Hi, Here's the summary of the previous IRC meeting.
--- COMMUNITY MEETING Place: #openvpn-devel on irc.freenode.net List-Post: openvpn-devel@lists.sourceforge.net Date: Thursday 24th Apr 2014 Time: 18:00 UTC Planned meeting topics for this meeting were on this page: <https://community.openvpn.net/openvpn/wiki/Topics-2014-04-24> Your local meeting time is easy to check from services such as <http://www.timeanddate.com/worldclock> or with $ date -u SUMMARY cron2, jamesyonan, mattock, pekster, plaisthos, syzzer and timothe participated in this meeting. -- Discussed some of the recently found issues in "TLS versioning", including, but not limited to <http://thread.gmane.org/gmane.network.openvpn.devel/8585> Agreed to apply James' off-by-default patch to the 2.3 branch, but to add information to the man-page describing how TLS versioning can be enabled if necessary. Also agreed to keep TLS versioning on by default for Git master but to revisit that decision when 2.4 is about to be released. -- Discussed our testing procedures. While we do lots of different types of tests, some of them are entirely undocumented so we don't have a good understanding of what we test and how we do it. Decided to a) document our current test procedures in the Trac Wiki to get a good overview of the current situation b) generate a test matrix that we'll go through before each release Also agreed that automated Windows connectivity tests would be very valuable. -- Discussed the 2.3.4 release. Decided to - make the release on Monday - include the TLS versioning changes discussed above - include _bt's Windows installer fixes/enhancements (provided they pass testing) - include latest openvpn-gui which has GUI version reporting (IV_GUI_VERSION) -- In addition discussed a few pending patches briefly. -- Full chatlog as an attachment -- Samuli Seppänen Community Manager OpenVPN Technologies, Inc irc freenode net: mattock
(21.00.37) mattock: ok, the meeting is about to begin (21.00.44) mattock: a few months since the last time (21.00.52) cron2: moh (21.01.26) mattock: here are the topics: https://community.openvpn.net/openvpn/wiki/Topics-2014-04-24 (21.01.28) vpnHelper: Title: Topics-2014-04-24 – OpenVPN Community (at community.openvpn.net) (21.02.27) timothe [~chatzilla@2001:4830:11a2:941:3d00:f28b:3677:42d8] è entrato nella stanza. (21.02.39) syzzer: ah, good timothe is joining too! (21.02.52) mattock: hi timothe! (21.03.09) timothe: Not sure how long I can stay, but thought I'd drop in since I've been browsing... (21.03.12) cron2: cool (21.04.32) syzzer: so we're waiting for James then? (21.04.40) mattock: so today's main topic is TLS versioning, how it broke things, what to do about it and how this affects 2.3.4 (21.04.53) mattock: james should be here shortly (21.05.28) jamesyonan [~jamesy...@c-71-56-216-17.hsd1.co.comcast.net] è entrato nella stanza. (21.05.28) modalità (+o jamesyonan) da ChanServ (21.05.33) timothe: I just sent out a note with my latest findings. Not at root cause, but closer. (21.06.12) jamesyonan: hi guys (21.06.21) mattock: hi jamesyonan! (21.06.25) cron2: hi james (21.06.54) mattock: james: the topic list is here: https://community.openvpn.net/openvpn/wiki/Topics-2014-04-24 (21.06.56) vpnHelper: Title: Topics-2014-04-24 – OpenVPN Community (at community.openvpn.net) (21.07.00) mattock: not really a list, just one major topic (21.07.27) mattock: I assume everyone is more or less familiar with the discussion that took place on openvpn-devel mailinglist? (21.07.43) timothe: More or less... (21.08.05) mattock: I think most / all of it is here: http://thread.gmane.org/gmane.network.openvpn.devel/8585 (21.08.08) vpnHelper: Title: Gmane Loom (at thread.gmane.org) (21.09.27) mattock: could someone summarize the issue and the various fixes that were proposed? (21.09.38) syzzer: I think that the conclusion is that all the problems reported to us through the public channels can be related to TLSv1.2 adding more hashes (with different sizes) (21.09.46) timothe: I can give it a stab (21.10.15) timothe: Others may want to add/revise. (21.10.31) syzzer: go ahead, you've spent quite some time digging into this (21.10.50) timothe: TLS versioning caused OpenVPN to start using TLSV1.2 - previously it was locked