On Thu, 2011-07-07 at 09:35 +0200, David Sommerseth wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On 07/07/11 01:08, chantra wrote:
> > Samuli,
> >
> > You will need patch openvpn-plugin.h
> >
> > diff --git a/openvpn-plugin.h b/openvpn-
l
or openssl... that might meant that openvpn will need to provide a
generic x509 cert library to be used by openvpn plugins.
chantra
On Wed, 2011-07-06 at 12:20 -0700, Samuli Seppänen wrote:
> Hi Adriaan,
>
> I tried building your tree on Debian 5 (amd64) VM and got this error:
>
&g
On Fri, 2011-07-01 at 14:37 +0200, Pierre Crokaert wrote:
> Hello,
>
> This kind of error occurs with some HTTP proxy. This happens when the
> response from the server in phase 2 is longer than 128 bytes, in that
> case the response is truncated because we are only interrested by the
> beginni
Signed-off-by: chantra
---
openvpn.8 | 17 +
options.c |2 +-
2 files changed, 18 insertions(+), 1 deletions(-)
diff --git a/openvpn.8 b/openvpn.8
index 4eaf0db..0340ee3 100644
--- a/openvpn.8
+++ b/openvpn.8
@@ -2926,9 +2926,26 @@ file.
Specify a directory
.B dir
for
it myself, but I think that should sort you out.
The doc says that this file may be dynamically updated during a client
session. I assume the main process will pick up the change quick fast.
Chantra
On Mon, 2010-12-13 at 15:16 -0800, Vineet Kumar wrote:
> Hi,
> If my openvpn plugin spaw
say +1 to the feature.
Hopefully, this will kick in the thread, avoiding c) ;)
BR,
Chantra
> *c)* To drop --passtos and the VLAN patches completely. This is the choice I
> really want to try to avoid.
>
>
> I would really like to have this solved before *mid January* - which mea
be a step forward to
https://community.openvpn.net/openvpn/wiki/RoadMap#OpenVPN3.0:Designandimplementation
and in my opinion is an interesting addition to openvpn code.
Chantra
>
> > -Original Message-
> > From: Farkas Levente [mailto:lfar...@lfarkas.org]
> > Sent:
Hi all,
I have found some inconsistency in openvpn-plugin.h documentation, see
https://community.openvpn.net/openvpn/ticket/31
It is a pretty trivial change which only affect documentation so it is
safe to apply.
chantra
--
http://www.debuntu.org
>From 5d1d06bd472be699163928069d898029a8492
et){}
But this is the only way I can think off in order to make sure that the
latest push-reset will take precedence.
Any comments are welcome.
Tks
chantra
--
http://www.debuntu.org
>From 05a33ce2a522e404d99b0815f4dca8eb914bd642 Mon Sep 17 00:00:00 2001
From: chantra
List-Post: openvpn-deve
>
> If nobody responds, I'll try to find some time looking into this in the
> near future.
>
I did in https://community.openvpn.net/openvpn/ticket/5#comment:3
chantra
hentication plugin available, but I'm not
> sure how well it works:
>
> <http://code.google.com/p/openvpn-auth-ldap>
Yeah, I discovered that plugin some time after I started developing my
own and already had something working :s
Unfortunately, at the time, I thought the only alter
ght not be perfect, both plugin work
nicely and I have got them running in prod with no issue at all.
Hope that helps a few people anyway :)
chantra
--
http://www.debuntu.org
!DSPAM:4c286ae161678054713307!
> The reason is obviously the fact that the thread-creation occurred
> *before* the daemon() call (that forked off a child which has no way
> of inheriting a copy of that thread).
> So does this mean then that the ovpn daemon infrastructure will only
> work with plugins that don't do threading of t
penvpn.net/openvpn/wiki/DeveloperDocumentation#Communitypatchesandtheacceptanceprocessofthesepatches
>
> Thanks!
>
> David Balažic
>
chantra
--
http://www.debuntu.org
!DSPAM:4c18c13861671523120871!
As agreed at today's IRC meeting, I created a test plugin showing the
usage of a new plugin hook called
OPENVPN_PLUGIN_ACCOUNTING
Please see https://community.openvpn.net/openvpn/ticket/15 for the
plugin code.
As agreed on IRC, I cooked up a demo implementation of this new plugin
hook.
Below is
user,
it should also help in building a better radius plugin for OpenVPN.
Your comments are welcome :)
chantra
--
http://www.debuntu.org
!DSPAM:4c0c1d6761671268788600!
Gert Doering greenie.muc.de> writes:
> Both have merits, your fix is somewhat less code then adding an extra input
> validation check
>
> if ((network.s_addr & netmask) != network.s_addr )
> { complain; }
>
> - so: ACK from me.
>
> (Since OpenVPN likes to print warnings, we *could* a
Please find below a patch to correct the behaviour.
I have also opened a trac ticket :
https://community.openvpn.net/openvpn/ticket/14
chantra
http://www.debuntu.org
>
> Hi all,
>
> It seems that openvpn is not handling properly non-standard subnets in
> pf_file.
> T
such subnets and translate it as
192.168.100.0/8.
I could try to look into it if you guys believe it should be handled by
openvpn (or maybe this has already been fixed?)
Regards,
chantra
!DSPAM:4c03f8ea61674059325257!
CentOS do not open any file
handles on /dev/urandom
So it appears that the issue is in the openldap + lib{gnutls,ssl} part
on debian ( and debian based) only .
tks again,
On Wed, 2009-08-26 at 11:26 -0500, Karl O. Pinc wrote:
> On 08/26/2009 05:56:22 AM, chantra wrote:
> &g
ue could have been in the underlying libs. But lately, I have
set up VsFTPd with pam-ldap+TLS auth and the issue is not happening in
that implementation although the settings are pretty similar.
[3] seems to contain the auth part in vsf_sysdep_check_auth() 'round
line 323 .
Could that be of a
21 matches
Mail list logo