Re: [Openvpn-devel] [PATCH 8/9] Document stub-v2 being basically an alias for no compression at all

2021-06-20 Thread tincantech via Openvpn-devel
m` parameter is :code:`stub`, :code:`stub-v2` or empty, > > compression will be turned off, but the packet framing for compression > > will still be enabled, allowing a different setting to be pushed later. > > -- > > 2.31.1 > > > Openvpn-devel mailin

Re: [Openvpn-devel] [PATCH 8/9] Document stub-v2 being basically an alias for no compression at all

2021-06-20 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Ignore me .. this has been applied Sent with ProtonMail Secure Email. ‐‐‐ Original Message ‐‐‐ On Sunday, June 20th, 2021 at 19:09, tincantech via Openvpn-devel wrote: > Hi > > text corrections. > > Sorry about protonmai

[Openvpn-devel] --tmp-dir and systemd PrivateTmp incompatibility

2021-06-30 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, the openvpn-server systemd unit file currently make use of PrivateTmp=True, this denies the openvpn process access to /tmp (and /var/tmp). This setting also does not provide the systemd assigned location for temporary files to the openvpn

Re: [Openvpn-devel] --tmp-dir and systemd PrivateTmp incompatibility

2021-06-30 Thread tincantech via Openvpn-devel
sig Description: PGP signature _______ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] --tmp-dir and systemd PrivateTmp incompatibility

2021-07-01 Thread tincantech via Openvpn-devel
ech via Openvpn-devel wrote: > > > Hi > > [... copied from first mail ...] > > > > Thus the problem is two fold: > > > > It is not possible to pre-determine a temporary directory within the systemd > > > > PrivateTmp assigned folder within an open

Re: [Openvpn-devel] [PATCH v3 7/9] Cleanup handling of initial auth token

2021-07-06 Thread tincantech via Openvpn-devel
a PUSH reply to update the token on renegotiations. > The old code relied on multi->auth_token not being set in this case. > > This commit also removes the workaround for old OpenVPN clients. These > were only available as commercial OpenVPN Connect client and not in use > anymore.

Re: [Openvpn-devel] [PATCH v3] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-07-28 Thread tincantech via Openvpn-devel
Message ‐‐‐ On Wednesday, July 28th, 2021 at 16:49, Arne Schwabe wrote: > This is meant to give new users a quickstart for a useable OpenVPN quickstart -> quick start > setup. Our own documentation is lacking in this regard and many > tutorials that can be found online are often que

Re: [Openvpn-devel] [PATCH v3] Add example script demonstrating TOTP via auth-pending

2021-08-02 Thread tincantech via Openvpn-devel
ntech@protonmail.com - 0x09BC3D44.asc Description: application/pgp-keys publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig Description: PGP signature ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH] Modernise OpenVPN defaults and introduce '--compat-mode'

2021-08-02 Thread tincantech via Openvpn-devel
ze), so it is meant a best effort option and not as > a mean to provide 100% compatibility. mean -> means > > Signed-off-by: Arne Schwabe > --- > Changes.rst | 23 +++ > doc/man-sections/generic-options.rst | 21 ++ > src/openv

Re: [Openvpn-devel] [PATCH v2] Modernise OpenVPN defaults and introduce '--compat-mode'

2021-08-02 Thread tincantech via Openvpn-devel
mean to provide 100% compatibility. mean -> means > > Patch v2: rebase > > Signed-off-by: Arne Schwabe > --- > Changes.rst | 23 +++ > doc/man-sections/generic-options.rst | 21 ++ > src/openvpn/comp.h | 1 + > src/o

Re: [Openvpn-devel] [PATCH v3] Modernise OpenVPN defaults and introduce '--compat-mode'

2021-08-11 Thread tincantech via Openvpn-devel
0 > > > > Signed-off-by: Arne Schwabe > > --- > > Changes.rst | 23 +++ > > doc/man-sections/generic-options.rst | 21 ++ > > src/openvpn/comp.h | 1 + > > src/openvpn/options.c | 97

Re: [Openvpn-devel] [PATCH 1/7] simplify condition detecting pure P2P mode

2021-09-06 Thread tincantech via Openvpn-devel
; > > > Signed-off-by: Antonio Quartulli a...@unstable.cc > > ---- > > > > src/openvpn/options.c | 6 +++++- > > > > 1 file changed, 5 insertions(+), 1 deletion(-) > > > > diff --git a/src/openvpn/o

Re: [Openvpn-devel] [PATCH] Correct --client-disconnect environment variable common_name

2021-09-16 Thread tincantech via Openvpn-devel
correct value, prior to > > calling --client-disconnect. > > Resolves https://community.openvpn.net/openvpn/ticket/160 > > Signed-off-by: Richard T Bonhomme tincant...@protonmail.com > > src/openvpn/multi.c | 3 +++ > > 1 file changed, 3 insertions(+) > > diff --git

Re: [Openvpn-devel] [PATCH] Correct value for --client-disconnect env variable common_name

2021-10-10 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, I NAK this for the following reasons. The original problem: "Openvpn does not set common_name for --client-disconnect", for reasons which have not been identified, no longer occurs. The code has changed enough since 2011

