On Thu, Apr 21, 2016 at 10:36 PM, Gert Doering <g...@greenie.muc.de> wrote:
> On Thu, Apr 21, 2016 at 10:27:50PM +0200, Jan Just Keijser wrote:
>> there are a few notes about this patch:
>>
>> - I've tested it on Linux only
>> - it works when pushing both --cipher andi/or --auth
>> - works by re-doing part of the encryption setup (you'll see some
>> messages fly by twice )
>> - pushing an HMAC (e.g. push "auth SHA256"") does **not** work in
>> combination with --tls-auth: when tls-auth is used all incoming packets
>> are signed using the "original" HMAC cipher and you won't even get to
>> the "push" stage to get the correct cipher.
>
> Does it work on the server side, that is, having a ccd/ file or script
> that tells the server "cipher <foo>" for a given client?

No, this is client-side support to accept pushed ciphers.  This is no
multi-cipher support on the server side.

> Otherwise: impressive :-) (I leave the actual code review to Steffan)

Very cool indeed!  We already had some discussion on #openvpn-devel.
Some minor things popped up, but I'll let that settle a bit before
really getting into it on the list.

-Steffan

Reply via email to