[Openvpn-devel] Erratic TCP Throughput

2010-03-03 Thread openvpn
Hi, I have noticed erratic (or at least not real reliable) throughput when using OpenVPN in proto tcp mode (as I have to - UDP is not available to me, having to go through a TCP Proxy server). On my home network I just ran some tests, using iperf to characterize connection bandwidth

Re: [Openvpn-devel] Erratic TCP Throughput

2010-03-03 Thread openvpn
AM, "Karl O. Pinc" wrote: > On 03/03/2010 02:40:16 AM, Jason Haar wrote: > > On 03/03/2010 04:52 PM, open...@rkmorris.us wrote: > > > > > > 1) Without OpenVPN - consistent performance, ~ 70 Mbps total > > > throughput (on a 100 Mb LAN). > >

Re: [Openvpn-devel] Openvpn 2.1.1 bad tcp performance but good pingwhen -l 1472 (with packet size = MTU)

2010-03-04 Thread openvpn
Hi, I just tried this, and at least for my data throughput test it didn't seem to help ... buy maybe I have this wrong. I did this in the client configuration file ... is this right? I checked the OpenVPN web site, and it may be that I need this on the server side instead. P

Re: [Openvpn-devel] Openvpn 2.1.1 bad tcp performance but good pingwhen -l 1472 (with packet size = MTU)

2010-03-05 Thread openvpn
iling list or not, but let me try to attach a couple pictures showing this with and without OpenVPN (to try to make this easier to see). Thoughts? Thanks! On Fri, Mar 5, 2010 02:01 AM, Gert Doering wrote: > Hi, > > On Thu, Mar 04, 2010 at 05:21:43PM -0600, open...@rkmorris.

Re: [Openvpn-devel] Openvpn 2.1.1 bad tcp performance but good pingwhen -l 1472 (with packet size = MTU)

2010-03-05 Thread openvpn
Hi, That's a very good suggestion! I just tried this with OpenVPN-ALS (adito), and while the average performance is slightly lower (java vs. compiled code?), the throughput inconsistency is not there, rather it's only the case with OpenVPN! Attached another throughput pl

Re: [Openvpn-devel] Erratic TCP Throughput

2010-03-06 Thread openvpn
Hi, No, compression was on - so I also ran it again with it turned off (on both ends). Here are the results ... It seems that compression boosts performance from ~ 30 Mb/s to ~ 50 Mb/s overall, but still very erratic results ... :-(. Thoughts? Thanks! On Fri, Mar 5, 2010 05:20 P

[Openvpn-devel] Bytecount Reporting

2010-03-17 Thread openvpn
Hi, I am trying to write an application that monitors traffic over an OpenVPN link - by using bytecount information from the management interface. However, after I telnet in, and enter "bytecount 1" (for 1 second updates), I find that the real-time bytecount updates are not re

Re: [Openvpn-devel] Bytecount Reporting

2010-03-17 Thread openvpn
Hi, I'm running OpenVPN (client) on Windows - connecting to a Linux Server. I am wondering if a value isn't reported if there is no traffic - that could be part of this (though it would be better to report information anyways). Make sense? Thanks! ... Russell On W

Re: [Openvpn-devel] Bytecount Reporting

2010-03-17 Thread openvpn
Hi, All very good questions! Some thoughts, below. Thanks for all your help! ... Russell On Wed, Mar 17, 2010 05:01 PM, David Sommerseth wrote: > On 17/03/10 22:40, open...@rkmorris.us wrote: > > Hi, > > > > > > > > I'm running OpenVPN

Re: [Openvpn-devel] Bytecount Reporting

2010-03-17 Thread openvpn
Management Interface, but it's really a telnet type response, not in a file. Thanks, ... Russell On Wed, Mar 17, 2010 05:38 PM, Davide Brini wrote: > On Wednesday 17 March 2010, open...@rkmorris.us wrote: > > > I am trying to write an application that monitors traffic ov

[Openvpn-devel] Auto-Proxy

2010-04-02 Thread openvpn
Hi, I have been using two different config files to connect to my OpenVPN server - as I am sometimes behind a proxy server, and sometimes not. So to fix this I tried using auto-proxy ... but it didn't work (in the proxy case) ... :-(. I am running the client on Windows - so it s

