m` parameter is :code:`stub`, :code:`stub-v2` or empty,
>
> compression will be turned off, but the packet framing for compression
>
> will still be enabled, allowing a different setting to be pushed later.
>
> --
>
> 2.31.1
>
>
> Openvpn-devel mailin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Ignore me .. this has been applied
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Sunday, June 20th, 2021 at 19:09, tincantech via Openvpn-devel
wrote:
> Hi
>
> text corrections.
>
> Sorry about protonmai
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
the openvpn-server systemd unit file currently make use of PrivateTmp=True,
this denies the openvpn process access to /tmp (and /var/tmp).
This setting also does not provide the systemd assigned location for temporary
files to the openvpn
sig
Description: PGP signature
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
ech via Openvpn-devel wrote:
>
> > Hi
>
> [... copied from first mail ...]
>
> > > Thus the problem is two fold:
> >
> > It is not possible to pre-determine a temporary directory within the systemd
> >
> > PrivateTmp assigned folder within an open
a PUSH reply to update the token on renegotiations.
> The old code relied on multi->auth_token not being set in this case.
>
> This commit also removes the workaround for old OpenVPN clients. These
> were only available as commercial OpenVPN Connect client and not in use
> anymore.
Message ‐‐‐
On Wednesday, July 28th, 2021 at 16:49, Arne Schwabe wrote:
> This is meant to give new users a quickstart for a useable OpenVPN
quickstart -> quick start
> setup. Our own documentation is lacking in this regard and many
> tutorials that can be found online are often que
ntech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
ze), so it is meant a best effort option and not as
> a mean to provide 100% compatibility.
mean -> means
>
> Signed-off-by: Arne Schwabe
> ---
> Changes.rst | 23 +++
> doc/man-sections/generic-options.rst | 21 ++
> src/openv
mean to provide 100% compatibility.
mean -> means
>
> Patch v2: rebase
>
> Signed-off-by: Arne Schwabe
> ---
> Changes.rst | 23 +++
> doc/man-sections/generic-options.rst | 21 ++
> src/openvpn/comp.h | 1 +
> src/o
0
> >
> > Signed-off-by: Arne Schwabe
> > ---
> > Changes.rst | 23 +++
> > doc/man-sections/generic-options.rst | 21 ++
> > src/openvpn/comp.h | 1 +
> > src/openvpn/options.c | 97
; >
> > Signed-off-by: Antonio Quartulli a...@unstable.cc
> > ----
> >
> > src/openvpn/options.c | 6 +++++-
> >
> > 1 file changed, 5 insertions(+), 1 deletion(-)
> >
> > diff --git a/src/openvpn/o
correct value, prior to
>
> calling --client-disconnect.
>
> Resolves https://community.openvpn.net/openvpn/ticket/160
>
> Signed-off-by: Richard T Bonhomme tincant...@protonmail.com
>
> src/openvpn/multi.c | 3 +++
>
> 1 file changed, 3 insertions(+)
>
> diff --git
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
I NAK this for the following reasons.
The original problem:
"Openvpn does not set common_name for --client-disconnect",
for reasons which have not been identified, no longer occurs.
The code has changed enough since 2011
68AnyR5GRlMItdo91prqcH/bn
ksBxh5OolZeq7Md7K6O63DZgL3Kdj0HpUGavPonVgIrBXj1QoQW69KiEp9/A
98UixypgCCi3yy4wii510Wn9F8ZFmfQBk9l/ilRB5tT+oU6/KyvaZmwz2kRQ
pkmcvXWI40LEvjMXA1Ye5Usn7a1yf5lP2YbJyvhE8mG64mZo6/2fePyTuASd
EhCzxoQ1QIUy/jHL6FCHac6Gt2lx5JH73CI9lKzczvfZmq4Y7a3I5+rjpP2w
Gx4YdA/PkRK5QJtn/KHppCZx4FdYBSvW2Aqq+fSrhzPam//qXQLt6g==
=8IIR
-END PGP SIGNATURE-
publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
One tiny typo:
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Thursday, November 11th, 2021 at 13:00, Arne Schwabe
wrote:
> This allows OpenVPN to load non-default providers. This is mainly
>
> useful for lo
your problem cannot be solved with openvpn service?