Re: [Openvpn-devel] [PATCH] Fix error in example firewall.sh script

2021-11-08 Thread tincantech via Openvpn-devel
68AnyR5GRlMItdo91prqcH/bn ksBxh5OolZeq7Md7K6O63DZgL3Kdj0HpUGavPonVgIrBXj1QoQW69KiEp9/A 98UixypgCCi3yy4wii510Wn9F8ZFmfQBk9l/ilRB5tT+oU6/KyvaZmwz2kRQ pkmcvXWI40LEvjMXA1Ye5Usn7a1yf5lP2YbJyvhE8mG64mZo6/2fePyTuASd EhCzxoQ1QIUy/jHL6FCHac6Gt2lx5JH73CI9lKzczvfZmq4Y7a3I5+rjpP2w Gx4YdA/PkRK5QJtn/KHppCZx4FdYBSvW2Aqq+fSrhzPam//qXQLt6g== =8IIR -END PGP SIGNATURE- publickey - tincantech@protonmail.com - 0x09BC3D44.asc Description: application/pgp-keys publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig Description: PGP signature ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH v4] [OSSL 3.0] Allow loading of non default providers

2021-11-11 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 One tiny typo: Sent with ProtonMail Secure Email. ‐‐‐ Original Message ‐‐‐ On Thursday, November 11th, 2021 at 13:00, Arne Schwabe wrote: > This allows OpenVPN to load non-default providers. This is mainly > > useful for lo

Re: [Openvpn-devel] Start openvpn gui before windows login

2021-11-15 Thread tincantech via Openvpn-devel
your problem cannot be solved with openvpn service? > > > > See, for example, > > > > https://openvpn.net/community-resources/running-openvpn-as-a-windows-service/ > > > > Also this discussion might be relevant: > > > > https://github.com/OpenVPN/openvpn-

Re: [Openvpn-devel] [PATCH] Log message: Replace NCP ciphers with --data-ciphers (NFC)

2021-11-16 Thread tincantech via Openvpn-devel
com > > src/openvpn/options.c | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/src/openvpn/options.c b/src/openvpn/options.c > > index 4a5db8a6..7822f21e 100644 > > --- a/src/openvpn/options.c > > +++ b/src/openvpn/options.c > > @@

Re: [Openvpn-devel] [PATCH] Doc openvpn.8: Add deprecation notice to --compress

2021-11-27 Thread tincantech via Openvpn-devel
On 26/11/2021 15:43, Richard T Bonhomme wrote: > > > Signed-off-by: Richard T Bonhomme tincant...@protonmail.com > > --- > > > > doc/openvpn.8 | 1 + > > > > 1 file changed, 1 insertion(+) > > > &

Re: [Openvpn-devel] [Openvpn-users] OpenVPN 2.5.5 released

2021-12-15 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 It seems only fair to warn the OpenVPN community that Version 2.5.5 has had bugs identified. A new release v2.5.6 is planned for the coming week, or so.. Regards Richard Sent with ProtonMail Secure Email. ‐‐‐ Original Message ‐‐‐ On

Re: [Openvpn-devel] [Openvpn-users] OpenVPN 2.5.5 released

2021-12-15 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Seems I was too hasty here. OpenVPN 2.5.5 is the current release and there are no bugs severe enough to warrant a version 2.5.6, at this time. Sorry for the confusion. Regards Richard Sent with ProtonMail Secure Email. ‐‐‐ Original Message

Re: [Openvpn-devel] [PATCH] Fix checks of SHA256 in tls-crypt and auth-token

2022-02-15 Thread tincantech via Openvpn-devel
___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH] Enablement of quantum-safe key establishment

2022-03-28 Thread tincantech via Openvpn-devel
= =N9Ct -END PGP SIGNATURE- publickey - tincantech@protonmail.com - 0x09BC3D44.asc Description: application/pgp-keys publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig Description: PGP signature _______ Openvpn-devel mailing list Openvpn-dev

Re: [Openvpn-devel] Subject: OpenVPN Client Vulnerability - TLS Key Negotiation Timeout Leading to DoS (Black Box Pentest)

2024-11-16 Thread tincantech via Openvpn-devel
> > so, I want to see proof, not just a story. You write that the server is > > automatically restarting in response to multiple failed TLS handshakes. > > Show us the evidence please. > > > > Until then, we don't have anything to go on, sorry. > > &g

[Openvpn-devel] [PATCH 1/2] Fix IPv6 in port-share journal

2024-12-07 Thread corubba via Openvpn-devel
union members. The bug was introduced in 0b6450c9. Fixes https://community.openvpn.net/openvpn/ticket/1358 Signed-off-by: corubba --- src/openvpn/ps.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/openvpn/ps.c b/src/openvpn/ps.c index 4ca3a129..06bf91a8 100644 --- a

[Openvpn-devel] [PATCH 2/2] Fix port-share journal doc

2024-12-07 Thread corubba via Openvpn-devel
determine the origin of the connection. Each generated file will be automatically -- 2.47.1 ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH v2 1/2] port-share: Normalize IPv4-mapped IPv6 addresses

2024-12-26 Thread corubba via Openvpn-devel
n't use a sockaddr but only the addr structs, requires more code to also support. Signed-off-by: Corubba Smith --- src/openvpn/dco_linux.c | 13 +--- src/openvpn/socket.c| 72 + src/openvpn/socket.h| 7 3 files changed, 67 insertions(+), 25

