Hi,
We have a few pending pull requests in openvpn-gui. At least one of them
(put --log first in the command line) is tiny and may be reviewed without
getting sullied by association to windows:-)
Could anyone from here please take a look? Here is a link:
https://github.com/OpenVPN/openvpn-gui/pu
Hi,
On Fri, Feb 19, 2016 at 07:02:21PM +0530, Shubham Chauhan wrote:
> I am currently working on a project that requires SSL VPN to use session
> resumptions.
>
> I need to add the TLS Session Resumption functionality to OpenVPN. Any
> starters as in how I could achieve this?
> I know about the S
Thank you for such a quick reply.
I agree that VPN sessions and SSL sessions are not necessarily the same.
Let me be more specific with my question for a better discussion.
In an active OpenVPN session, at regular intervals, a full SSL handshake
takes place (because the SSL session expires). I ch
Thanks. I didn't knew about this. This will be helpful.
I am specifically looking for enabling TLS session resumptions though.
Resuming the session with session IDs stored in a cache at server side
(the general process of an abbreviated handshake).
On Feb 19, 2016 7:50 PM, "Arne Schwabe" wrote:
Am 19.02.16 um 15:00 schrieb Shubham Chauhan:
> Thank you for such a quick reply.
>
> I agree that VPN sessions and SSL sessions are not necessarily the same.
> Let me be more specific with my question for a better discussion.
>
> In an active OpenVPN session, at regular intervals, a full SSL
>
Hi,
Thanks for the quick feedback.
On Fri, Feb 19, 2016 at 6:37 AM, Gert Doering wrote:
> Hi,
>
> On Fri, Feb 19, 2016 at 01:51:02AM -0500, Selva Nair wrote:
> > The pacth is in the next email.
> >
> > This is not yet tested extensively, but has passed some quick tests.
> > A simple approach of
Am 19.02.16 um 14:32 schrieb Shubham Chauhan:
> Hello,
>
> I am currently working on a project that requires SSL VPN to use
> session resumptions.
>
> I need to add the TLS Session Resumption functionality to OpenVPN. Any
> starters as in how I could achieve this?
> I know about the SSL_OP_NO_TIC
Hello,
I am currently working on a project that requires SSL VPN to use session
resumptions.
I need to add the TLS Session Resumption functionality to OpenVPN. Any
starters as in how I could achieve this?
I know about the SSL_OP_NO_TICKET flag added to disable the resumption
process. Will deletin
Hi,
On Fri, Feb 19, 2016 at 01:51:02AM -0500, Selva Nair wrote:
> The pacth is in the next email.
>
> This is not yet tested extensively, but has passed some quick tests.
> A simple approach of parsing the options string is used instead of passing
> structs:
> the latter will break the GUI every
W dniu 18.02.2016 o 18:03, Gert Doering pisze:
> Hi,
>
> On Thu, Feb 18, 2016 at 05:15:50PM +0100, Jacek Wielemborek wrote:
>> The thing is that in order to fuzz it most efficiently, it would be good
>> to modify the server to use stdin/stdout (or dev null) for network I/O
>> and terminate after h
W dniu 18.02.2016 o 19:08, Gert Doering pisze:
> Hi,
>
> On Thu, Feb 18, 2016 at 06:08:02PM +0100, Jacek Wielemborek wrote:
>> Well the attacker could send a funny packet with a valid checksum,
>> encrypted and authenticated, right?
>
> Indeed, but that would be someone we trust enough to let hi
Hi,
We just got an EV certificate token thingy, which certainly does not
have SHA-1. The problem is that the token makes it impossible to safely
automate the signing process. So basically we have to turn off automated
signing in openvpn-build and just sign the files we absolutely have to.
This
Windows only:
- Allow only a set of whitelisted options in the command line options passed by
interactive service clients unless
(i) user is the local Adminsitrator group
AND/OR
(ii) in a predefined group (see below)
Only the group membership is checked, the client process need not
Hi,
The pacth is in the next email.
This is not yet tested extensively, but has passed some quick tests.
A simple approach of parsing the options string is used instead of passing
structs:
the latter will break the GUI everytime a new option is added to the white-list.
Current white-list is jus
14 matches
Mail list logo