...
> As part of modification of the mscapi (cryptoapi.c) file, I
> try to cleanup the openssl usage. I don't have Windows
> environment to test.
>
> I will be glad if users of this feature help me testing this.
>
> Sources are located at [1], binaries at [2].
>
> No change in functionality sh
...
> ...
> > As part of modification of the mscapi (cryptoapi.c) file, I
> > try to cleanup the openssl usage. I don't have Windows
> > environment to test.
> >
> > I will be glad if users of this feature help me testing this.
...
> ...
> Sure, I could do it now but what are the test cases we ar
Thank you dave!
Let's divide this into two threads.
1. I've cleanup the OpenSSL integration, this should not change
existing behavior... All you need to verify that OpenVPN continue to
work while using private key from CAPI store.
2. Add the CAPI certificate validation.
>From what I understand,
The Problem is that I read STDIN and STDOUT of OpenVPN. To do this, I
have to run my Application at least with the same rights as OpenVPN.
OpenVPN has to run as admin to control the routes and the Tap-Device. So
my application has a problem.
If somebody knows a solution how to run a program as adm
You should not do this.
You should only use the management interface for all tasks.
Your configuration should contain the following:
auth-retry nointeract
management-hold
management-signal
management-query-passwords
management-forget-disconnect
So that you can stop/start tunnel using signal SIGUS
I would consider [1] as verified, at least partially. I did not try any
negative tests outside of the absence of the cert/key does not enable login,
also I did not try in the 'service' scenario, which I imagine just means
'put the cert in the machine's store'.
attached herewith is my log, and als
Hello all!
I hope you all will forgive me for this little announcement. This is the only
time I will do this,
I promise!
Today, I released a public beta of a plug-in called eurephia. This is a
flexible plug-in for
OpenVPN to handle user name and password authentication. In addition this
mo
Hiyas,
currently openvpn prints that TUNSETOWNER failed if TUNSETGROUP failed.
Attached patch fixes this.
Btw. it seems that the kernel shipped with CentOS does not support --group
with --mktun, in case someone wants to document it somewhere.
Regards,
Till
diff -up openvpn-2.1_rc13/tun.c.tunse