> >
> > See, for example,
> >
> > https://openvpn.net/community-resources/running-openvpn-as-a-windows-service/
> >
> > Also this discussion might be relevant:
> >
> > https://github.com/OpenVPN/openvpn-
com
>
> src/openvpn/options.c | 2 +-
>
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/src/openvpn/options.c b/src/openvpn/options.c
>
> index 4a5db8a6..7822f21e 100644
>
> --- a/src/openvpn/options.c
>
> +++ b/src/openvpn/options.c
>
> @@
On 26/11/2021 15:43, Richard T Bonhomme wrote:
>
> > Signed-off-by: Richard T Bonhomme tincant...@protonmail.com
> > ---
> >
> > doc/openvpn.8 | 1 +
> >
> > 1 file changed, 1 insertion(+)
> >
> &
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
It seems only fair to warn the OpenVPN community that Version 2.5.5 has had
bugs identified.
A new release v2.5.6 is planned for the coming week, or so..
Regards
Richard
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Seems I was too hasty here. OpenVPN 2.5.5 is the current release
and there are no bugs severe enough to warrant a version 2.5.6, at this time.
Sorry for the confusion.
Regards
Richard
Sent with ProtonMail Secure Email.
‐‐‐ Original Message
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
=
=N9Ct
-END PGP SIGNATURE-
publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
_______
Openvpn-devel mailing list
Openvpn-dev
> > so, I want to see proof, not just a story. You write that the server is
> > automatically restarting in response to multiple failed TLS handshakes.
> > Show us the evidence please.
> >
> > Until then, we don't have anything to go on, sorry.
> >
&g
union members.
The bug was introduced in 0b6450c9.
Fixes https://community.openvpn.net/openvpn/ticket/1358
Signed-off-by: corubba
---
src/openvpn/ps.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/openvpn/ps.c b/src/openvpn/ps.c
index 4ca3a129..06bf91a8 100644
--- a
determine
the origin of the connection. Each generated file will be automatically
--
2.47.1
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
n't use a
sockaddr but only the addr structs, requires more code to also support.
Signed-off-by: Corubba Smith
---
src/openvpn/dco_linux.c | 13 +---
src/openvpn/socket.c| 72 +
src/openvpn/socket.h| 7
3 files changed, 67 insertions(+), 25
ustom integration.
While this is a spec-compliant [0] sender implementation of the PROXY
protocol, it does not implement it in full. Version 1 was left out
entirely, in favour of the superior and easier-to-implement version 2.
The implementation was also kept minimal with regards to what OpenVPN
sup
Hi,
On 26.12.24 14:13, Gert Doering wrote:
> On Mon, Dec 16, 2024 at 01:22:51PM +0100, corubba via Openvpn-devel wrote:
>> In addition to the custom journal solution, also support the widely
>> used binary PROXY protocol version 2 to convey the original client
>> connect
Just in case it is ever needed.
Signed-off-by: Corubba Smith
---
src/openvpn/ps.c | 42 +++---
src/openvpn/socket.h | 1 +
2 files changed, 36 insertions(+), 7 deletions(-)
diff --git a/src/openvpn/ps.c b/src/openvpn/ps.c
index b5d04c5b..b34df315 100644
Before passing IPv4-mapped IPv6 addresses to the proxy journal,
translate them to plain IPv4 addresses. Whether the connection was
accepted by OpenVPN on a "dual stack" socket is of no importance to the
proxy receiver.
Signed-off-by: Corubba Smith
---
src/openvpn/ps.c | 18 +++
ustom integration.
