> I think TOS pass-through would be a nice optional feature to add to OpenVPN.
> I would be curious to know how this works for you, i.e. extracting the TOS
> from the TUN/TAP data and calling setsockopt before the encrypted packet gets
> written to the UDP port.
It does work.
Some results are
On Wed, 30 Oct 2002, James Yonan wrote:
>
> Some caveats that immediately come to mind:
>
> * Since OpenVPN does not assume a particular TUN encoding of IP traffic, this
> patch requires OpenVPN to assume an offset of the TOS bits.
Well if you end up looking at the ip header by using struct iphdr
Craig Knox said:
> Hi,
>
> > One of the problems I can see with this is that you give some information
> > away about the payload, mind you not much, but you are regardless.
>
> That is true - but for me its either give away TOS or have things become
> unresponsive.
>
> > I
> > guess if you r
Felipe Sanchez said:
>
> Hi, I've been using openvpn for about a month now with great success, I
> have already setup about a dozen VPN connections in various environments.
>
> Lately I began wondering what would happen if I don't want some peer to be
> able to connect to my server anymore? Fro