[Openvpn-devel] Kickstarter campaign for auditing and improving security software, including OpenVPN

2015-12-09 Thread Samuli Seppänen
Hi all, I was informed by OSTIF.org that they have started their Kickstarter project which is also relevant for OpenVPN: OSTIF.org's website contains lost of information about OSTIF.org itself:

[Openvpn-devel] [PATCH v8-master] Add Windows DNS Leak fix using WFP ('block-outside-dns')

2015-12-09 Thread ValdikSS
This option blocks all out-of-tunnel communication on TCP/UDP port 53 (except for OpenVPN itself), preventing DNS Leaks on Windows 8.1 and 10. --- doc/openvpn.8 | 12 ++- src/openvpn/Makefile.am | 2 +- src/openvpn/init.c | 17 src/openvpn/openvpn.vcxproj | 4

[Openvpn-devel] [PATCH v8-2.3] Add Windows DNS Leak fix using WFP ('block-outside-dns')

2015-12-09 Thread ValdikSS
This option blocks all out-of-tunnel communication on TCP/UDP port 53 (except for OpenVPN itself), preventing DNS Leaks on Windows 8.1 and 10. --- doc/openvpn.8 | 12 ++- src/openvpn/init.c | 17 src/openvpn/openvpn.vcxproj | 0 src/openvpn/options.c | 14 +++

Re: [Openvpn-devel] Kickstarter campaign for auditing and improving security software, including OpenVPN

2015-12-09 Thread Selva Nair
Hi On Wed, Dec 9, 2015 at 4:06 AM, Samuli Seppänen wrote: > > OSTIF.org's website contains lost of information about OSTIF.org itself: > > > > The founder of OSTIF.org participated in our previous community meeting, > explaining the goals of their project: Is this OSTIF a

Re: [Openvpn-devel] Kickstarter campaign for auditing and improving security software, including OpenVPN

2015-12-09 Thread Selva Nair
Hi, Just to be on record, I managed to get in touch with ostif and got a response. Is this OSTIF a really serious organization? > > I ask this because no contact addresses on their webpage though they > solicit donation. Email to webmas...@ostif.org bounces (no such user) > etc. etc.. Many pages

[Openvpn-devel] [PATCH] Fix isatty() check for good.

2015-12-09 Thread Gert Doering
Commit 079e5b9c13 introduced a check to see if we --daemon'ized before trying to ask for a password (which would then fail with a non-intuitive error), breaking querying systemd under certain conditions. Move check from get_user_pass_cr() to get_console_input() and make it "full featured" by not o

[Openvpn-devel] MSVC "parser stack overflow"

2015-12-09 Thread Gisle Vanem
While compiling src/openvpn/options.c with MSVC 2015, I got this error: src/openvpn/options.c(5944): fatal error C1026: parser stack overflow, program too complex I've also seen such error in GeoIP-lib due to all the 'if..else if' statements. Can this be written using some kind of a table-looku