to 1.0 (21.11.15) timothe: It turns out that there are some sublties in 1.2 that cause breakage in unexpected places. (21.11.41) jamesyonan: while the new hashes of 1.2 are an issue, I've also seen cases where allowing 1.2 breaks connections through firewalls (21.12.04) timothe: The big one is that 1.2 uses different (and larger) signatures on client certificates that are negotiated between client and server. (21.12.39) timothe: There are parts of openvpn that don't support this. We know that the cryptoapi doesn't. (21.13.09) timothe: There's a partially understood case in the UK that also seems to be hash-based. (21.13.44) timothe: So the question is what to do. Do we unconditionally revert to 1.0 until everything is supported. Or do we do something smarter. (21.14.08) syzzer: yup (21.14.15) timothe: clearly we do need to provide a means to force lower versions. (21.14.47) timothe: I've written something up with more detail - it's posted off the topics wiki page. (21.15.12) timothe: There are two ideas: (21.15.39) timothe: 1) James's - --tls-version-max is a big hammer. I agree we should have it. (21.16.19) timothe: 2) I suggested something more adaptive that would only downgrade when necessary, and would minimize the need for admin smarts and config file changes. (21.16.32) timothe: I think that's the quick summary. (21.16.48) cron2: afk for a moment, need to kill^wtend one of the kids (21.17.06) plaisthos: I would prefer to have at least in 2.4 to have tls 1.2 enabled on default (21.17.24) plaisthos: I see that breaking that from 2.3.2 to 2.3.3 is not good (21.17.28) syzzer: yes, I agree we should leave master as-is and just fix bugs (21.17.45) mattock: syzzer: you mean the 2.3 branch? (21.17.48) timothe: Well, this IS a bug (or bugs). (21.17.50) plaisthos: and provide some tls-max-version or something else for master (21.18.10) syzzer: mattock, no I mean leave 1.2 enabled in 2.4/master (21.18.22) mattock: ah yes, makes sense (21.18.42) mattock: so fix this problem in 2.4/master without reverting back to TLS 1.0 or whatever (21.18.56) syzzer: timothe, I totally agree, but master is instable, so I think having some rough edges there is not an issue (21.19.02) timothe: Certainly just disabling 1.1 and 1.2 in 2.3 is a quick, safe fix. (21.19.26) syzzer: instable as in not meant to be perfectly stable (21.19.42) syzzer: I'd vote for just disabling 1.2 (21.20.01) plaisthos: mattock: there is probably no fix without disabling 1.2 (21.20.04) mattock: also, after the fixes to TLS 1.2 that go into master stabilise a bit we may reconsider backporting them to 2.3 (if it makes sense anymore at that point) (21.20.12) timothe: Do we know that 1.1 doesn't break anything? James? (21.20.26) plaisthos: that is also the reason browsers waited so long to switch to tls 1.2 (21.20.34) timothe: We don't want a series of reversions. (21.21.37) syzzer: 1.1 is much less likely to break stuff (21.22.13) jamesyonan: I would tend to vote for not enabling tls versioning unless the directive is explicitly provided (21.22.32) jamesyonan: we can always change that policy in the future when TLS 1.2 is better supported (21.22.33) timothe: (I mean in the 2.3 series.) "Less likely" doesn't go well with "stable"; if not sure, why not go all the way back to 1.0. The added security isn't all that much, right? (21.22.57) syzzer: 1.1 does bring some significant security improvements (21.23.06) syzzer: 1.2 just adds ciphers suites (21.23.41) timothe: For security geeks, yes. For real world, is it worth the risk of having to say 'oops' again? (21.24.18) syzzer: well, the thing is that I haven't seen any problems that we can relate to 1.1 yet (21.25.27) jamesyonan: I've seen issues where just the act of using tls-versioning breaks stuff (21.25.44) syzzer: ah, that was what I was about to ask (21.25.58) timothe: I wouldn't object to a directive that enabled 1.1, but for stable, as a customer, I would think 1.0 should be the default until 1.1 is proven innocent. (21.26.16) jamesyonan: these issues usually involve government firewalls (21.26.37) timothe: We shouldn't impose an adventure on customers - at least, not on'stable' releases. (21.26.49) jamesyonan: timothe: agreed (21.27.05) syzzer: since jamesyonan actually sees problems