> Testing the signatures and the driver on ARM64 would be good. We don't 
> have any ARM64 Windows hardware at our disposal. 

Drop me a package and I'll take it for a spin. I have at least one device
with Secure Boot set up on a released build (1803).

> We don't have any tap-windows6 -specific tests at the moment, so I 
> generally just run the OpenVPN test suite against a bunch of OpenVPN 2.x 
> / Access Server / Private Tunnel servers: 
> <https://github.com/OpenVPN/openvpn-windows-test.git> 

I can give that a shot. If I can't figure something out from the README,
I'll ask questions here.

> Given that tap-windows6 driver has seen lots of modifications having 
> more focused tests would be good. Any ideas what we should test and how? 

As for tap-windows6, I have to profess a merely general understanding of
what it does: It allows the usermode daemon to read, intercept, and emit
raw network traffic, while the firewalling, routing, and encryption are
done by the OpenVPN daemon after the traffic leaves the driver.

Given that, I can think of a few test cases (not ordered in any way):

(All tests should run under Driver Verifier with basic sanity and NDIS
checks enabled.)

 * Heavy load on multiple TAPs
 * Upgrade
 * Empty, small, ~MTU, >MTU, and Jumbo packets
 * API fuzzing
 * Power transition testing

...but all of these take varying levels of dev investment to automate.

The easiest next step would be to expand the ping test to try varying
packet sizes (-l). (Windows' ping doesn't have a 'flood' option...)

My 2c,
Jon

Attachment: pgpOcqUOVOlMd.pgp
Description: PGP signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to