolarSSLintegration#Verificationfunctions vpnhelper 28/07/2011 20:21:21 Title: PolarSSLintegration â OpenVPN Community (at community.openvpn.net) jamesyonan 28/07/2011 20:21:23 it would be better to add the CRLs for each level of the cert chain to the SSL context object andj 28/07/2011 20:21:35 and let OpenSSL do it itself? jamesyonan 28/07/2011 20:21:39 yeah andj 28/07/2011 20:22:07 Might be a good feature to add after the patches get through shouldn't be too hard 28/07/2011 20:22:12 Today's first patch is https://github.com/andj/openvpn-ssl-refactoring/commit/bbe117b0217180718f9d84ed21c149b0d0f035ad 28/07/2011 20:22:17 vpnhelper 28/07/2011 20:22:18 Title: Commit bbe117b0217180718f9d84ed21c149b0d0f035ad to andj/openvpn-ssl-refactoring - GitHub (at github.com) andj 28/07/2011 20:22:43 I've taken a diff of the additions and subtractions, and placed it here: https://gist.github.com/1111954 vpnhelper 28/07/2011 20:22:44 Title: andj's gist: 1111954 Gist (at gist.github.com) mattock 28/07/2011 20:23:20 topic page: https://community.openvpn.net/openvpn/wiki/Topics-2011-07-28 vpnhelper 28/07/2011 20:23:23 Title: Topics-2011-07-28 â OpenVPN Community (at community.openvpn.net) andj 28/07/2011 20:24:29 that second diff shows nicely that no significant changes were made does that look ok? 28/07/2011 20:26:26 jamesyonan 28/07/2011 20:28:49 what's happening with if (ks->authenticated && multi->locked_cert_hash_set) ? i.e. ks->authenticated removed from conditional? 28/07/2011 20:29:04 andj 28/07/2011 20:29:10 The whole function only runs when ks->authenticated jamesyonan 28/07/2011 20:29:20 ok andj 28/07/2011 20:29:44 "verify_final_auth_checks" only gest called when ks->authenticated is set next patch? 28/07/2011 20:30:15 mattock 28/07/2011 20:30:50 jamesyonan: ACK? andj: I finally managed to wrap my head around your diff script 28/07/2011 20:31:27 pretty neat 28/07/2011 20:31:31 and simple 28/07/2011 20:31:35 andj 28/07/2011 20:31:48 It's just a diff of the additions and removals It works great for code that hasn't changed order 28/07/2011 20:32:05 which isn't all of the code unfortunately 28/07/2011 20:32:16 But we'll take those bits on a case by case basis 28/07/2011 20:32:26 mattock 28/07/2011 20:32:28 even so, if it covers _most_ that's good jamesyonan 28/07/2011 20:32:34 yes, ACK mattock 28/07/2011 20:32:37 nice! andj 28/07/2011 20:33:13 https://github.com/andj/openvpn-ssl-refactoring/commit/4254b8152e94fdd46015505157a81a3033700202 and https://gist.github.com/1111955 for the diff of diffs vpnhelper 28/07/2011 20:33:15 Title: Commit 4254b8152e94fdd46015505157a81a3033700202 to andj/openvpn-ssl-refactoring - GitHub (at github.com) andj 28/07/2011 20:33:17 is the next set then Note that tls_set_common_name is unused 28/07/2011 20:33:36 and disappears altogether in a later patch 28/07/2011 20:33:48 ks->authenticated is the same story as for the last patch 28/07/2011 20:34:22 mattock 28/07/2011 20:34:38 andj: when are these pastes set to expire? andj 28/07/2011 20:34:46 never I think mattock 28/07/2011 20:34:59 ok, I'll add the to notes section andj 28/07/2011 20:35:02 the default anyway there's a link at the bottom of every diff 28/07/2011 20:35:09 on github 28/07/2011 20:35:16 mattock 28/07/2011 20:35:16 ah ok 28/07/2011 20:35:18 jamx 28/07/2011 20:37:27 andj: you can manually set syntax highlighting for those gists to "diff", for some basic syntax coloring andj 28/07/2011 20:38:06 nice, thanks done 28/07/2011 20:38:06 28/07/2011 20:38:07 jamesyonan 28/07/2011 20:40:11 since you're testing for ks->authenticated once before these calls are made, have you confirmed that all of the places in the code that might change ks->authenticated run before the