While this is a spec-compliant sender implementation of the PROXY
protocol, it does not implement it in full. Version 1 was left out
entirely, in favour of the superior and easier-to-implement version 2.
The implementation was also kept minimal with regards to what OpenVPN
supports/req
Hello,
since v2.1 (released 2009) OpenVPN has the "port-share" feature, where
it listens on a tcp port (like 443) and forwards/proxies all incoming
non-OpenVPN connections (like HTTPS) to a different server/port
(hereafter called the "downstream server"). Because thi
ustom integration.
While this is a spec-compliant sender implementation of the PROXY
protocol, it does not implement it in full. Version 1 was left out
entirely, in favour of the superior and easier-to-implement version 2.
The implementation was also kept minimal with regards to what OpenVPN
supports/req
Before passing IPv4-mapped IPv6 addresses to the proxy journal,
translate them to plain IPv4 addresses. Whether the connection was
accepted by OpenVPN on a "dual stack" socket is of no importance to the
proxy receiver.
Signed-off-by: corubba
---
src/openvpn/ps.c | 18
Subject: [PATCH 3/3] port-share: Add unix-socket and udp support for proxy
protocol v2
Just in case it is ever needed.
Signed-off-by: corubba
---
src/openvpn/ps.c | 42 +++---
src/openvpn/socket.h | 1 +
2 files changed, 36 insertions(+), 7 deletions
While port-share already supports IPv6 connections from clients, it only
supported IPv4 connections towards the proxy receiver. The used
common/shared OpenVPN machinery is already IPv6-ready, so all needed was
to use properly-sized `sockaddr` structs and removing hardcoded IPv4
restrictions
of `name`).
Signed-off-by: Corubba Smith
---
Changes.rst | 5 +
doc/man-sections/tls-options.rst | 6 --
src/openvpn/options.c| 27 +--
3 files changed, 6 insertions(+), 32 deletions(-)
diff --git a/Changes.rst b/Changes.rst
index
1` to make OpenVPN read the `name` field [1].
x509-username-fields is currently not implemented for mbed TLS, so that
can be ignored.
[0] https://docs.openssl.org/1.1.1/man3/OBJ_nid2obj/
[1] https://oidref.com/2.5.4.41
Signed-off-by: Corubba Smith
---
doc/man-sections/tls-options.rst | 6
+
doc/man-sections/tls-options.rst | 12
src/openvpn/options.c| 27 +--
3 files changed, 10 insertions(+), 34 deletions(-)
--
2.48.1
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https
ches right
after connect:
the source IP switches from the first-VPN-exit-IP to the
regular-ISP-exit-IP
In openvpn 2.5 and below, this worked fine. Since openvpn 2.6, this
triggers the "Disallow float to an address taken by another client"
code. The root cause for this change of be
he service name to match the start command.
---
Additional discussion: https://github.com/OpenVPN/openvpn/pull/802
distro/systemd/openvpn-cli...@.service.in | 2 +-
distro/systemd/openvpn-ser...@.service.in | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/distro/systemd/o
When setting the SOCKS proxy through the management interface, the
socks_proxy_port pointer would be set to a value that's no longer valid
by the time it's used by do_preresolve_host.
Signed-off-by: Thomas Veerman
---
src/openvpn/init.c | 2 +-
1 file changed, 1 insertion(+),
Hi!
I am developing an eduVPN client for Windows. Imagine the eduVPN client as a
custom OpenVPN GUI. The client uses openvpn.exe for connecting, the
configuration file is provided by eduVPN server once user authenticates
using OAuth. User running the eduVPN client is not an administrator
openvpn.exe. In other words, options
allowed in user editable configs are restricted unless the user is in a
designated group.
I don't quite agree. OpenVPN needs elevation to set up connection because it
runs in user space. IPsec VPN doesn't require elevation for the very same task
sin
id
a brief openvpnserv source code audit not to find anything supporting it.
If you add that option, that would void entire Interactive Service
"security" scheme, wouldn't it?