regarding tls versioning I agree (21.27.58) cron2: so that would translate to "use James' patch to disable-by-default tls-versioning for 2.3, and go fixing it for good in 2.4"? Or "merge in both, and then go searching for a proper fix in 2.4"? (21.28.41) mattock: what does significant security improvements mean? (21.28.53) mattock: oh, sorry (21.28.56) syzzer: the protocol of 1.0 is just broken (21.29.20) mattock: (was responding to backlog) :) (21.29.30) syzzer: yes, an attack is not easy, but if you're dodging governments, that's really bad (21.30.49) mattock: what about the TLS 1.2 -related issues we've had so far (21.30.50) syzzer: but if you can't dodge governments at all using 1.2, let's just make it as hard as possible ;) (21.31.29) mattock: ... would moving to TLS 1.1 fix those? (21.31.33) jamesyonan: people can always add tls versioning if it's important to them (21.31.53) timothe: 1/3 to 1/2 of the 1.2 issues are understood. 1 or two are not. We think 1.1 doesn't have them. (21.31.55) syzzer: jamesyonan: yes, which I why this should be 'good enough' for now (21.32.12) jamesyonan: OpenVPN clients can even expose the option more prominently in their UIs, so end users can decide (21.32.54) timothe: I'm not for putting it in a GUI. We need to make it 'just work'. (21.33.03) Tech-49 [~ma1com...@host-92-20-12-238.as13285.net] è entrato nella stanza. (21.33.29) syzzer: timothe: making it possible to forcebly enable 1.2 should be fine (21.33.31) mattock: did others have a look at Timothe's suggestion (#2 above) (21.33.48) syzzer: but I agree we should not add 'disable 1.2' buttons (21.34.24) timothe: The less there is in a UI, the greater the chance that the secure choice will be made. End users really don't understand security. (I'm one, though I know more than most.) (21.34.27) syzzer: I think #2 is medium-term, in that it means we have to wait for bug reports and then go add directives in the code (21.35.04) timothe: Not necessarily. We can actively go thru the code for 1.2 dependencies. (21.35.29) syzzer: yes, but I'm not sure we'll catch all the corner cases (21.35.45) timothe: And it does provide a framework for 1.3 or 1.4 - in the future, we would only turn things on when they are tested... (21.36.18) syzzer: but what is tested? the TLS versioning was tested by thousands of Android clients already (21.37.05) timothe: Hopefully, we learn to test better. But there is always risk; the question is how to manage it. (21.38.27) cron2: syzzer: I think the issue with the android clients might be "if they are connecting to a 2.3.2 server that does not have tls-versioning, the code is never excercised" - which might be why James saw so many more issues than plaisthos (21.38.29) syzzer: the problem here is that OpenVPN has a myriad of options, and we (or at least I) don't have time to test them all unfortunately (21.38.59) cron2: +1 - we do our best, but stuff like that ("with firewall type X in between") can not be exhaustively tested (21.39.05) syzzer: cron2: point taken (21.39.34) cron2: otoh, our corp server is running git master with ios clients since $months, so the code *is* used there, and didn't cause issues (21.39.51) timothe: That argues for: (a) documenting what's tested and recommended (b) removing/deprecating marginal options (c) enlisting users who can test what the core team can't. (21.40.30) mattock: agreed (21.41.00) cron2: easier said than done. What sounds uninteresting for me ("cryptoapi on windows") is a killer feature for someone else... (21.41.23) timothe: Then we get the someone else (in that case, me) to agree to test it for us. (21.41.28) cron2: and we know that we have no idea what weird (to us) setups people use "Because it works" (21.41.40) syzzer: ^ that. Still, we try to do exactly that where possible ;0 (21.42.15) cron2: yep. My test framework now runs ~10 different t_client tests before I push anything :-) (21.42.18) pekster: fwiw, I did build some preview packages that I've had on bitbucket (formerly sourceforge) for a few months now, using 2.3.2 as a base with the TLS versioning (21.42.26) timothe: So we ask for help. People usually will help if one asks. "Please tell us what config you are using so we can test it. By the way, can you test for