Re: [Openvpn-devel] [Openvpn-users] Auto-Proxy

2010-04-05 Thread openvpn
: Friday, April 02, 2010 5:31 PM > To: openvpn-us...@lists.sourceforge.net; openvpn-devel@lists.sourceforge.net > Subject: [Openvpn-users] Auto-Proxy Hi, I have been using two different config files to connect to my OpenVPN server - as I am sometimes behind a proxy server, and someti

Re: [Openvpn-devel] Auto-Proxy

2010-04-14 Thread openvpn
;> > >> > >> > >> I have been using two different config files to connect to my OpenVPN > >> server - as I am sometimes behind a proxy server, and sometimes not. > >> So to fix this I tried using auto-proxy ... but it didn't work (in the > &

[Openvpn-devel] Status Message Missing IP Address

2010-04-24 Thread openvpn
(allowing OpenVPN to assign the IP address). When I did this the management interface on the client reported the IP address that it was assigned (both in real-time or manual state commands). However, now I have changed the server configuration file to allow the local DHCP server (router) to assign

Re: [Openvpn-devel] Status Message Missing IP Address

2010-04-24 Thread openvpn
: Saturday, April 24, 2010 5:08 AM To: open...@rkmorris.us Cc: openvpn-us...@lists.sourceforge.net; openvpn-devel@lists.sourceforge.net Subject: Re: [Openvpn-devel] Status Message Missing IP Address -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 24/04/10 06:54, open...@rkmorris.us wrote: > >

Re: [Openvpn-devel] Status Message Missing IP Address

2010-04-24 Thread openvpn
e > > management interface on the client ... why would it not know (or at > > least report) it's IP address? > > Because it's not OpenVPN's IP address it's the client OS's > IP address. OpenVPN is acting as a virtual wire. The > client is obtaini

Re: [Openvpn-devel] Any volunteer Windows devs to change OpenVPN proxying code to use "new" InternetQueryOption API?

2010-04-28 Thread openvpn
to be the way to do this (see http://msdn.microsoft.com/en-us/library/aa384097(v=VS.85).aspx for an example). I hope this helps! ... Russell On Wed, Apr 28, 2010 09:01 AM, Samuli Seppänen wrote: > Hi all, > > A while back a user noticed that OpenVPN still uses

[Openvpn-devel] TCP Window Size - Impact on Data Throughput

2010-09-09 Thread openvpn
Hi, I can't explain the information below, but hopefully someone a whole bunch smarter than me understands it - as it seems to help with TCP throughput in OpenVPN (the holy grail??? ... :-)). I have added some plots and details to an open OpenVPN ticket, located here ...

Re: [Openvpn-devel] TCP Window Size - Impact on Data Throughput

2010-09-15 Thread openvpn
hopefully someone a whole > >> bunch smarter than me understands it - as it seems to help with > >> TCP throughput in OpenVPN (the holy grail??? ... :-)). > >> > > > > Did you change TCP window size on the client, or on the OpenVPN process? > > > &g

[Openvpn-devel] openvpn, NTLM and McAfee Web Gateway

2010-10-14 Thread openvpn
dear all,a few days ago I deployed an ovpn solution in a medium sized company. One of the two ends of the vpn network is passing through a proxy with NTLM authentication. ovpn has problems to recognize the authentication because immediately after sending the message type 1, the proxy sends no r

Re: [Openvpn-devel] openvpn, NTLM and McAfee Web Gateway

2010-10-15 Thread openvpn
> > ^@^A^@^@^@ > > After this they differ noticeably. I'd guess they are just sending > different NTLM flags: > > > > Can somebody more fluent in NTLM protocol decipher these two messages? > > -- > Samuli Sepp?nen > Community Manager >

Re: [Openvpn-devel] openvpn, NTLM and McAfee Web Gateway

2010-10-19 Thread openvpn
Da: "Jan Just Keijser" janj...@nikhef.nl A: "openvpn" open...@lucullo.it Cc: openvpn-devel@lists.sourceforge.net Data: Mon, 18 Oct 2010 12:58:35 +0200 Oggetto: Re: [Openvpn-devel] openvpn, NTLM and McAfee Web Gateway > openvpn wrote: > > dear all, > > &g

[Openvpn-devel] [PATCH 2/2] Add table output formatting to t_client.sh

2016-05-21 Thread openvpn-devel
From: Jens Neuhalfen Test results will be printed in a tabular format, e.g. | ID | TEST| RESULT | | -- | --- | | | 1 | testing tun/udp/ipv4| [SUCCESS]| | 2 | testing t