test occurs? andj 28/07/2011 20:42:10 You mean within verify_final_auth_checks? The other two functions in there are independent checks, which should run ok 28/07/2011 20:43:38 jamesyonan 28/07/2011 20:43:45 well in the current organization of ssl.c, ks->authenticated can be potentially set in multiple places andj 28/07/2011 20:43:55 the ordering there hasn't changed The functions have basically just been extracted out of their current location and placed in ssl_verify, but they're called at the same time 28/07/2011 20:44:38 jamesyonan 28/07/2011 20:44:57 the reason why those conditionals that use ks->authenticated are repeated so much is to make sure that the value hasn't changed so we would need to be sure that no function that's potentially callable from inside verify_final_auth_checks could modify ks->authenticated 28/07/2011 20:45:51 andj 28/07/2011 20:46:22 They are actually modified, so I see what you mean But it doesn't hurt the situation, it's just an extra check that gets performed 28/07/2011 20:46:44 https://github.com/andj/openvpn-ssl-refactoring/blob/master/ssl_verify.c#L1170 28/07/2011 20:48:13 jamesyonan 28/07/2011 20:48:14 wouldn't it be safer to put the ks->authenticated back into the if expressions andj 28/07/2011 20:48:16 contains the final version vpnhelper 28/07/2011 20:48:26 Title: ssl_verify.c at master from andj/openvpn-ssl-refactoring - GitHub (at github.com) andj 28/07/2011 20:48:33 as you can see, there's three checks in there locked_cn 28/07/2011 20:48:39 cert_hash 28/07/2011 20:48:44 and client_config_dir_exclusive 28/07/2011 20:48:55 For the checks to pass/fail, the value of ks->authenticated doesn't matter 28/07/2011 20:49:17 all adding it would do is to fail more quickly 28/07/2011 20:49:39 It's possible, but it doesn't hurt performance 28/07/2011 20:49:54 But I'm willing to add the checks back in 28/07/2011 20:50:03 jamesyonan 28/07/2011 20:50:29 yes, I think we should add them back andj 28/07/2011 20:50:37 Ok, patch incoming other than that, ok? 28/07/2011 20:50:46 jamesyonan 28/07/2011 20:50:51 yes andj 28/07/2011 20:51:12 The next one is a doozy https://github.com/andj/openvpn-ssl-refactoring/commit/ba69026d92958de3dbee6410c016d5b5cff01d6c 28/07/2011 20:51:13 vpnhelper 28/07/2011 20:51:17 Title: Commit ba69026d92958de3dbee6410c016d5b5cff01d6c to andj/openvpn-ssl-refactoring - GitHub (at github.com) andj 28/07/2011 20:51:23 https://gist.github.com/1111925 vpnhelper 28/07/2011 20:51:25 Title: andj's gist: 1111925 Gist (at gist.github.com) jamesyonan 28/07/2011 20:53:54 do you have a diff that shows just non-whitespace changes? andj 28/07/2011 20:54:42 https://github.com/andj/openvpn-ssl-refactoring/commit/5c0202f2be6a28b049d878b6b55019b8b1cfa5dc vpnhelper 28/07/2011 20:54:43 Title: Commit 5c0202f2be6a28b049d878b6b55019b8b1cfa5dc to andj/openvpn-ssl-refactoring - GitHub (at github.com) andj 28/07/2011 20:54:49 Patch for the last issue with the authenticated stuff 28/07/2011 20:54:55 jamesyonan: I'll see what I can do 28/07/2011 20:55:22 jamesyonan: got rid of whitespace, just reload https://gist.github.com/1111925 28/07/2011 20:57:35 vpnhelper 28/07/2011 20:57:38 Title: andj's gist: 1111925 Gist (at gist.github.com) mattock 28/07/2011 21:00:21 topic page once again up-to-date s/topic/patch/1 28/07/2011 21:00:45 andj 28/07/2011 21:01:23 nice jamesyonan 28/07/2011 21:03:20 what is with the changes to verify_user_pass (or are those just diff artifacts)? andj 28/07/2011 21:05:39 Which ones? ah, right those 28/07/2011 21:06:02 It gets factored out to a separate function 28/07/2011 21:08:51 see https://github.com/andj/openvpn-ssl-refactoring/commit/ba69026d92958de3dbee6410c016d5b5cff01d6c#L0L3103 28/07/2011 