us?) (21.42.44) pekster: In the future, I'm happy to publish them (or make them availbale for "official" signing if we'd like) so early-adopters can test. If it's useful. (21.43.13) cron2: I think we should just get mattock to do nightly builds of "master" and publish them :-) (21.43.24) syzzer: doesn't mattock already do something like that? (21.43.30) pekster: Sure, though beware things like pulling in snappy deps for binary-dists (21.43.41) pekster: (unless the buildsystem is doing --disable-snappy already) (21.43.42) cron2: syzzer: tbh, no idea (21.43.46) mattock: syzzer: I did at one point, then gave up (21.44.11) mattock: also, if we want to get people more involved in testing (which makes sense), we need to be able to define some precise tests they should do (21.44.16) cron2: ok, can we (please) re-focus on "what are we going to do short-term to 2.3.4-to-be, and long-term to master"? (21.44.21) timothe: Back to immediate topic. Is there a decision? (21.44.25) cron2: heh :) (21.44.44) jamesyonan: why don't give tls versioning some time with early adopters then make a decision down the road when to make it the default (21.45.05) cron2: jamesyonan: so you'd opt for "disable by default in 2.3, enable by default in 2.4"? (21.45.13) cron2: (s/2.4/master/) (21.45.18) pekster: Will a 2.3.4 have an option flag then for people who want to keep it? Or will 2.3.3 have it and 2.3.4 not? (21.45.42) pekster: So long as we're clear in the release notes, I'm sort of okay either way, but removing it completely seems wrong (21.45.44) cron2: pekster: there's a patch from James on the ML to make it off-by-default, unless you do --tls-min-version 1.0, which would turn it on (21.46.12) pekster: Ah, okay. Fine by me so long as it's clarified in the release notes (21.46.21) syzzer: yes, even though I still think that is totally confusing behaviour, I vote for using james' patch (21.46.25) jamesyonan: my vote would be to apply the off-by-default patch now, then revisit before 2.4 is released (21.46.38) syzzer: it does give users the ability to enable it / test it (21.46.39) cron2: jamesyonan: apply to both 2.3 and 2.4? (21.46.40) timothe: Which also needs tls-max-version to cap it at 1.1 for some. (21.47.07) cron2: (when I say "2.4" this is "what we have in master now, work in progress") (21.47.11) jamesyonan: cron2: yes (21.47.40) syzzer: 2.4 too? (21.48.06) syzzer: that gives us less test coverage (21.48.14) cron2: it would need an addition to the man page, to clarify that "option not set" = "tls 1.0, only" (21.48.21) jamesyonan: yeah, that's a good point (21.48.23) timothe: Once it's in config files, the directive has to exist for the indefinite future. (21.48.45) syzzer: timothe, that can also mean ignore it if it has no meaning anymore (21.49.10) syzzer: (and issue a deprecation warning) (21.49.15) pekster: It's been discussed before, and I think long-term is gives flexibility to defining a security policy (or policy for passing whatever $appliance has Special Needs.) (21.50.20) plaisthos: IMO I think it is wrong for future OpenVPN releases to have TLS 1.0 only behaviour as default (21.50.30) plaisthos: If you don't do that for 2.4 when will we do it? (21.50.34) timothe: sure, but if we say 'tls-min' means use no less than, and 'tls-max' means 'at most', those aren't ephemeral promises. I think tools deliver mechanisms; configs deliver policies. (21.50.36) cron2: plaisthos: "future" being "2.3.4" or "2.4.0"? (21.50.37) pekster: The only drawback I see is that people depending on the 2.3.3 behavior now need a new option. Manpage + release notes need to clarify any change to this as it's not-backwards-compat (21.50.46) jamesyonan: I'm okay with off-by-default patch only applied to 2.3 for now (21.50.47) plaisthos: cron2: future begin 2.4.0 (21.51.33) jamesyonan: with 2.4 we can revisit before final release (21.51.36) cron2: ok, I think we seem to agree on 2.3.4 -> "off-by-default patch, with man-page explaining what happens" (21.51.57) plaisthos: Just now the browsers (Chrome and FireFOX) have turned on TLS 1.2 on by default (21.52.10) plaisthos: that will probably also help to find and fix these TLS 1.2 vs TLS 1.0 bugs (21.52.15) pekster: I agree with plaisthos on making it a core goal for 2.4 to have this