But that's what I wanted in the first place, as I believe Interactive
Service "security" scheme
Hallo OpenVPN developers,
The last years i closely follow your advances in the source. When you release a
new version of the software, i will pull it, build it in different
configurations and ship it to a small userbase.
To allow the users to choose the flavor of SSL, one of the configurations
Great, Thank You!
--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
Openvpn-devel mailing
Increase TLS_CHANNEL_BUF_SIZE to 4096. When the build is enabled with
ENABLE_PKCS11, the password field can be 4096. The old size of
TLS_CHANNEL_BUF_SIZE was 2048, which is not enough.
Signed-off-by: Ning Wei
---
src/openvpn/common.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff
Increase TLS_CHANNEL_BUF_SIZE to 4096. When the build is enabled with
ENABLE_PKCS11, the password field can be 4096. The old size of
TLS_CHANNEL_BUF_SIZE was 2048, which is not enough.
Signed-off-by: Ning Wei
---
src/openvpn/common.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff
Thank you for reminding this. The reason that I have resent was there was a
typo in the commit comment.
Best regards,Ning
On Friday, March 16, 2018, 9:46:07 AM PDT, Gert Doering
wrote:
Hi,
On Fri, Mar 16, 2018 at 09:40:59AM -0700, Ning Wei via Openvpn-devel wrote:
> Incre
riday, March 16, 2018, 10:30:45 AM PDT, Selva Nair
wrote:
Hi,
Apologies in advance if I'm misreading the intent of this patch.
On Fri, Mar 16, 2018 at 12:40 PM, Ning Wei via Openvpn-devel
wrote:
> Increase TLS_CHANNEL_BUF_SIZE to 4096. When the build is enabled with
> ENABLE_PKCS
If its not purely
authentication data
(i.e., a challenge string + signature at most), sending it as password is not
the right approach. If there is extra text included for convenience,
pre-compressing
may help.
How do you plan to pass the "password" to openvpn client -- from stdin? The
Hi all,
While working on ARM64 tap-windows6, I came up with this quick fix for a minor
issue recently reported via IRC.
This is also a Github PR:
https://github.com/OpenVPN/tap-windows6/pull/51
(The ARM64 work is still underway; I'll start a separate thread about its
current state in
ted. There has been quite
some interest in OpenVPN on my team and my proof of concept went well, so I am
taking a shot at porting tap-windows6 to ARM64 and contributing the port back
to the community.
(I'll have patches to share soon! Please bear with me.)
My proof of concept was pretty s
/02/2018 9:36 AM
To: Samuli Seppänen ; Jon Kunkee ;
openvpn-devel@lists.sourceforge.net
Cc: Marc Sweetgall
Subject: RE: [Openvpn-devel] OpenVPN on ARM64 Windows
Hi,
> We intend to switch away from NSIS to MSI packages. I believe Simon
> already did some work in there but he was rather busy
u did with your
>first PR :).
I think I see a pattern here, and I like it. :)
This PR contains several simple commits:
https://github.com/OpenVPN/tap-windows6/pull/52
Would that be better as several PRs (except the two commits that overlap)?
With this groundwork laid, here's my PR pla
ay) that extracts the default
gateway so that ifconfig-ipv6 isn't needed at all. I'd be happy to make
an attempt at that if it'd be useful :)
Thanks,
Scott
diff --git a/src/openvpn/route.c b/src/openvpn/route.c
index 2d6428b2..35ae8d09 100644
--- a/src/openvpn/route.c
+++ b/src/op
ck out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
ounting the ISO file.
-Original Message-
From: Simon Rozman
Sent: Thursday, June 14, 2018 10:35 AM
To: chipits...@gmail.com; Jon Kunkee
Cc: Samuli Seppänen (sam...@openvpn.net) ; openvpn-devel
(openvpn-devel@lists.sourceforge.net)
Subject: tap-windows6 and AppVeyor
Hi!
