Am 26.03.21 um 11:30 schrieb Antonio Quartulli:
> Hi,
> 
> On 26/03/2021 08:12, Gert Doering wrote:
>> Now...  if we consider a scenario where OpenVPN packets are not subject
>> to be routed into the tunnel (Linux VRF, policy routing, ...) - which
>> is actually something I want to see happen :-) - twisting this feature 
>> into some other direction might make the coding effort useful: what 
>> about "we only block packets that match destination IP *and port and
>> protocol* with what OpenVPN is using"? 
>>
>> So, if we talk to 1.2.3.4/udp/1194, only packets inside the tunnel
>> destined to 1.2.3.4/udp/1994 would be dropped, and everything else can
>> be sent freely - because those are never "recursive openvpn packets".
> 
> I was just questioning this feature per se: why do we want to *allow*
> real loops?

On Android where VPN setup is a bit different from normal setup.
Different enoguh that the recursive routing message is easily triggered
and the client always sets the allow-recursive-roouting option. I cannot
remember the exact details anymore.

Arne



_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to