on-by-default. It's a major version bump, and should provide Better Security by default, IMO (21.52.24) pekster: But, that's for a later meeting I guess :) (21.52.44) syzzer: pekster, plaisthos: +1 (21.52.52) cron2: you agree what you want to see in git master "right now" and tell me what to merge where :-) (21.52.54) jamesyonan: +1 (21.53.12) timothe: I'm all for making 1.2 work. But it does have to work. off by default for 2.3.4 is fine with me. On by default (so we can debug) in master is my vote. (21.53.36) timothe: (If I get a vote...) (21.53.50) plaisthos: jamesyonan: did you revert to tls 1.0 only in PolarSSL/OpenVPN3 as well? (21.54.25) jamesyonan: yes (21.55.09) syzzer: brb (21.55.54) jamesyonan: So I ACK on applying off-by-default patch to 2.3 only and revisiting the question before 2.4 release (21.56.12) ***plaisthos agrees (21.56.33) ***cron2 idly speculates whether our ACK rules permit James to ACK his own patches :-) (21.56.55) pekster: Put my name down as a feature-ACK too if you really want :P (21.57.01) cron2: nah (21.57.17) cron2: I was just being silly (21.57.30) jamesyonan: well I'm actually NACKing my own patch for master :) (21.58.13) plaisthos: jamesyonan: will you send a patch for ip_forward so can ACK that version? (21.58.14) mattock: good, a decision based on consensus with this little fighting (21.58.17) mattock: :P (21.59.26) jamesyonan: ip_forward? (21.59.27) mattock: so just to make sure I understood this correctly... we only need to add the "off by default" patch to 2.3.4, plus a man-page patch and we're done with this? (21.59.43) syzzer: ACK ;) (21.59.45) cron2: mattock: well, we still need to fix the actual problems :-) (21.59.50) mattock: of course :) (22.00.03) cron2: "we" being "lots of people, not me" (22.00.12) mattock: was that a disclaimer? (22.00.30) pekster: mattock: Ideally a "well-visible" note of this in the changelog, not just a line-item under James' patches (easy to get lost, angry users, etc) (22.00.48) cron2: mattock: no, it's just that I'm a network coder, not a crypto geek (22.00.54) plaisthos: jamesyonan: Subject: [Openvpn-devel] [PATCH 2/4] Added PIP_OPT_MASK for process_ip_header fast exit path. (22.01.30) mattock: did TLS versioning go into 2.3.3 or 2.3.2? (22.01.36) pekster: 2.3.3 (22.01.38) plaisthos: 2.3.3 (22.01.38) cron2: 2.3.3, brand new (22.01.42) mattock: so it has not been out there for long (22.01.54) plaisthos: which many users downloaded because of heartbleed (22.01.55) pekster: No, but I can tell you that $work is relying on this ;) (22.02.08) mattock: plaisthos: good point (22.02.30) mattock: are we done for today? (22.02.44) syzzer: when will the new release be? (22.02.51) plaisthos: I have looked at Patches list and there is nothing pressing for 2.3.4 (22.02.58) mattock: I vote next monday (22.03.17) mattock: I don't think it's a good idea to release anything on Friday (22.03.17) cron2: mattock: why specifically "monday"? (22.03.20) cron2: ah (22.03.26) timothe: Are there testing criteria? (22.03.47) mattock: "if it builds, ship it"? :P (22.03.55) plaisthos: compile it, ship it? (22.03.58) cron2: there's actually one patch I want to merge - --multihome on FreeBSD is broken, the patch is simple and straight-forward, and has been rotting on -devel for 4+ months now "lazy ack rules" (22.04.09) mattock: cron2: sounds good (22.04.27) mattock: timothe: would you like to be more involved in improving our testing procedures? (22.04.36) cron2: timothe: well, I have my t_client test framework which connects to a few reference servers and tests whether the basic thing ("connect, authenticate, ifconfig/route, move packets") works (22.05.07) mattock: cron2: what we could improve is the server side (22.05.23) mattock: have several different versions of openvpn running on the server-side (22.05.38) mattock: or a few at least (22.05.42) cron2: mattock: I have a test server that builds master every day, and then fires off t_client tests on a different machine (22.05.53) cron2: caught the --inetd breakage :) (22.06.01) mattock: good (22.06.18) timothe: I can certainly review, but as I'm quite new to the product, I'm hardly an expert reviewer. (22.06.39) cron2: but yeah, testing could certainly be improved - more code paths tested ("I