>
>
> On 05/04/17 17:13, debbie10t wrote:
>>
>>
>> On 05/04/17 16:58, David Sommerseth wrote:
>>> On 05/04/17 17:53, David Sommerseth wrote:
>>>> On 05/04/17 16:42, debbie10t wrote:
>>>>>
>>
>>>>>
>>>>> A different approach could be like so:
>>>>>
>>>>> --reneg-sec 3600
>>>>> --reneg-sec-1sttime-rand 1|0 (The name here for detail)
>>>>
>>
>>>
>>> Oh, and in regards to the first-time/non-first-time .... if we decide
>>> for such flexibility, that can be a flag after the randomness.
>>>
>>> For example  --reneg-sec 3600 12 first-only
>>>
>>> I am far from convinced if that should be configurable or not.  But
>>> still, this approach is still far better than introducing new options.
>>>
>>
>> Ok - accept that new options is not preferred but ..
>>
>> I like the idea of "first-only" addition (which is more or less as I
>> proposed anyway) - And so, instead of having randomness in the reneg-sec
>> itself, it is only randomness in the first run, after that the expected
>> behaviour would be restored.  eg: --reneg-sec 3600
>>
>> To my mind (as a non programmer) this essentially boils down to
>> setting the first --reneg-sec timer to something between 1 and
>> 3600 (default). This affords a much larger window for the scattering
>> of clients and further behaviour is "as expected now".
>>
>> and it looks very non-instrusive to me ..
>>
>
> To clarify:  --reneg-sec 3600 RAND
>
> Where RAND indicates that the first-run timer should run from a random
> integer from 1 upto the value of --reneg-sec.  RAND does not require a
> user to specify an amount.

But then, why not just do it always and forget about the additional option?

Simon


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to