[Openvpn-devel] [PATCH 1/2] Refactor t_client.sh

2016-05-21 Thread openvpn-devel
internal error in run_ping_tests arg 1: '$proto'" >&2 - exit 1 ;; +4) cmd=fping ;; +6) cmd=fping6 ;; +*) echo "internal error in run_ping_tests arg 1: '$proto'" >&2 + exit 1 ;; esac case $want in -

[Openvpn-devel] Refactor t_client.sh & improve output formatting

2016-05-21 Thread openvpn-devel
review these patches have also been provided via GitHub pull request: https://github.com/OpenVPN/openvpn/pull/49 Due to moving code around and intention changes this patch looks rather large: 1 file changed, 267 insertions(+), 180 deletions(-).

[Openvpn-devel] Add unit testing support

2016-05-25 Thread openvpn-devel
This is a series of two patches that add unit testing support to openvpn. See https://github.com/OpenVPN/openvpn/pull/44 for a discussion. Thanks to syzzer for his nitty-gritty review! Jens

[Openvpn-devel] [PATCH 1/2] Add unit testing support via cmocka

2016-05-25 Thread openvpn-devel
From: Jens Neuhalfen cmocka [1,2] is a testing framework for C. Adding unit test capabilities to the openvpn repository will greatly ease the task of writing correct code. cmocka source code is added as git submodule in ./vendor. A submodule approach has been chosen over a classical library

[Openvpn-devel] [PATCH 2/2] Add a test for auth-pam searchandreplace

2016-05-25 Thread openvpn-devel
int -string_array_len (const char *array[]) -{ - int i = 0; - if (array) -{ - while (array[i]) - ++i; -} - return i; -} /* * Socket read/write functions. diff --git a/src/plugins/auth-pam/utils.c b/src/plugins/auth-pam/utils.c new file mode 100644 index 000..4f2bec1 --- /dev/n

[Openvpn-devel] socklen_t type error resulting from uint8_t duplicate typedef on osx. help?

2007-07-10 Thread snowcrash+openvpn
hi, i'm building openvpn-2.1_rc4 on osx 10.4.10. currently, ./configure \ --prefix=/usr/local/openvpn \ --enable-pthread \ --disable-password-save \ --with-ssl-headers=/usr/local/ssl/include/openssl/ \ --with-ssl-lib=/usr/local/ssl/lib/ \ --with-lzo-headers=/usr/local/include/lzo \ --wit

[Openvpn-devel] CE port needed DLLs

2009-05-27 Thread jonathan openvpn
Hello. I'm triying to execute a Windows CE 5.0 porting of openvpn client application. I've been successful on compiling it but when i try to execute i receive the message: "openvpn is not a valid WindowsCE application". I am compiling to ARM-Thumb architecture. I suspect the

Re: [Openvpn-devel] CE port needed DLLs

2009-05-28 Thread jonathan openvpn
nly need to stablish a connection to a VPN server without need of a GUI, all configuration must be transparent to the user. Therefore I think we only need the openvpn executable and TAP_CE driver. If i'm not wrong, the ovpncmgr module is to provide a GUI for the openVPN client. Is that correct?

Re: [Openvpn-devel] CE port needed DLLs

2009-05-28 Thread jonathan openvpn
> > Assuming your error message really means 'missing dlls' instead of 'invalid > binary' then you should be better off. > > Again, if you want to send me your compiled binary, I can inspect it more > closely if that is useful. > > -Dave > &

[Openvpn-devel] Cannot find TAP adapter

2009-06-08 Thread jonathan openvpn
Hello. I'm triying to execute a Windows CE port of OpenVPN in a custom hardware. First of all, let me say that I cannot use the connection manager due to the plattform i am using. I've been succesfull on open the socket and retrieve initial information from the OpenVPN server. I also

[Openvpn-devel] CBC mode attack

2010-12-23 Thread travis+ml-openvpn-devel
Hey guys... Was wondering if you were familiar with this: http://news.ycombinator.com/item?id=2029640 And, well... it sounded really familiar: http://www.mail-archive.com/cryptography@metzdowd.com/msg07521.html -- Good code works on most inputs; correct code works on all inputs. My emails do n

[Openvpn-devel] suggested config settings for wifi?