have socks and http proxy tests now"), etc. (22.06.57) timothe: I expected to install it and have it work for me - but things rarely work out that way :-( (22.07.20) syzzer: I do run (basic) pkcs#11 tests for polarssl builds, I could do those for openssl too probably (22.07.29) mattock: I guess it depends on how far your needs deviate from the lowest common denomitor kind of setup (22.07.40) cron2: syzzer: that would be good. I have no idea about pkcs#11 (22.07.52) mattock: perhaps a good place to start would be to document what kind of tests we're doing right now? (22.07.58) plaisthos: I let Android users test OpenVPN -master on the client side d: (22.08.04) cron2: mattock: we do need an automated windows test! (22.08.12) mattock: cron2: agreed (22.08.26) mattock: that will be interesting to setup (22.08.30) cron2: mattock: ... and I still wonder why your windows snapshots are building ok (22.08.39) timothe: Yes, document. Then put a checkbox beside each one, and don't release unless all pass. That's a start... (22.09.06) mattock: I'll check if we have something to start from in our wiki... (22.09.25) syzzer: I came along this page a while ago: https://community.openvpn.net/openvpn/wiki/SettingUpBuildslave (22.09.26) vpnHelper: Title: SettingUpBuildslave – OpenVPN Community (at community.openvpn.net) (22.09.30) syzzer: I guess that needs an update ;) (22.09.51) cron2: mattock: as for the 2.3.4 release, d12fk has pushed a new gui version. We should see IV_GUI_VER now, but maybe we should test this "before monday" to make sure it actually works :-) (and I still want the "build version" in there) (22.09.55) mattock: there is something, yes, but it's very high-level, nothing that concrete: https://community.openvpn.net/openvpn/wiki/OpenVPN_QA (22.09.57) vpnHelper: Title: OpenVPN_QA – OpenVPN Community (at community.openvpn.net) (22.10.03) syzzer: I actually run Windows tests for OpenVPN-NL releases btw (22.10.12) cron2: syzzer: how do you do that? (22.10.24) mattock: guys: I will add more concrete stuff to the page above (22.10.25) syzzer: but thats using company tooling (not opensource :( ) (22.10.32) mattock: you can fill in what types of tests you're running atm (22.10.56) ender| ha abbandonato la stanza (quit: Ping timeout: 246 seconds). (22.11.00) cron2: plaisthos: did you get approval for coverity? (22.11.20) mattock: syzzer: re: buildslave page: yes, a guy wanted to donate an arch x64 buildslave today, so I slightly updated the page (22.11.23) mattock: it's still somewhat outdated (22.12.47) plaisthos: cron2: I have to login to check (22.12.52) plaisthos: cron2: I will check tommorrow (22.13.00) plaisthos: I don't have the credentials on this machine (22.13.30) ender| [krneki@2a01:260:4094:1:42:42:42:42] è entrato nella stanza. (22.13.54) mattock: I think we're done for today (22.13.58) mattock: agreed? (22.13.59) cron2: plaisthos: not yet. Two people came in in April 2014, but not you. Weird (22.14.19) cron2: mattock: semi. Plaisthos: did you have time to look at the EC patches? (22.14.23) plaisthos: mattock: Yes. I think so (22.14.55) plaisthos: cron2: 2/2 is the same as in v1 set I think (22.15.03) cron2: yeah, 2/2 is easy (22.16.04) plaisthos: syzzer: is there anything apart PolarSSL and #ifdef changed? (22.16.19) timothe ha abbandonato la stanza. (22.16.33) syzzer: plaisthos: no (22.16.46) plaisthos: + msg (M_DEBUG, "Your OpenSSL library was built without elliptic curve support." (22.16.49) plaisthos: + " Skipping ECDH parameter loading."); (22.17.17) plaisthos: are you sure that you want that in show_available_curves() and not in tls_ctx_load_ecdh_params (22.17.45) syzzer: dammit, copy-pasted that, forgot to change the msg :/ (22.18.02) plaisthos: there is no message at all in load_ecdh (22.18.05) syzzer: but it's on purpose not in tls_ctx_load_params (22.18.35) plaisthos: It would show up every start ... (22.18.37) syzzer: no, that would probably just annoy users. I believe in "only issue warning if its relevant' (22.19.07) pekster: At debug extra noise is fine (enable_debug=no by default) (22.19.11) cron2: ok, so we'll see a v3 of 1/2 then, with the the right message text :) (22.19.18) pekster: At non-debug verb levels though, I agree (22.19.29) ***syzzer makes mental note