[Openvpn-devel] [PATCH v3 2/2] port-share: Add proxy protocol v2 support

2024-12-26 Thread corubba via Openvpn-devel
ustom integration. While this is a spec-compliant [0] sender implementation of the PROXY protocol, it does not implement it in full. Version 1 was left out entirely, in favour of the superior and easier-to-implement version 2. The implementation was also kept minimal with regards to what OpenVPN sup

Re: [Openvpn-devel] [PATCH v2 2/2] port-share: Add proxy protocol v2 support

2024-12-26 Thread corubba via Openvpn-devel
Hi, On 26.12.24 14:13, Gert Doering wrote: > On Mon, Dec 16, 2024 at 01:22:51PM +0100, corubba via Openvpn-devel wrote: >> In addition to the custom journal solution, also support the widely >> used binary PROXY protocol version 2 to convey the original client >> connect

[Openvpn-devel] [PATCH v2 3/2] port-share: Add unix-socket and udp support for proxy protocol

2024-12-16 Thread corubba via Openvpn-devel
Just in case it is ever needed. Signed-off-by: Corubba Smith --- src/openvpn/ps.c | 42 +++--- src/openvpn/socket.h | 1 + 2 files changed, 36 insertions(+), 7 deletions(-) diff --git a/src/openvpn/ps.c b/src/openvpn/ps.c index b5d04c5b..b34df315 100644

[Openvpn-devel] [PATCH v2 1/2] port-share: Normalize IPv4-mapped IPv6 addresses

2024-12-16 Thread corubba via Openvpn-devel
Before passing IPv4-mapped IPv6 addresses to the proxy journal, translate them to plain IPv4 addresses. Whether the connection was accepted by OpenVPN on a "dual stack" socket is of no importance to the proxy receiver. Signed-off-by: Corubba Smith --- src/openvpn/ps.c | 18 +++

[Openvpn-devel] [PATCH v2 2/2] port-share: Add proxy protocol v2 support

2024-12-16 Thread corubba via Openvpn-devel
ustom integration. While this is a spec-compliant sender implementation of the PROXY protocol, it does not implement it in full. Version 1 was left out entirely, in favour of the superior and easier-to-implement version 2. The implementation was also kept minimal with regards to what OpenVPN supports/req

[Openvpn-devel] [PATCH 0/2] proxy protocol v2 for port-share

2024-12-14 Thread corubba via Openvpn-devel
Hello, since v2.1 (released 2009) OpenVPN has the "port-share" feature, where it listens on a tcp port (like 443) and forwards/proxies all incoming non-OpenVPN connections (like HTTPS) to a different server/port (hereafter called the "downstream server"). Because thi

[Openvpn-devel] [PATCH 2/2] port-share: Add proxy protocol v2 support

2024-12-14 Thread corubba via Openvpn-devel
ustom integration. While this is a spec-compliant sender implementation of the PROXY protocol, it does not implement it in full. Version 1 was left out entirely, in favour of the superior and easier-to-implement version 2. The implementation was also kept minimal with regards to what OpenVPN supports/req

[Openvpn-devel] [PATCH 1/2] port-share: Normalize IPv4-mapped IPv6 addresses

2024-12-14 Thread corubba via Openvpn-devel
Before passing IPv4-mapped IPv6 addresses to the proxy journal, translate them to plain IPv4 addresses. Whether the connection was accepted by OpenVPN on a "dual stack" socket is of no importance to the proxy receiver. Signed-off-by: corubba --- src/openvpn/ps.c | 18

[Openvpn-devel] [PATCH 3/2] port-share: Add unix-socket and udp support for proxy protocol

2024-12-14 Thread corubba via Openvpn-devel
Subject: [PATCH 3/3] port-share: Add unix-socket and udp support for proxy protocol v2 Just in case it is ever needed. Signed-off-by: corubba --- src/openvpn/ps.c | 42 +++--- src/openvpn/socket.h | 1 + 2 files changed, 36 insertions(+), 7 deletions

[Openvpn-devel] [PATCH] Support IPv6 towards port-share proxy receiver

2024-12-14 Thread corubba via Openvpn-devel
While port-share already supports IPv6 connections from clients, it only supported IPv4 connections towards the proxy receiver. The used common/shared OpenVPN machinery is already IPv6-ready, so all needed was to use properly-sized `sockaddr` structs and removing hardcoded IPv4 restrictions

[Openvpn-devel] [PATCH 1/2] Remove x509-username-fields uppercasing

2025-02-15 Thread corubba via Openvpn-devel
of `name`). Signed-off-by: Corubba Smith --- Changes.rst | 5 + doc/man-sections/tls-options.rst | 6 -- src/openvpn/options.c| 27 +-- 3 files changed, 6 insertions(+), 32 deletions(-) diff --git a/Changes.rst b/Changes.rst index

[Openvpn-devel] [PATCH 2/2] Document x509-username-fields oid usage

2025-02-15 Thread corubba via Openvpn-devel
1` to make OpenVPN read the `name` field [1]. x509-username-fields is currently not implemented for mbed TLS, so that can be ignored. [0] https://docs.openssl.org/1.1.1/man3/OBJ_nid2obj/ [1] https://oidref.com/2.5.4.41 Signed-off-by: Corubba Smith --- doc/man-sections/tls-options.rst | 6