Given all the recent upd
14 AM
To: Samuli Seppänen
Cc: Jon Kunkee ; Simon Rozman ;
openvpn-devel
Subject: Re: tap-windows6 and AppVeyor
hi,
I have some very amazing expirience with app veyor when I was playing with
mingw builds.
there was an issue related to mingw and I saw it between builds (mingw
upgraded), so I
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
mpromises" -
This makes sense, no worries. It's already a fairly complex release.
> Then, focus on make nicer installers - .msi for the tap driver, .msi
> for openvpn proper, return to *one* driver that has proper signatures
> for everything.
I'll take a closer look at WIX
y tap-windows6 -specific tests at the moment, so I
> generally just run the OpenVPN test suite against a bunch of OpenVPN 2.x
> / Access Server / Private Tunnel servers:
> <https://github.com/OpenVPN/openvpn-windows-test.git>
I can give that a shot. If I can't figure somet
rs,
Jon
pgpAnBIuyxqSB.pgp
Description: PGP signature
------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
>> Our test environment currently has the following nodes:
>>
>> - One combined HLK Studio/controller
>> - Four identical HLK client nodes
>> - OpenVPN test server
>>
>> The HLK nodes are all Windows Server 2016 as that is our primary target.
&
get to it until next week at the
earliest...
-Original Message-
From: Simon Rozman
Sent: Tuesday, July 3, 2018 6:45 AM
To: Jon Kunkee ; Илья Шипицин ;
Samuli Seppänen
Cc: openvpn-devel
Subject: RE: tap-windows6 and AppVeyor
Hi,
I was dismissed by the AppVeyor about an image preinst
I'm investigating those.
I spent yesterday setting up a local HLK-based test environment with kernel
debugging. Today I'm trying to get two OpenVPN clients to be able to talk to
each other over a VPN so I can start reproducing and investigating the
failures. (I will be sending a mail
Yes, I am aware of that. Note that it’s not tap-windows6, but openvpn.
I talked to the primary contributor to that fork, Kevin Kane, a few days ago.
When I asked if his team had done anything with signing the driver or doing the
HLK work, he said his team uses tap-windows6 as-shipped, complete
I don't know right off, but I will ask.
-Original Message-
From: Samuli Seppänen
Sent: Tuesday, July 3, 2018 11:23 AM
To: Jon Kunkee ; Илья Шипицин
Cc: openvpn-devel
Subject: Re: [Openvpn-devel] Topics for the community meeting (Wed, 13th June
2018)
Hi Jon,
Do you know if
man
Sent: Tuesday, July 3, 2018 12:40 PM
To: Jon Kunkee ; Илья Шипицин ;
Samuli Seppänen
Cc: openvpn-devel
Subject: RE: tap-windows6 and AppVeyor
Hi,
> I chose the EWDK thinking it would actually be easier for CI because it was
> so
> similar to the Win7 DDK, but from what you are say
Hi,
(Retitling thread from RE: [Openvpn-devel] Topics for the community meeting
(Wed, 13th June 2018))
> do you know this activity https://github.com/Microsoft/openvpn/ ?
> there are interesting things
There are *very* interesting things there!
> Do you know if Kevin (or his man
[Resending to openvpn-devel now that I'm subscribed to it.]
Hello all,
Thanks to Jon for making the introduction. My team works on post-quantum (PQ)
cryptography, which is algorithms used by regular computers but which are
resistant to attack by a sufficiently powerful quantum computer.
