On 05/04/17 16:58, David Sommerseth wrote:
> On 05/04/17 17:53, David Sommerseth wrote:
>> On 05/04/17 16:42, debbie10t wrote:
>>>

>>>
>>> A different approach could be like so:
>>>
>>> --reneg-sec 3600
>>> --reneg-sec-1sttime-rand 1|0 (The name here for detail)
>>

>
> Oh, and in regards to the first-time/non-first-time .... if we decide
> for such flexibility, that can be a flag after the randomness.
>
> For example  --reneg-sec 3600 12 first-only
>
> I am far from convinced if that should be configurable or not.  But
> still, this approach is still far better than introducing new options.
>

Ok - accept that new options is not preferred but ..

I like the idea of "first-only" addition (which is more or less as I 
proposed anyway) - And so, instead of having randomness in the reneg-sec
itself, it is only randomness in the first run, after that the expected
behaviour would be restored.  eg: --reneg-sec 3600

To my mind (as a non programmer) this essentially boils down to
setting the first --reneg-sec timer to something between 1 and
3600 (default). This affords a much larger window for the scattering
of clients and further behaviour is "as expected now".

and it looks very non-instrusive to me ..

Regards




------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to