[Openvpn-devel] [PATCH 0/2] x509-username-fields improvements

2025-02-15 Thread corubba via Openvpn-devel
+ doc/man-sections/tls-options.rst | 12 src/openvpn/options.c| 27 +-- 3 files changed, 10 insertions(+), 34 deletions(-) -- 2.48.1 ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https

[Openvpn-devel] [PATCH] multi.c: Allow floating to a new IP right after connection setup

2025-04-23 Thread walter.openvpn--- via Openvpn-devel
ches right after connect: the source IP switches from the first-VPN-exit-IP to the regular-ISP-exit-IP In openvpn 2.5 and below, this worked fine. Since openvpn 2.6, this triggers the "Disallow float to an address taken by another client" code. The root cause for this change of be

[Openvpn-devel] [PATCH] Update systemd service name param to match command

2025-07-29 Thread Terrance via Openvpn-devel
he service name to match the start command. --- Additional discussion: https://github.com/OpenVPN/openvpn/pull/802 distro/systemd/openvpn-cli...@.service.in | 2 +- distro/systemd/openvpn-ser...@.service.in | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/distro/systemd/o

[Openvpn-devel] [PATCH] Fix socks_proxy_port pointing to invalid data

2017-07-07 Thread Thomas Veerman via Openvpn-devel
When setting the SOCKS proxy through the management interface, the socks_proxy_port pointer would be set to a value that's no longer valid by the time it's used by do_preresolve_host. Signed-off-by: Thomas Veerman --- src/openvpn/init.c | 2 +- 1 file changed, 1 insertion(+),

[Openvpn-devel] OVPN Interactive Service for non-admin users

2017-08-09 Thread Simon Rozman via Openvpn-devel
Hi! I am developing an eduVPN client for Windows. Imagine the eduVPN client as a custom OpenVPN GUI. The client uses openvpn.exe for connecting, the configuration file is provided by eduVPN server once user authenticates using OAuth. User running the eduVPN client is not an administrator

Re: [Openvpn-devel] OVPN Interactive Service for non-admin users

2017-08-09 Thread Simon Rozman via Openvpn-devel
openvpn.exe. In other words, options allowed in user editable configs are restricted unless the user is in a designated group. I don't quite agree. OpenVPN needs elevation to set up connection because it runs in user space. IPsec VPN doesn't require elevation for the very same task sin

Re: [Openvpn-devel] OVPN Interactive Service for non-admin users

2017-08-11 Thread Simon Rozman via Openvpn-devel
id a brief openvpnserv source code audit not to find anything supporting it. If you add that option, that would void entire Interactive Service "security" scheme, wouldn't it? But that's what I wanted in the first place, as I believe Interactive Service "security" scheme

[Openvpn-devel] LibreSSL support in OpenVPN 2.4.5

2018-03-04 Thread Mina Barret via Openvpn-devel
Hallo OpenVPN developers, The last years i closely follow your advances in the source. When you release a new version of the software, i will pull it, build it in different configurations and ship it to a small userbase. To allow the users to choose the flavor of SSL, one of the configurations

Re: [Openvpn-devel] [PATCH] Do not assume that SSL_CTX_get/set_min/max_proto_version are macros

2018-03-04 Thread Mina Barret via Openvpn-devel
Great, Thank You! -- Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot ___ Openvpn-devel mailing

[Openvpn-devel] [PATCH] Increase TLC Control Channel Buffer Size

2018-03-14 Thread Ning Wei via Openvpn-devel
Increase TLS_CHANNEL_BUF_SIZE to 4096. When the build is enabled with ENABLE_PKCS11, the password field can be 4096. The old size of TLS_CHANNEL_BUF_SIZE was 2048, which is not enough. Signed-off-by: Ning Wei --- src/openvpn/common.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff

[Openvpn-devel] [PATCH] Increase TLS Control Channel Buffer Size

2018-03-16 Thread Ning Wei via Openvpn-devel
Increase TLS_CHANNEL_BUF_SIZE to 4096. When the build is enabled with ENABLE_PKCS11, the password field can be 4096. The old size of TLS_CHANNEL_BUF_SIZE was 2048, which is not enough. Signed-off-by: Ning Wei --- src/openvpn/common.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff

Re: [Openvpn-devel] [PATCH] Increase TLS Control Channel Buffer Size

2018-03-16 Thread Ning Wei via Openvpn-devel
Thank you for reminding this.  The reason that I have resent was there was a typo in the commit comment. Best regards,Ning On Friday, March 16, 2018, 9:46:07 AM PDT, Gert Doering wrote: Hi, On Fri, Mar 16, 2018 at 09:40:59AM -0700, Ning Wei via Openvpn-devel wrote: > Incre

Re: [Openvpn-devel] [PATCH] Increase TLS Control Channel Buffer Size

2018-03-19 Thread Ning Wei via Openvpn-devel
riday, March 16, 2018, 10:30:45 AM PDT, Selva Nair wrote: Hi, Apologies in advance if I'm misreading the intent of this patch. On Fri, Mar 16, 2018 at 12:40 PM, Ning Wei via Openvpn-devel wrote: > Increase TLS_CHANNEL_BUF_SIZE to 4096. When the build is enabled with > ENABLE_PKCS