let me make
clear what I’ve actually done. I changed OpenVPN-GUI when it starts up to
create such an entry for each configuration file it finds, and if the user
clicks “Connect” on one of those entries, it’s exactly the same as if the user
brought up the right-click menu for OpenVPN-GUI’s icon
This was meant to be a quick and simple integration. The problem with
Disconnect is the problem I mentioned below: since OpenVPN uses a nonstandard
driver for the network communications, the UI will never present a Disconnect
button, and so there's no way to actually call the Disco
, 4 insertions(+)
diff --git a/windows-nsis/openvpn.nsi b/windows-nsis/openvpn.nsi
index e92904d..aff7cb3 100755
--- a/windows-nsis/openvpn.nsi
+++ b/windows-nsis/openvpn.nsi
@@ -1,6 +1,7 @@
;
; * Copyright (C) 2002-2010 Open
Ok, I've gotten clearance to contribute the dialer feature from Microsoft's
OpenVPN fork back upstream. As previously discussed, this feature isn't
production-ready because the integration I did was quick and dirty - it mainly
just sends commands to a running OpenVPN-GUI process
LES = \
config.log config.status \
@@ -106,7 +108,13 @@ openvpn_gui_LDADD = \
-lnetapi32 \
-lole32 \
-lshlwapi \
- -lsecur32
+ -lsecur32 \
+ -lrasapi32
openvpn-gui-res.o: $(openvpn_gui_RESOURCES) $(src
es()
return 1;
}
+if (0 != HandleDialerRegistration(1))
+{
+_tprintf(TEXT("HandleDialerRegistration uninstall failed;
ignoring\n"));
+}
+
for (i = 0; i < _service_max; i++)
{
openvpn_service_t *ovpn_svc = &openvpn_service[i];
--
2.17.1.windows.2
--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
tream.
-Original Message-
From: Selva Nair
Sent: Wednesday, July 25, 2018 10:28 AM
To: Kevin Kane
Cc: openvpn-devel
Subject: Re: [Openvpn-devel] [PATCH] [openvpn-gui] Update system tray to
populate Windows VPN flyout
Hi,
On Wed, Jul 25, 2018 at 1:01 PM, Kevin Kane via Openvpn-devel
wrote:
&
From: Gert Doering
Sent: Wednesday, July 25, 2018 11:00 AM
To: Kevin Kane
Cc: openvpn-devel
Subject: Re: [Openvpn-devel] [PATCH] [openvpn-gui] Update system tray to
populate Windows VPN flyout
Hi,
as a side note, your mail client massacres leading whitespace, so the patch is
all squeezed t
ateService failed - %s\n"),
GetLastErrorText());
+}
}
}
@@ -160,6 +358,11 @@ CmdRemoveServices()
return 1;
}
+if (0 != HandleDialerRegistration(1))
+{
+_tprintf(TEXT("HandleDialerRegistration uninstall failed;
ignoring\n"));
+}
+
for (i
@@
;
; * Copyright (C) 2002-2010 OpenVPN Technologies, Inc. *
; * Copyright (C) 2012 Alon Bar-Lev *
+; * Portions Copyright (C) 2018 Microsoft Corporation*
; * This program is free
+ -lsecur32 \
+ -lrasapi32
openvpn-gui-res.o: $(openvpn_gui_RESOURCES) $(srcdir)/openvpn-gui-res.h
$(RCCOMPILE) -i $< -o $@
+
+lib_LTLIBRARIES = libopenvpndialer.la
+libopenvpndialer_la_SOURCES = dialer.c
+libopenvpndialer_la_LDFLAGS = -no-undefi
Alright, I found the SMTP server and sent the patches out again with git
send-email. Let me know how those look.
-Original Message-
From: Gert Doering
Sent: Wednesday, July 25, 2018 11:18 AM
To: Kevin Kane
Cc: Gert Doering ; openvpn-devel
Subject: Re: [Openvpn-devel] [PATCH
ing.
My 2c,
Jon
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
fied.)
If you're feeling daring, you could try rebuilding the driver with this
extremely hacky change and see if the perf changes:
https://github.com/jkunkee/tap-windows6/commit/2706c9a98bd25a0fee6559ac132d75622475c26e
HTH,
Jon
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
This looks pretty straightforward to me.