21:09:16 vpnhelper 28/07/2011 21:09:18 Title: Commit ba69026d92958de3dbee6410c016d5b5cff01d6c to andj/openvpn-ssl-refactoring - GitHub (at github.com) andj 28/07/2011 21:10:01 So what you're seeing is a bit of diff artifact, it's actually a few separate small blocks +static inline bool verify_user_pass_enabled(struct tls_session *session)+{+ return (session->opt->auth_user_pass_verify_script+ || plugin_defined (session->opt->plugins, OPENVPN_PLUGIN_AUTH_USER_PASS_VERIFY)+ || management_enable_def_auth (management));+} 28/07/2011 21:10:17 that doesn't paste well, sorry 28/07/2011 21:10:25 mattock 28/07/2011 21:15:35 jamesyonan: what do you think? jamesyonan 28/07/2011 21:19:08 why is it refactored? andj 28/07/2011 21:19:32 what? the function? 28/07/2011 21:19:37 because the verify_user_pass function was rather large, with a lot of intertwined options 28/07/2011 21:21:32 this way, it's split off from key_method_2_read, making that code clearer, and at the same time putting the verification functions in a separate module from the control channel negotiation stuff 28/07/2011 21:22:50 jamesyonan 28/07/2011 21:23:35 do you have a diff that makes it more clear what's going on in the refactoring? andj 28/07/2011 21:23:57 which part of the refactoring do you want to look at? https://gist.github.com/1111925 shows that codewise, not much changes here 28/07/2011 21:24:21 vpnhelper 28/07/2011 21:24:22 Title: andj's gist: 1111925 Gist (at gist.github.com) andj 28/07/2011 21:24:29 just movement of functions jamesyonan 28/07/2011 21:24:37 I'm just looking for some sort of verification that the refactoring doesn't change any functionality andj 28/07/2011 21:24:50 then there 's the section you asked about The "if (session->opt->auth_user_pass_verify_script..." 28/07/2011 21:25:20 part 28/07/2011 21:25:20 there's not much changed there 28/07/2011 21:25:39 but the area to look at is at https://github.com/andj/openvpn-ssl-refactoring/commit/ba69026d92958de3dbee6410c016d5b5cff01d6c#L0L3054 28/07/2011 21:25:48 vpnhelper 28/07/2011 21:25:48 Title: Commit ba69026d92958de3dbee6410c016d5b5cff01d6c to andj/openvpn-ssl-refactoring - GitHub (at github.com) andj 28/07/2011 21:26:22 What happens there is that the code from key_method_2_read moves to verify_user_pass Which is defined at https://github.com/andj/openvpn-ssl-refactoring/commit/ba69026d92958de3dbee6410c016d5b5cff01d6c#L3R654 28/07/2011 21:27:11 vpnhelper 28/07/2011 21:27:16 Title: Commit ba69026d92958de3dbee6410c016d5b5cff01d6c to andj/openvpn-ssl-refactoring - GitHub (at github.com) andj 28/07/2011 21:27:52 comparing those two bits of code starts in https://gist.github.com/1111925 at line 259 28/07/2011 21:28:18 vpnhelper 28/07/2011 21:28:19 Title: andj's gist: 1111925 Gist (at gist.github.com) andj 28/07/2011 21:28:51 as you can see, a few variables go unused but not much else changes There's not much else that I can show... 28/07/2011 21:30:05 + int s1 = OPENVPN_PLUGIN_FUNC_SUCCESS; 28/07/2011 21:30:53 - int s1 = OPENVPN_PLUGIN_FUNC_SUCCESS; 28/07/2011 21:30:53 oops 28/07/2011 21:31:01 https://gist.github.com/1111925 shows the only real differences, and they can all be explained 28/07/2011 21:32:25 which I'm more than willing to do of course 28/07/2011 21:32:37 vpnhelper 28/07/2011 21:32:41 Title: andj's gist: 1111925 Gist (at gist.github.com) andj 28/07/2011 21:34:37 Is there any area you need an clarification on? jamesyonan 28/07/2011 21:35:46 I'm concerned a bit about breaking up the function andj 28/07/2011 21:36:38 which one? key_method_2_read? It was really long earlier, making it quite difficult to read/modify 28/07/2011 21:37:07 jamesyonan 28/07/2011 21:37:11 because there are many different ways