Re: [Openvpn-devel] [PATCH] Increase TLS Control Channel Buffer Size

2018-03-26 Thread Ning Wei via Openvpn-devel
If its not purely authentication data (i.e., a challenge string + signature at most), sending it as password is not the right approach. If there is extra text included for convenience, pre-compressing may help. How do you plan to pass the "password" to openvpn client -- from stdin? The

[Openvpn-devel] [PATCH: tap-windows6] Fix missing PRODUCT_PUBLISHER field in installer

2018-04-27 Thread Jon Kunkee via Openvpn-devel
Hi all, While working on ARM64 tap-windows6, I came up with this quick fix for a minor issue recently reported via IRC. This is also a Github PR: https://github.com/OpenVPN/tap-windows6/pull/51 (The ARM64 work is still underway; I'll start a separate thread about its current state in

[Openvpn-devel] OpenVPN on ARM64 Windows

2018-04-27 Thread Jon Kunkee via Openvpn-devel
ted. There has been quite some interest in OpenVPN on my team and my proof of concept went well, so I am taking a shot at porting tap-windows6 to ARM64 and contributing the port back to the community. (I'll have patches to share soon! Please bear with me.) My proof of concept was pretty s

Re: [Openvpn-devel] OpenVPN on ARM64 Windows

2018-05-02 Thread Jon Kunkee via Openvpn-devel
/02/2018 9:36 AM To: Samuli Seppänen ; Jon Kunkee ; openvpn-devel@lists.sourceforge.net Cc: Marc Sweetgall Subject: RE: [Openvpn-devel] OpenVPN on ARM64 Windows Hi, > We intend to switch away from NSIS to MSI packages. I believe Simon > already did some work in there but he was rather busy

Re: [Openvpn-devel] OpenVPN on ARM64 Windows

2018-05-02 Thread Jon Kunkee via Openvpn-devel
u did with your >first PR :). I think I see a pattern here, and I like it. :) This PR contains several simple commits: https://github.com/OpenVPN/tap-windows6/pull/52 Would that be better as several PRs (except the two commits that overlap)? With this groundwork laid, here's my PR pla

[Openvpn-devel] Darwin tap ipv6 fix

2018-05-15 Thread Scott Shambarger via Openvpn-devel
ay) that extracts the default gateway so that ifconfig-ipv6 isn't needed at all. I'd be happy to make an attempt at that if it'd be useful :) Thanks, Scott diff --git a/src/openvpn/route.c b/src/openvpn/route.c index 2d6428b2..35ae8d09 100644 --- a/src/openvpn/route.c +++ b/src/op

Re: [Openvpn-devel] Darwin tap ipv6 fix

2018-05-16 Thread Scott Shambarger via Openvpn-devel
ck out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] tap-windows6 and AppVeyor

2018-06-14 Thread Jon Kunkee via Openvpn-devel
ounting the ISO file. -Original Message- From: Simon Rozman Sent: Thursday, June 14, 2018 10:35 AM To: chipits...@gmail.com; Jon Kunkee Cc: Samuli Seppänen (sam...@openvpn.net) ; openvpn-devel (openvpn-devel@lists.sourceforge.net) Subject: tap-windows6 and AppVeyor Hi! Given all the recent upd

Re: [Openvpn-devel] tap-windows6 and AppVeyor

2018-06-15 Thread Jon Kunkee via Openvpn-devel
14 AM To: Samuli Seppänen Cc: Jon Kunkee ; Simon Rozman ; openvpn-devel Subject: Re: tap-windows6 and AppVeyor hi, I have some very amazing expirience with app veyor when I was playing with mingw builds. there was an issue related to mingw and I saw it between builds (mingw upgraded), so I

Re: [Openvpn-devel] Regarding tap-windows6 driver signatures and driver distribution

2018-06-18 Thread Jon Kunkee via Openvpn-devel
Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] Regarding tap-windows6 driver signatures and driver distribution

2018-06-18 Thread Jon Kunkee via Openvpn-devel
mpromises" - This makes sense, no worries. It's already a fairly complex release. > Then, focus on make nicer installers - .msi for the tap driver, .msi > for openvpn proper, return to *one* driver that has proper signatures > for everything. I'll take a closer look at WIX

Re: [Openvpn-devel] Regarding tap-windows6 driver signatures and driver distribution

2018-06-20 Thread Jon Kunkee via Openvpn-devel
y tap-windows6 -specific tests at the moment, so I > generally just run the OpenVPN test suite against a bunch of OpenVPN 2.x > / Access Server / Private Tunnel servers: > <https://github.com/OpenVPN/openvpn-windows-test.git> I can give that a shot. If I can't figure somet

Re: [Openvpn-devel] Regarding tap-windows6 driver signatures and driver distribution

2018-06-26 Thread Jon Kunkee via Openvpn-devel
rs, Jon pgpAnBIuyxqSB.pgp Description: PGP signature ------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] Regarding tap-windows6 driver signatures and driver distribution