-Original Message-
From: Simon Rozman
Sent: Tuesday, October 16, 2018 3:26 AM
To: openvpn-devel@lists.sourceforge.net
Subject: [Openvpn-devel] [PATCH 1/5] Set output name to libopenvpnmsica.dll in
MSVC builds too
On MinGW builds, the Libtool
Samuli, LGTM.
-Original Message-
From: Simon Rozman
Sent: Tuesday, October 16, 2018 3:26 AM
To: openvpn-devel@lists.sourceforge.net
Subject: [Openvpn-devel] [PATCH 5/5] Detect TAP interfaces with root-enumerated
hardware ID
This patch extends the TAP interface enumerating to detect
UCH more convenient to use the
CustomAction debugging facility built into the MSI service itself:
https://docs.microsoft.com/en-us/windows/desktop/Msi/debugging-custom-actions
Thanks,
Jon
-Original Message-
From: Simon Rozman
Sent: Tuesday, October 16, 2018 3:26 AM
To: openv
spx
This is why the names don't get mangled. Of course, it's then inconsistent.
Export name consistency is needed so CustomActions can reference the
export symbol name, right?
Jon
-Original Message-
From: Simon Rozman
Sent: Tuesday, October 16, 2018 3:26 AM
To: openvpn-devel
LGTM, Samuli.
-Original Message-
From: Simon Rozman
Sent: Tuesday, October 16, 2018 3:26 AM
To: openvpn-devel@lists.sourceforge.net
Subject: [Openvpn-devel] [PATCH 3/5] Define _WIN32_WINNT=_WIN32_WINNT_VISTA in
MSVC
This makes MSVC and MinGW build environments more alike.
---
src
27;m glad there's
something that works.
> I had to pick my poison, and I choose to fix issues as close to the source
> as possible.
Understood. Thanks for the explanation.
Samuli, LGTM.
Jon
_______
Openvpn-devel mailing list
Openvpn-devel@list
an-executable-using-mt-exe
The parent installer could then call GetVersionEx without being lied to and
pass it in to your CustomAction DLL through msiexec:
https://www.codeproject.com/articles/16767/how-to-pass-command-line-arguments-to-msi-installe
Let me know if that doesn't make sense or
s missing in MSI should we need
> any down the road.
Smart! I hadn't followed the function to its callers, so I missed this.
Samuli, LGTM.
Thanks,
Jon
pgpzFq0Ys__sT.pgp
Description: PGP signature
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
s are. :)
> Anyway, I have extended the debug pop-up dialogs to be more informative and
> include PID. Patch follows...
I took a look and it looks good to me, though I agree it's not strictly
necessary.
Thanks,
Jon
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
Hi,
> diff --git a/src/openvpn/console.h b/src/openvpn/console.h
> index 0ffd6683..62beacae 100644
> --- a/src/openvpn/console.h
> +++ b/src/openvpn/console.h
> @@ -33,9 +33,9 @@
> */
> struct _query_user {
> char *prompt; /**< Prompt to present t
on" on any packet going out and apply the its inverse, on the
> receiver
> side, for any incoming packet.
> Without this patchset, achieving this result would require a big surgery
> through the OpenVPN code, and it would be the same for any new mutation one
> wants to impl
down-root obfs-test
> diff --git a/src/plugins/obfs-test/Makefile.am
> b/src/plugins/obfs-test/Makefile.am
> new file mode 100644
> index ..4cc8d183
> --- /dev/null
> +++ b/src/plugins/obfs-test/Makefile.am
> @@ -0,0 +1,29 @@
> +MAINTAINERCLEANFILES = \
> + $
From: Thomas Quinot
The second argument is the entire subject DN, not just the CN.
---
doc/openvpn.8 | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/doc/openvpn.8 b/doc/openvpn.8
index 7abcaf1e..f80393ee 100644
--- a/doc/openvpn.8
+++ b/doc/openvpn.8
@@ -5448,7 +5448,7 @@ is
101 - 200 of 408 matches
Mail list logo