that external modules can drive the auth system -- scripts, plugins, management interface, etc. andj 28/07/2011 21:37:28 exactly, they're now more clearly defined jamesyonan 28/07/2011 21:38:14 sure -- I think it's great that you clarified it, but we need some testing to confirm that each mode works as it did before andj 28/07/2011 21:38:35 sure, in which case can we ACK it with tests for the different modes? mattock 28/07/2011 21:38:41 jamesyonan: what tests should be done? andj: +1 28/07/2011 21:38:43 andj 28/07/2011 21:39:07 I'm pretty confident about the code, and the diff reinforces that but I understand your concern. 28/07/2011 21:39:29 krzee 28/07/2011 21:39:46 and maybe those sorts of tests can be done by the master of puppets andj 28/07/2011 21:39:47 How about we ack it, with a note that we should focus alpha testing on that area? mattock 28/07/2011 21:40:05 krzee: I doubt it krzee 28/07/2011 21:40:32 ahh, figured if they could it would be great one day when 3.0 moves beyond planning mattock 28/07/2011 21:41:08 andj: makes sense, unless there's some easy set of tests we could do now jamesyonan 28/07/2011 21:41:11 this functionality is so central to the security of OpenVPN that we need to do some testing here andj 28/07/2011 21:41:53 agreed, but the clarification to this code is also very important to security there was a (non-security) bug in related code just a few weeks ago, because it was tough to read 28/07/2011 21:42:14 In fact, that bug is findable in the next patch 28/07/2011 21:42:48 jamesyonan 28/07/2011 21:42:49 agreed that clarification is important to security andj 28/07/2011 21:42:58 or the fix for it ok, so how shall we approach the user/pass verification matter? 28/07/2011 21:43:18 jamesyonan 28/07/2011 21:43:37 but I would ask, how do you guarantee that refactoring doesn't change functionality? andj 28/07/2011 21:43:52 By looking at the diff of diffs, and testing jamesyonan 28/07/2011 21:43:59 in many cases, the diffs are trivial enough that you can be reasonably sure by just looking at the diff andj 28/07/2011 21:44:17 I'm performing a lot of tests on these patches here and at work 28/07/2011 21:44:18 jamesyonan 28/07/2011 21:44:28 but in the cases where the diffs are more complex, I think we need testing that touches each of the possible auth modes andj 28/07/2011 21:44:32 but I need feedback from you guys too... The only way to get that done is by including the patch in the next alpha, and making sure it gets covered thoroughly 28/07/2011 21:45:10 jamesyonan 28/07/2011 21:45:10 so that means a test case for auth driven by scripts, plugins, management interface, etc. andj 28/07/2011 21:45:56 so, status = ACK, needs testing? and we move on to the next patch? 28/07/2011 21:46:09 jamesyonan 28/07/2011 21:46:10 yes, agreed mattock 28/07/2011 21:46:17 I would say so, and add a Trac ticket "do testing in these areas" next patch 28/07/2011 21:46:21 andj 28/07/2011 21:46:31 phew, I promise that was the nastiest patch in the lot https://github.com/andj/openvpn-ssl-refactoring/commit/71e27b1e282bf8e10724b69fe4cbeac65dee325b 28/07/2011 21:46:31 vpnhelper 28/07/2011 21:46:33 Title: Commit 71e27b1e282bf8e10724b69fe4cbeac65dee325b to andj/openvpn-ssl-refactoring - GitHub (at github.com) andj 28/07/2011 21:46:36 https://gist.github.com/1111937 vpnhelper 28/07/2011 21:46:37 Title: andj's gist: 1111937 Gist (at gist.github.com) andj 28/07/2011 21:46:42 The gist looks difficult but please look at the first comment 28/07/2011 21:46:56 If I pull it through another check 28/07/2011 21:47:12 only the extra error remains 28/07/2011 21:47:40 So the extract_x509_field_ssl remains the same 28/07/2011 21:48:03 jamesyonan 28/07/2011 