2018-06-27 Thread Jon Kunkee via Openvpn-devel
>> Our test environment currently has the following nodes: >> >> - One combined HLK Studio/controller >> - Four identical HLK client nodes >> - OpenVPN test server >> >> The HLK nodes are all Windows Server 2016 as that is our primary target. &

Re: [Openvpn-devel] tap-windows6 and AppVeyor

2018-07-03 Thread Jon Kunkee via Openvpn-devel
get to it until next week at the earliest... -Original Message- From: Simon Rozman Sent: Tuesday, July 3, 2018 6:45 AM To: Jon Kunkee ; Илья Шипицин ; Samuli Seppänen Cc: openvpn-devel Subject: RE: tap-windows6 and AppVeyor Hi, I was dismissed by the AppVeyor about an image preinst

Re: [Openvpn-devel] Topics for the community meeting (Wed, 13th June 2018)

2018-07-03 Thread Jon Kunkee via Openvpn-devel
I'm investigating those. I spent yesterday setting up a local HLK-based test environment with kernel debugging. Today I'm trying to get two OpenVPN clients to be able to talk to each other over a VPN so I can start reproducing and investigating the failures. (I will be sending a mail

Re: [Openvpn-devel] Topics for the community meeting (Wed, 13th June 2018)

2018-07-03 Thread Jon Kunkee via Openvpn-devel
Yes, I am aware of that. Note that it’s not tap-windows6, but openvpn. I talked to the primary contributor to that fork, Kevin Kane, a few days ago. When I asked if his team had done anything with signing the driver or doing the HLK work, he said his team uses tap-windows6 as-shipped, complete

Re: [Openvpn-devel] Topics for the community meeting (Wed, 13th June 2018)

2018-07-03 Thread Jon Kunkee via Openvpn-devel
I don't know right off, but I will ask. -Original Message- From: Samuli Seppänen Sent: Tuesday, July 3, 2018 11:23 AM To: Jon Kunkee ; Илья Шипицин Cc: openvpn-devel Subject: Re: [Openvpn-devel] Topics for the community meeting (Wed, 13th June 2018) Hi Jon, Do you know if

Re: [Openvpn-devel] tap-windows6 and AppVeyor

2018-07-03 Thread Jon Kunkee via Openvpn-devel
man Sent: Tuesday, July 3, 2018 12:40 PM To: Jon Kunkee ; Илья Шипицин ; Samuli Seppänen Cc: openvpn-devel Subject: RE: tap-windows6 and AppVeyor Hi, > I chose the EWDK thinking it would actually be easier for CI because it was > so > similar to the Win7 DDK, but from what you are say

[Openvpn-devel] Upstreaming pqcrypto changes from microsoft/openvpn

2018-07-03 Thread Jon Kunkee via Openvpn-devel
Hi, (Retitling thread from RE: [Openvpn-devel] Topics for the community meeting (Wed, 13th June 2018)) > do you know this activity https://github.com/Microsoft/openvpn/ ? > there are interesting things There are *very* interesting things there! > Do you know if Kevin (or his man

Re: [Openvpn-devel] Upstreaming pqcrypto changes from microsoft/openvpn

2018-07-03 Thread Kevin Kane via Openvpn-devel
[Resending to openvpn-devel now that I'm subscribed to it.] Hello all, Thanks to Jon for making the introduction. My team works on post-quantum (PQ) cryptography, which is algorithms used by regular computers but which are resistant to attack by a sufficiently powerful quantum computer.

Re: [Openvpn-devel] Upstreaming pqcrypto changes from microsoft/openvpn

2018-07-06 Thread Kevin Kane via Openvpn-devel
let me make clear what I’ve actually done. I changed OpenVPN-GUI when it starts up to create such an entry for each configuration file it finds, and if the user clicks “Connect” on one of those entries, it’s exactly the same as if the user brought up the right-click menu for OpenVPN-GUI’s icon

Re: [Openvpn-devel] Upstreaming pqcrypto changes from microsoft/openvpn

2018-07-06 Thread Kevin Kane via Openvpn-devel
This was meant to be a quick and simple integration. The problem with Disconnect is the problem I mentioned below: since OpenVPN uses a nonstandard driver for the network communications, the UI will never present a Disconnect button, and so there's no way to actually call the Disco

[Openvpn-devel] [PATCH] [openvpn-build] Install/uninstall dialer DLL as part of Windows installer operation

2018-07-25 Thread Kevin Kane via Openvpn-devel
, 4 insertions(+) diff --git a/windows-nsis/openvpn.nsi b/windows-nsis/openvpn.nsi index e92904d..aff7cb3 100755 --- a/windows-nsis/openvpn.nsi +++ b/windows-nsis/openvpn.nsi @@ -1,6 +1,7 @@ ; ; * Copyright (C) 2002-2010 Open

[Openvpn-devel] Incoming: patches for the dialer feature

2018-07-25 Thread Kevin Kane via Openvpn-devel
Ok, I've gotten clearance to contribute the dialer feature from Microsoft's OpenVPN fork back upstream. As previously discussed, this feature isn't production-ready because the integration I did was quick and dirty - it mainly just sends commands to a running OpenVPN-GUI process

[Openvpn-devel] [PATCH] [openvpn-gui] Update system tray to populate Windows VPN flyout