to not submit patches after 23:30 anymore... (22.19.50) cron2: "still 2:10 hrs to go" (22.19.51) syzzer: cron2: yup (22.20.00) plaisthos: :) (22.20.41) cron2: ok, another thing that is pending (22.20.50) cron2: certificate serial numbers, in decimal or in hex (22.21.09) cron2: since it is (for openssl) a documentation issue only, I think that should also go in, and into 2.3.4 (22.21.49) cron2: and we could include James' patch to make polarssl serial numbers prefixed with "x", so it's clear "these are hex" (22.22.06) cron2: (which means the documentation needs more updating, to explain that there could be both variants) (22.22.24) syzzer: ah, yes. I did think about that one last night (once again, do not submit patches after 23:30...) (22.22.55) syzzer: if we're changing the representation, it might be better to just change it to match OpenSSL behaviour (22.23.09) syzzer: putting an 'x' in front will break script too probably (22.23.21) n13l: syzzer: hi, i did post patch 18:33 :-) (22.23.29) cron2: syzzer: how complicated is it to make PolarSSL spit that out in serial? (22.23.33) cron2: "5 lines" or "50 lines"? (22.23.55) syzzer: something like 20 I think (22.24.13) plaisthos: .oO(String.format("%d", Integer.parseint(serial,16))) (22.24.41) cron2: "it could be up to 20 digits" (22.24.48) syzzer: plaisthos, that actually might not be such a bad plan... (22.24.55) syzzer: the C-variant ofc ;) (22.26.08) syzzer: I'll figure it out and send a patch (22.26.20) cron2: thanks (22.26.57) plaisthos: syzzer: module the BigINt stuff going on there ... :/ (22.27.29) syzzer: n13l: hi :) sorry for not responding - other stuff needed my attention (like the current TLSv1.2 breakage) (22.27.53) cron2: with that, I think I'm fine with calling it a day (22.28.29) syzzer: good, because I have to go too :) (22.28.34) mattock: nice! (22.28.55) cron2: *wave* (22.28.56) mattock: I think I'll summarize this last section as "Discussed various pending patches. Period." :) (22.29.23) syzzer: sounds reasonable (22.29.25) syzzer: bbl :) (22.29.38) mattock: good night guys! (22.29.47) cron2: oh, and mattock needs to merge and test the installer improvements :) (22.29.57) cron2: (just looking at openvpn-build...) (22.30.01) mattock: oh yes, I do (22.30.22) mattock: shall we add them to 2.3.4? (22.30.33) mattock: provided they work ok (22.30.35) mattock: of course (22.30.49) cron2: I'd say so, I had quite a bit of troubles with users not closing the gui before upgrading (22.31.13) mattock: especially in conjunction with the heartbleed vulnerability the current installers are a bit dangerous (22.31.31) mattock: because the old SSL lib could be left lying around (22.31.49) mattock: so let's put the fixes/enhancements to 2.3.4 (22.31.54) cron2: yes (22.32.13) cron2: what is $OPENVPN_GUI_VERSION used for in openvpn-build? (22.32.22) cron2: it is set to "6" but "git grep" can't find anything where it's used (22.33.12) cron2: ah, it's downloading openvpn-gui-$number.tar.gz from somewhere? Or is it building that tarball from git checkout? (22.33.12) mattock: currently it's 6, but I generated that version from openvpn-gui git master ... d12fk had not tagged the release or provided a "real" openvpn-gui-6 installer (22.33.16) mattock: it is (22.33.22) cron2: which one? (22.33.23) mattock: it is downloading a tar.gz (22.33.39) mattock: which is basically openvpn-gui dir wrapped up into tar.gz after running autoreconf (22.34.09) cron2: ok, I'm not going to test the new gui tonight... this will have to wait until I had more sleep (22.35.36) mattock: and d12fk's new GUI with the IV_GUI_VERSION thing will go into 2.3.4, right? (22.36.18) cron2: hopefully. he says he has pushed it yesterday evening, which is why I'm curious and want to test that (22.36.37) cron2: ... and figure out how to get $INSTALLER_VERSION into that (22.36.55) cron2: as 2.3.4-I001 could be broken, and 2.3.4-I002 good, with the very same gui version... (22.37.57) mattock: so embed the installer version into the IV_GUI_VERSION string? (22.38.21) cron2: yep, like a "build I002" or so (Tunnelblick does that, which I definitely like) (22.39.01) cron2: and with that -> sofa. Have a good night, all of you (22.39.09) mattock: good night! (22.39.21) plaisthos: good night