21:48:39 so what are the meaningful changes here? andj 28/07/2011 21:48:51 yes, the bug fix I was talking about sec, making another diff 28/07/2011 21:48:52 https://gist.github.com/1111937#file_second.diff 28/07/2011 21:51:08 vpnhelper 28/07/2011 21:51:09 Title: andj's gist: 1111937 Gist (at gist.github.com) andj 28/07/2011 21:51:10 that is more meaningful note that x509_extension is now merged 28/07/2011 21:51:29 fixing the bug on the mailing list the other day 28/07/2011 21:51:52 is that worthy of an ack? 28/07/2011 21:52:19 vpnhelper 28/07/2011 21:53:23 RSS Update - tickets: #150: Verify that PolarSSL refactoring has not affected authentication functions <https://community.openvpn.net/openvpn/ticket/150> andj 28/07/2011 21:53:32 nive nice even 28/07/2011 21:53:34 mattock 28/07/2011 21:53:53 here's the ticket for the earlier patch: https://community.openvpn.net/openvpn/ticket/150 vpnhelper 28/07/2011 21:53:55 Title: #150 (Verify that PolarSSL refactoring has not affected authentication functions) â OpenVPN Community (at community.openvpn.net) jamesyonan 28/07/2011 21:54:03 sure, this is reasonable andj 28/07/2011 21:54:16 cool, next one is small: https://github.com/andj/openvpn-ssl-refactoring/commit/43c6568e72c10838ee851dbd96f400cdac90563d#L1L616 vpnhelper 28/07/2011 21:54:16 Title: Commit 43c6568e72c10838ee851dbd96f400cdac90563d to andj/openvpn-ssl-refactoring - GitHub (at github.com) mattock 28/07/2011 21:54:38 damn vpnHelper was faster than me andj 28/07/2011 21:54:47 yeah is 43c6568e72c10838ee851dbd96f400cdac90563d ok? 28/07/2011 21:56:15 That just cleans up a small issue with an ugly global 28/07/2011 21:56:32 don't know where it came from, but it belongs in the options 28/07/2011 21:56:54 jamesyonan 28/07/2011 21:57:34 yes, this one is fine andj 28/07/2011 21:57:48 https://github.com/andj/openvpn-ssl-refactoring/commit/9213b628af6d93d9c3f067734733323ee79c57f1 vpnhelper 28/07/2011 21:57:49 Title: Commit 9213b628af6d93d9c3f067734733323ee79c57f1 to andj/openvpn-ssl-refactoring - GitHub (at github.com) andj 28/07/2011 21:58:23 Moves the environment setup functions I'll make an extra diff 28/07/2011 21:58:26 the gist https://gist.github.com/1111940 is a bit long 28/07/2011 21:58:41 vpnhelper 28/07/2011 21:58:42 Title: andj's gist: 1111940 Gist (at gist.github.com) jamesyonan 28/07/2011 22:03:02 how much more do we have? I'm almost out of time. andj 28/07/2011 22:03:24 lots, but we can continue next week I guess mattock 28/07/2011 22:03:30 https://community.openvpn.net/openvpn/wiki/PolarSSLintegration#Verificationfunctions vpnhelper 28/07/2011 22:03:33 Title: PolarSSLintegration â OpenVPN Community (at community.openvpn.net) mattock 28/07/2011 22:03:35 quite a few there's no way we can make it today 28/07/2011 22:03:42 andj 28/07/2011 22:03:49 I haven't got time on thursday next week 28/07/2011 22:03:52 can we make it Tuesday? 28/07/2011 22:03:58 mattock 28/07/2011 22:04:04 fine with me jamesyonan? 28/07/2011 22:04:06 17:00 UTC? 28/07/2011 22:04:09 jamesyonan 28/07/2011 22:04:40 I can try to make it Tuesday, but Thursday tends to be better for me andj 28/07/2011 22:05:02 Just for the one week, I'm off for a few days then jamesyonan 28/07/2011 22:05:11 okay andj 28/07/2011 22:05:12 Shall we finish https://gist.github.com/1111940 and call it a day? vpnhelper 28/07/2011 22:05:13 Title: andj's gist: 1111940 Gist (at gist.github.com) mattock 28/07/2011 22:05:41 jamesyonan: is that patch ok? jamesyonan 28/07/2011 22:05:55 what's going on in this patch? andj 28/07/2011 22:05:58 I'm still throwing it through differs, to make it clearer The patch is a pretty straightforward move https://github.com/andj/openvpn-ssl-refactoring/commit/9213b628af6d93d9c3f067734733323ee79c57f1 