Stared at the patch, seems to make sense.

Tested on the t_server test rig, and behaves nicely - both alone, and
together with 4/9 (the final patch needed to fix the CVE).  Test rig has
p2mp and p2p servers.

Client tests also succeded (unsurprisingly).

As discussed on IRC, added refererences to CVE-2020-15078 to the commit 
message.  Also added some comments about the CAS_* changes to the 
commit message, which were missing.

Your patch has been applied to the master branch.

commit d01277608a248f31df3fde1883eba6dd8d16a1e4
Author: Arne Schwabe
Date:   Thu May 20 17:11:42 2021 +0200

     Add connection_established as state in tls_multi->context_auth

     Signed-off-by: Arne Schwabe <a...@rfc2549.org>
     Acked-by: Antonio Quartulli <anto...@openvpn.net>
     Message-Id: <20210520151148.2565578-3-a...@rfc2549.org>
     URL: 
https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg22419.html
     Signed-off-by: Gert Doering <g...@greenie.muc.de>


--
kind regards,

Gert Doering



_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to