2018-07-25 Thread Kevin Kane via Openvpn-devel
LES = \ config.log config.status \ @@ -106,7 +108,13 @@ openvpn_gui_LDADD = \ -lnetapi32 \ -lole32 \ -lshlwapi \ - -lsecur32 + -lsecur32 \ + -lrasapi32 openvpn-gui-res.o: $(openvpn_gui_RESOURCES) $(src

[Openvpn-devel] [PATCH] [openvpn] Register/unregister trusted custom dialer DLL when installing/uninstalling service

2018-07-25 Thread Kevin Kane via Openvpn-devel
es() return 1; } +if (0 != HandleDialerRegistration(1)) +{ +_tprintf(TEXT("HandleDialerRegistration uninstall failed; ignoring\n")); +} + for (i = 0; i < _service_max; i++) { openvpn_service_t *ovpn_svc = &openvpn_service[i]; -- 2.17.1.windows.2 -- Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH] [openvpn-gui] Update system tray to populate Windows VPN flyout

2018-07-25 Thread Kevin Kane via Openvpn-devel
tream. -Original Message- From: Selva Nair Sent: Wednesday, July 25, 2018 10:28 AM To: Kevin Kane Cc: openvpn-devel Subject: Re: [Openvpn-devel] [PATCH] [openvpn-gui] Update system tray to populate Windows VPN flyout Hi, On Wed, Jul 25, 2018 at 1:01 PM, Kevin Kane via Openvpn-devel wrote: &

Re: [Openvpn-devel] [PATCH] [openvpn-gui] Update system tray to populate Windows VPN flyout

2018-07-25 Thread Kevin Kane via Openvpn-devel
From: Gert Doering Sent: Wednesday, July 25, 2018 11:00 AM To: Kevin Kane Cc: openvpn-devel Subject: Re: [Openvpn-devel] [PATCH] [openvpn-gui] Update system tray to populate Windows VPN flyout Hi, as a side note, your mail client massacres leading whitespace, so the patch is all squeezed t

[Openvpn-devel] [PATCH v2] [openvpn] Register/unregister trusted custom dialer DLL when installing/uninstalling service

2018-07-25 Thread Kevin Kane via Openvpn-devel
ateService failed - %s\n"), GetLastErrorText()); +} } } @@ -160,6 +358,11 @@ CmdRemoveServices() return 1; } +if (0 != HandleDialerRegistration(1)) +{ +_tprintf(TEXT("HandleDialerRegistration uninstall failed; ignoring\n")); +} + for (i

[Openvpn-devel] [PATCH v2] [openvpn-build] Install/uninstall dialer DLL as part of Windows installer operation

2018-07-25 Thread Kevin Kane via Openvpn-devel
@@ ; ; * Copyright (C) 2002-2010 OpenVPN Technologies, Inc. * ; * Copyright (C) 2012 Alon Bar-Lev * +; * Portions Copyright (C) 2018 Microsoft Corporation* ; * This program is free

[Openvpn-devel] [PATCH v2] [openvpn-gui] Update system tray to populate Windows VPN flyout

2018-07-25 Thread Kevin Kane via Openvpn-devel
+ -lsecur32 \ + -lrasapi32 openvpn-gui-res.o: $(openvpn_gui_RESOURCES) $(srcdir)/openvpn-gui-res.h $(RCCOMPILE) -i $< -o $@ + +lib_LTLIBRARIES = libopenvpndialer.la +libopenvpndialer_la_SOURCES = dialer.c +libopenvpndialer_la_LDFLAGS = -no-undefi

Re: [Openvpn-devel] [PATCH] [openvpn-gui] Update system tray to populate Windows VPN flyout

2018-07-25 Thread Kevin Kane via Openvpn-devel
Alright, I found the SMTP server and sent the patches out again with git send-email. Let me know how those look. -Original Message- From: Gert Doering Sent: Wednesday, July 25, 2018 11:18 AM To: Kevin Kane Cc: Gert Doering ; openvpn-devel Subject: Re: [Openvpn-devel] [PATCH

Re: [Openvpn-devel] Slow outbound network speed for Windows Server 2016 only via the OpenVPN tunnel

2018-10-05 Thread Jon Kunkee via Openvpn-devel
ing. My 2c, Jon _______ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] Slow outbound network speed for Windows Server 2016 only via the OpenVPN tunnel

2018-10-08 Thread Jon Kunkee via Openvpn-devel
fied.) If you're feeling daring, you could try rebuilding the driver with this extremely hacky change and see if the perf changes: https://github.com/jkunkee/tap-windows6/commit/2706c9a98bd25a0fee6559ac132d75622475c26e HTH, Jon ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH 1/5] Set output name to libopenvpnmsica.dll in MSVC builds too

2018-11-08 Thread Jon Kunkee via Openvpn-devel
This looks pretty straightforward to me. -Original Message- From: Simon Rozman Sent: Tuesday, October 16, 2018 3:26 AM To: openvpn-devel@lists.sourceforge.net Subject: [Openvpn-devel] [PATCH 1/5] Set output name to libopenvpnmsica.dll in MSVC builds too On MinGW builds, the Libtool

Re: [Openvpn-devel] [PATCH 5/5] Detect TAP interfaces with root-enumerated hardware ID

