Just wondering if anyone has looked at implementing x509-track for PolarSSL?
James
On 27/02/2014 12:40, steffan.kar...@fox-it.com wrote:
Hi,
The attached patches add support for PolarSSL 1.3. These patches are for
master only, as they drop support for PolarSSL 1.2. Supporting both versions
would require a lot of #ifdef's, so I opted for dropping 1.2.
Along with PolarSSL 1.3 c
> Hi,
>
> On Thu, Apr 17, 2014 at 03:07:29PM +0300, Lev Stipakov wrote:
>> Are there any plans to support ipv6 env vars in
>> client-connect/disconnect scripts?
>>
>> There are at least 2 tickes on that feature:
>>
>> https://community.openvpn.net/openvpn/ticket/230
>> https://community.openvpn.ne
Hi,
On Thu, Apr 17, 2014 at 03:07:29PM +0300, Lev Stipakov wrote:
> Are there any plans to support ipv6 env vars in
> client-connect/disconnect scripts?
>
> There are at least 2 tickes on that feature:
>
> https://community.openvpn.net/openvpn/ticket/230
> https://community.openvpn.net/openvpn/t
Hello,
Are there any plans to support ipv6 env vars in
client-connect/disconnect scripts?
There are at least 2 tickes on that feature:
https://community.openvpn.net/openvpn/ticket/230
https://community.openvpn.net/openvpn/ticket/369
Is there anything that prevents merging any of suggested patch
On 30/03/2014 07:46, Gert Doering wrote:
Hi,
On Sun, Mar 30, 2014 at 12:48:37AM +0100, Steffan Karger wrote:
3 - Change OpenSSL builds to use hax representation
I tend toward this one - user visible behaviour shouldn't change (unless
unavoidable) depending on SSL library used.
So for me this
Hi,
On Wed, Apr 16, 2014 at 05:37:16PM -0600, James Yonan wrote:
> Someone on the Tor lists is claiming that OpenVPN isn't implementing
> SOCKSv5 authentication correctly:
>
> https://lists.torproject.org/pipermail/tor-dev/2014-March/006427.html
>
> Any ideas?
commit 2903eba5dfe35c981329a83384
There are recent patches on the devel list.
> On Apr 16, 2014, at 6:37 PM, James Yonan wrote:
>
> Someone on the Tor lists is claiming that OpenVPN isn't implementing
> SOCKSv5 authentication correctly:
>
> https://lists.torproject.org/pipermail/tor-dev/2014-March/006427.html
>
> Any ideas?
Channel Binding Key based on TLS Keying Material Exporters [RFC 5705 ] allow
additional keying material to be derived from existing TLS channel. This
exported keying material can then be used for a variety of purposes.
TLS allows client and server to establish keying material for use in the
upper