28/07/2011 22:06:17 vpnhelper 28/07/2011 22:06:18 Title: Commit 9213b628af6d93d9c3f067734733323ee79c57f1 to andj/openvpn-ssl-refactoring - GitHub (at github.com) andj 28/07/2011 22:06:30 it sets up the environment for plugins and scripts I've updated the diff a little 28/07/2011 22:10:09 https://gist.github.com/1111940 28/07/2011 22:10:09 vpnhelper 28/07/2011 22:10:09 Title: andj's gist: 1111940 Gist (at gist.github.com) andj 28/07/2011 22:10:18 shows the differences a little better The serial number generation code gets moved to a separate file 28/07/2011 22:12:26 (openssl-specific) 28/07/2011 22:12:36 and that's the only major difference 28/07/2011 22:13:05 Does that seem ok? 28/07/2011 22:14:13 veryevil 28/07/2011 22:16:02 Damn missed the meeting !meeting 28/07/2011 22:16:04 !meetings 28/07/2011 22:16:08 vpnhelper 28/07/2011 22:16:09 "meetings" is (#1) See https://community.openvpn.net/openvpn/wiki/IrcMeetings, or (#2) OpenVPN developers meetings are usually held on Thursdays @ 18:00 UTC. Ask mattock or dazo for latest info. Meeting agendas and minutes are here: https://community.openvpn.net/openvpn/wiki/IrcMeetings mattock 28/07/2011 22:16:14 jamesyonan: ? veryevil: we're wrapping it up atm 28/07/2011 22:16:34 jamesyonan 28/07/2011 22:16:42 still reading the patch... veryevil 28/07/2011 22:17:20 I was after some help with the Tap-win32 driver and was hoping some one would be on here to help me jamesyonan 28/07/2011 22:18:15 is x509_cert_t an X509_NAME under OpenSSL? mattock 28/07/2011 22:18:31 veryevil: cron2 and jamesyonan can probably help you not atm, though, jamesyonan needs to run and cron2 is not here probably 28/07/2011 22:18:49 andj 28/07/2011 22:18:57 jamesyonan: no, just X509 veryevil 28/07/2011 22:19:36 thats ok I know it is rude of me just to butt in to your meeting andj 28/07/2011 22:19:47 we're almost done working on the last patch 28/07/2011 22:19:51 for today that is 28/07/2011 22:20:01 jamesyonan 28/07/2011 22:20:16 I see what you're doing -- you're changing setenv_x509 to receive a cert rather than just an x509 name andj 28/07/2011 22:20:26 exactly and getting all the enviroment setup in one function 28/07/2011 22:20:56 so less spread out 28/07/2011 22:21:05 which also improves clarity 28/07/2011 22:21:09 jamesyonan 28/07/2011 22:22:28 yes, this patch looks okay andj 28/07/2011 22:22:37 cool, thanks thanks everyone 28/07/2011 22:22:38 mattock 28/07/2011 22:22:44 nice! we made some good progress, especially with the nasty, large auth patch 28/07/2011 22:22:57 andj 28/07/2011 22:23:12 Some family just arrived, so have to run, but really happy with the progress! mattock 28/07/2011 22:23:13 jamesyonan: let me know if you can't attend next Tuesday andj 28/07/2011 22:23:26 wednesday or monday is fine too mattock 28/07/2011 22:23:27 so that we can rearrange the meeting some other day jamesyonan: would those be better? 28/07/2011 22:23:37 andj 28/07/2011 22:23:58 Thanks everyone! will be back in about 30 mins jamesyonan 28/07/2011 22:24:10 Wednesday is better for me mattock 28/07/2011 22:24:54 hmm, actually I have something on wednesday, but I can still prepare and monitor the meeting and edit the patch ACK list afterwards 28/07/2011 22:25:16 so, wednesday it is 28/07/2011 22:25:23 jamesyonan 28/07/2011 22:25:45 take care guys mattock 28/07/2011 22:26:30 you too! bye! 28/07/2011 22:26:31 (I'll send the summary to ml tomorrow evening) 28/07/2011 22:26:40 veryevil: please hang around in this channel and raise your voice when jamesyonan or cron2 is available 28/07/2011 22:27:04 patch ACK status after this meeting: https://community.openvpn.net/openvpn/wiki/PolarSSLintegration 28/07/2011 22:27:31