---
Improve shuffling algorithm of connection list
This patch implements the Fisher-Yates shuffle algorithm to ensure that all
permutations of the connection target list are generated with equal
probability, eliminating biases present in the previous shuffling method. In
the Fisher-Yates algo
Do you want the configuration file?
בתאריך יום ב׳, 18 בנוב׳ 2024 ב-9:14 מאת Gert Doering <
g...@greenie.muc.de>:
> Hi,
>
> On Mon, Nov 18, 2024 at 09:09:57AM +0200, ?? wrote:
> > I don't have access to server logs, I sent you the client logs as well as
> > the line pointing t
That must be investigated together with server side logs.
Generally, some packet lost can lead to this, I see similar issues from
time to time.
On Mon, Nov 18, 2024, 08:11 נתי שטרן wrote:
> Hello,
> I don't have access to server logs, I sent you the client logs as well as
> the line pointing to
Thanks for resending the patch!
On 18/11/2024 15:20, Hurukawa2121 wrote:
---
However, please note that anything you write should go *before* these
three dashes, otherwise the text is ignored by git on commit.
Anyway, no need to resend the patch for this.
Probably Gert can easily fix this be
Hello Netanal,
For security related issues, especially those under embargo, use
secur...@openvpn.net only. Do not include the developer mailing list. It
is also not appreciated to add in other security reporting lists. If you
have something to report in terms of security for OpenVPN, then repo
Please stop now.
A client which cannot reach a server because the client side has
connectivity issues towards the server is not a DoS, it is not a CVE and
will never be considered a security issue.
First of all, a DoS attack is commonly related to a SERVER becoming
unresponsive due to traff
Please investigate.
Tnx
בתאריך יום ב׳, 18 בנוב׳ 2024 ב-11:46 מאת Arne Schwabe <a...@rfc2549.org
>:
> Am 18.11.24 um 08:37 schrieb נתי שטרן:
> > What can I do to assign a CVE?
> > I attached the CVE team of ISRAEL CERT to conversation
>
> Report something that is considered a vulnerab
Dear OpenVPN Security Team,
I hope this message finds you well. I am writing to inquire about recent
vulnerabilities disclosed in OpenVPN, specifically related to Data Channel
Offload (DCO) and associated components.
Our current deployment uses OpenVPN version *2.6.12*, which appears to
include p
don't forget to keep the mailing list in CC.
Your reply went to me only :)
If you click "Reply All" you will retain all recipients.
On 18/11/2024 13:18, 古川修慈 wrote:
Thanks for your reply :)
>
> Technically yes.
I understand. I'll resend later.
Thanks for the link.
> As mentioned in my e
Hi,
On 16/11/2024 06:17, Hurukawa2121 wrote:
---
Improve shuffling algorithm of connection list
This patch implements the Fisher-Yates shuffle algorithm to ensure that all
permutations of the connection target list are generated with equal
probability, eliminating biases present in the pr
i had as problem to connect to server using SSH but I opened an case with
hosting support
בתאריך יום ב׳, 18 בנוב׳ 2024 ב-13:58 מאת Илья Шипицин <
chipits...@gmail.com>:
> I initially thought it was not your server, because you told us that you
> do not have server logs.
>
> do you have
Hi,
On Mon, Nov 18, 2024 at 09:09:57AM +0200, ?? wrote:
> I don't have access to server logs, I sent you the client logs as well as
> the line pointing to the DoS:
> TLS Error: TLS key negotiation failed to occur within 5 seconds
> SIGUSR1[soft,tls-error] received, process restarting
I initially thought it was not your server, because you told us that you do
not have server logs.
do you have at least any client packet that reaches server ?
(I know you may ask how to check that. I'd choose tcpdump. in case if you
wish to ask how to use tcpdump - sorry, no answer. Please use th
nothing makes me think the config is wrong.
just to pay attention that you've accidentally made your private key
available to the public (anybody on the net can connect using your key),
but that is fine if the config was public already.
пн, 18 нояб. 2024 г. в 08:31, נתי שטרן :
> this is con
How to solve this problem?
because both the client and server are my own
בתאריך יום ב׳, 18 בנוב׳ 2024 ב-12:04 מאת David Sommerseth <
dazo+open...@eurephia.org>:
>
> Please stop now.
>
> A client which cannot reach a server because the client side has
> connectivity issues towards the se
Thanks for your reply!
Please keep the mailing list in CC while replying.
See below:
On 18/11/2024 11:40, 古川修慈 wrote:
> We'd need a real name here, if possible, as this is a true signature
> telling us that you accepted the project license.
Thanks for your feedback.
My real name is Shuji Furu
Am 18.11.24 um 08:37 schrieb נתי שטרן:
What can I do to assign a CVE?
I attached the CVE team of ISRAEL CERT to conversation
Report something that is considered a vulnerability.
For the CVE team included in the CC:
The reporter has submitted logs around the
TLS Error: TLS key negotiation
17 matches
Mail list logo