2018-11-08 Thread Jon Kunkee via Openvpn-devel
Samuli, LGTM. -Original Message- From: Simon Rozman Sent: Tuesday, October 16, 2018 3:26 AM To: openvpn-devel@lists.sourceforge.net Subject: [Openvpn-devel] [PATCH 5/5] Detect TAP interfaces with root-enumerated hardware ID This patch extends the TAP interface enumerating to detect

Re: [Openvpn-devel] [PATCH 4/5] Add MSI custom action for reliable Windows 10 detection

2018-11-08 Thread Jon Kunkee via Openvpn-devel
UCH more convenient to use the CustomAction debugging facility built into the MSI service itself: https://docs.microsoft.com/en-us/windows/desktop/Msi/debugging-custom-actions Thanks, Jon -Original Message- From: Simon Rozman Sent: Tuesday, October 16, 2018 3:26 AM To: openv

Re: [Openvpn-devel] [PATCH 2/5] Prevent __stdcall name mangling of MSVC

2018-11-08 Thread Jon Kunkee via Openvpn-devel
spx This is why the names don't get mangled. Of course, it's then inconsistent. Export name consistency is needed so CustomActions can reference the export symbol name, right? Jon -Original Message- From: Simon Rozman Sent: Tuesday, October 16, 2018 3:26 AM To: openvpn-devel

Re: [Openvpn-devel] [PATCH 3/5] Define _WIN32_WINNT=_WIN32_WINNT_VISTA in MSVC

2018-11-08 Thread Jon Kunkee via Openvpn-devel
LGTM, Samuli. -Original Message- From: Simon Rozman Sent: Tuesday, October 16, 2018 3:26 AM To: openvpn-devel@lists.sourceforge.net Subject: [Openvpn-devel] [PATCH 3/5] Define _WIN32_WINNT=_WIN32_WINNT_VISTA in MSVC This makes MSVC and MinGW build environments more alike. --- src

Re: [Openvpn-devel] [PATCH 2/5] Prevent __stdcall name mangling of MSVC

2018-11-09 Thread Jon Kunkee via Openvpn-devel
27;m glad there's something that works. > I had to pick my poison, and I choose to fix issues as close to the source > as possible. Understood. Thanks for the explanation. Samuli, LGTM. Jon _______ Openvpn-devel mailing list Openvpn-devel@list

Re: [Openvpn-devel] [PATCH 4/5] Add MSI custom action for reliable Windows 10 detection

2018-11-09 Thread Jon Kunkee via Openvpn-devel
an-executable-using-mt-exe The parent installer could then call GetVersionEx without being lied to and pass it in to your CustomAction DLL through msiexec: https://www.codeproject.com/articles/16767/how-to-pass-command-line-arguments-to-msi-installe Let me know if that doesn't make sense or

Re: [Openvpn-devel] [PATCH 4/5] Add MSI custom action for reliable Windows 10 detection

2018-11-13 Thread Jon Kunkee via Openvpn-devel
s missing in MSI should we need > any down the road. Smart! I hadn't followed the function to its callers, so I missed this. Samuli, LGTM. Thanks, Jon pgpzFq0Ys__sT.pgp Description: PGP signature _______ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH 4/5] Add MSI custom action for reliable Windows 10 detection

2018-11-13 Thread Jon Kunkee via Openvpn-devel
s are. :) > Anyway, I have extended the debug pop-up dialogs to be more informative and > include PID. Patch follows... I took a look and it looks good to me, though I agree it's not strictly necessary. Thanks, Jon ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH] Fix various spelling mistakes

2019-01-22 Thread Simon Matter via Openvpn-devel
Hi, > diff --git a/src/openvpn/console.h b/src/openvpn/console.h > index 0ffd6683..62beacae 100644 > --- a/src/openvpn/console.h > +++ b/src/openvpn/console.h > @@ -33,9 +33,9 @@ > */ > struct _query_user { > char *prompt; /**< Prompt to present t

Re: [Openvpn-devel] [PATCH 0/4] Transport API: offload traffic manipulation to plugins

2019-01-28 Thread Justin Henck via Openvpn-devel
on" on any packet going out and apply the its inverse, on the > receiver > side, for any incoming packet. > Without this patchset, achieving this result would require a big surgery > through the OpenVPN code, and it would be the same for any new mutation one > wants to impl

Re: [Openvpn-devel] [PATCH 4/4] transport-plugin: add sample obfs-test plugin

2019-01-28 Thread Justin Henck via Openvpn-devel
down-root obfs-test > diff --git a/src/plugins/obfs-test/Makefile.am > b/src/plugins/obfs-test/Makefile.am > new file mode 100644 > index ..4cc8d183 > --- /dev/null > +++ b/src/plugins/obfs-test/Makefile.am > @@ -0,0 +1,29 @@ > +MAINTAINERCLEANFILES = \ > + $

[Openvpn-devel] [PATCH] Fix documentation of tls-verify script argument

2019-02-01 Thread openvpn-devel=lists . sourceforge . net
From: Thomas Quinot The second argument is the entire subject DN, not just the CN. --- doc/openvpn.8 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/openvpn.8 b/doc/openvpn.8 index 7abcaf1e..f80393ee 100644 --- a/doc/openvpn.8 +++ b/doc/openvpn.8 @@ -5448,7 +5448,7 @@ is

<    1   2   3   4   5   >