Hi!
In the old 2.4 version days, we used a private patch which accomplished the
following:
Every clients gets a fwmark and a mask assigned via the config or a ccd file
Outbound packets
-If the systems sends a packet, it always has a fwmark assigned
-If such a packet goes thru the tun/dco devic
Hi!
I followed your discussion because I also tested the fragmentation with pmtu
discovery and came to the results that it does not help me. Therefore I
currently use fragmentation.
On 30.07.2014 11:37, Gert Doering wrote:
Hi,
On Wed, Jul 30, 2014 at 11:29:18AM +0200, Julien Muchembled wrote
Hi!
On 30.12.2013 18:31, Arne Schwabe wrote:
For negoating the packet format the client would submit something like
IV_CLNT_SUPPORT 1 or similar (look at the IV_SNAPPY, IV_LZO for
compression) to tell the server the supported format and the server
would push a packet-format 1 or something simila
Hi!
Just for reference, I got my throughput numbers from:
http://thread.gmane.org/gmane.network.openvpn.devel/7384/focus=7395
André
--
With kind regards,
André Valentin
Projektkoordination / Systemadministration
MarcanT GmbH, Ravensberger Str. 10 G, D - 33602 Bielefeld
Fon: +49 (521) 95945-0 |
Hi!
This updates my floating patch to current trunk. I tested it for over 2 weeks
now.
Please review!
André
--- Begin Message ---
>From bab19ca1b1f1b89dca00ca18e258dbe1dacf4891 Mon Sep 17 00:00:00 2001
From: avalentin
List-Post: openvpn-devel@lists.sourceforge.net
Date: Tue, 17 Dec 2013 21:
Hi!
On 15.11.2013 16:49, Heikki Hannikainen wrote:
Nov 15 15:18:01 gw ovpn-udp[9964]: hessu/85.188.36.24.36:58640 MULTI:
Floated with HMAC authentication to a new client address:
[AF_INET]85.188.36.24.36:58640
In this case the client's source port changed, because the client is
behind a NAT dev
Hi!
While running my patched openvpn in gdb, I had this error multiple times now:
---
Fri Oct 25 16:41:19 2013 84.139.3.24:40797 Data Channel Decrypt: Cipher
'AES-256-CBC' initialized with 256 bit key
Fri Oct 25 16:41:19
Hi,
please take a look at multi_find_instance_udp(), I am unsure about gc usage
there.
André
Am 23.10.2013 09:54, schrieb André Valentin:
Add support for floating in tls mode using the HMAC of a packet. It costs
a roundtrip through the clients. Its security comes from a secret key, both
peers
Hi!
Master, please. Everything goes into master first, and if we decide it
goes into 2.3, is cherry-picked master->2.3
The last should have been also to master, I do not understand what
happend to it...
André