On 06/04/17 11:45, Simon Matter wrote:
> 
>> I like Arne's and David's suggestion - the existing option "as is" will
>> enable X% jitter, while a second parameter can specify a more specific
>> range.  Following Arne's argument about users and percent math, it might
>> indeed be better to have "min max" here ("3500 3600"), because that is
>> really easy to understand and explain.
>
> After all the discussion I prefer the simple solution. I've changed my
> systems to the reduced 10% jitter and I'm wondering if it has to be made
> more complicated than this? I works very well and after some hours the
> renegs have spread very well. If you ask me it's perfectly fine that way
> as long as the docs clearly state that a pseudo random 10% us deducted
> from reneg-sec automatically to spread renegs.

It must be configurable, based on many years experience with helping out
on configuring OpenVPN tunnels.  There are millions of OpenVPN
configurations out in the world (and I don't even think I'm exaggerating
that much even), many small ones and quite some large ones.  There are
VPN service providers with several hundred thousands paying customers,
and there are an enormous amount of VPN service providers in addition.
In addition to all the private and corporate deployments.

So enforcing a good feature equally on all these configurations will
backfire at us.

And the more I think about the 10% randomness vlaue (or any percentage),
I really wonder how clever that is.  If a site uses --reneg-sec 1800 (I
have seen that), that means a 3 minute window.  If a site uses 14400 (4
hours, I've seen that too), that gives a 24 minute window.  These window
sizes may be perfectly fine.  But depending on the amount of connected
users, this may be troublesome too.

Last night I chatted with krzee on #openvpn-devel about this.  He does
quite some cool stuff with OpenVPN and have lots of IP phones connecting
to VPN servers.  He said that randomness by default may not be ideal for
some of the setups he manages.   But he loves the idea behind this
feature.

Krzee argued that configurations explicitly setting --reneg-sec 3600
should not have any randomness.  If a configuration does _not* set
--reneg-sec, it may have randomness with 1 hour as the base.  And those
wanting better control of the time window should use:
  --reneg-sec min max

I initially was of the opinion --reneg-sec 3600 should have randomness
(the 10-17% base).  But after having slept on it, I think Krzee have a
good point.  Setting --reneg-sec explicitly with only a single value
should not have any randomness.

With the 1 hour default, not setting --reneg-sec gives a time window of
6 minutes with 10%.  That is a reasonable default unless explicitly
overridden by either --reneg-sec 3600 (no randomness) or --reneg-sec
3000 4000 (with a 1000 seconds large time window)


-- 
kind regards,

David Sommerseth
OpenVPN Technologies, Inc


Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to