2011-12-08 Thread travis+ml-openvpn-devel
All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2d-oct___

[Openvpn-devel] Unsubscribe

2017-06-16 Thread smitco via Openvpn-devel
Sent from ProtonMail Mobile On Thu, Jun 15, 2017 at 8:00 PM, wrote: Send Openvpn-devel mailing list submissions to openvpn-devel@lists.sourceforge.net To subscribe or unsubscribe via the World Wide Web, visit https://lists.sourceforge.net/lists/listinfo/openvpn-devel or, via email, send a

[Openvpn-devel] Openvpn

2018-10-29 Thread Joeasj via Openvpn-devel
Sent from my iPhone ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

[Openvpn-devel] obfs4proxy-openvpn: A Bash script for obfuscating OpenVPN traffic using obfs4

2019-01-17 Thread Hamy via Openvpn-devel
Hi, I have developed a bash script to make openvpn work with obfs4. It's hosted on github: https://github.com/HRomie/obfs4proxy-openvpn It might be worth updating the obfuscation article article and include it:  https://community.openvpn.net/openvpn/wiki/TrafficObfuscation Re

Re: [Openvpn-devel] [PATCH] systemd: Change the default cipher to AES-256-GCM for server configs

2020-06-22 Thread André via Openvpn-devel
gt; default cipher for the VPN tunnel when starting OpenVPN via systemd > > and the openvpn-server@.service unit file. > > To avoid breaking existing running configurations defaulting to BF-CBC, > > the Negotiable Crypto Parameters (NCP) list contains the BF-CBC in > > addi

[Openvpn-devel] Wiki: PluginOverview

2020-07-17 Thread André via Openvpn-devel
Hi, Regarding radius plugin: https://community.openvpn.net/openvpn/wiki/PluginOverview The source is here: https://www.nongnu.org/radiusplugin/ Edited Wiki page. W.k.r Pippin Sent with ProtonMail Secure Email. ___ Openvpn-devel mailing list

[Openvpn-devel] Regarding deprecation of --route-nopull

2020-07-23 Thread André via Openvpn-devel
Hi, Regarding, https://community.openvpn.net/openvpn/wiki/DeprecatedOptions#Option:--route-nopull "Openvpn devs would like to know if you use this option". Many pfSense users use this option to policy route. P.S. Made a feature request at pfSense Redmine to add --pull-filter six

Re: [Openvpn-devel] Regarding deprecation of --route-nopull

2020-07-23 Thread André via Openvpn-devel
Hi, > Am 23.07.2020 um 20:14 schrieb André via Openvpn-devel: > > > Hi, > > Regarding, > > https://community.openvpn.net/openvpn/wiki/DeprecatedOptions#Option:--route-nopull > > "Openvpn devs would like to know if you use this option". > > Many

Re: [Openvpn-devel] [PATCH] Document that --push-remove is generally more suitable than --push-reset

2020-09-08 Thread André via Openvpn-devel
years (!!) waiting for someone to go > > and implement it... 6 years it sat on your lap, 4 years on mine (or so), > > so it looks like this is not going to happen any time soon. > > It also feels like a feature from a different area when pushed options > were few and not as essent

[Openvpn-devel] Fw: Re: [Openvpn-users] Problem with service on windows server

2022-06-28 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Forwarding to openvpn-devel, as requested. CC'ing -users FTR. --- Original Message --- On Tuesday, June 28th, 2022 at 02:59, Selva Nair wrote: > Hi, > > > > > > the \\config-auto folder is only created i

[Openvpn-devel] New option --suppress-auth-cache-warning

2022-07-01 Thread tincantech via Openvpn-devel
/bGCj3DJCioYy8r1A== =AASZ -END PGP SIGNATURE- publickey - tincantech@protonmail.com - 0x09BC3D44.asc Description: application/pgp-keys publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig Description: PGP signature ___ Openvpn-devel mailing list

Re: [Openvpn-devel] Possible bug?

2022-08-18 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi Magnus, can you report this as an issue on github, please ? https://github.com/OpenVPN/easy-rsa/issues My first guess would be the version of openssl 3.0.1 is at fault. Thanks, Richard Sent with Proton Mail secure email. --- Original

Re: [Openvpn-devel] [PATCH v5 2/3] Allow setting control channel packet size with max-packet-size

2022-10-20 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Plus one more typo. Sent with Proton Mail secure email. --- Original Message --- On Thursday, October 20th, 2022 at 11:05, Arne Schwabe wrote: > diff --git a/src/openvpn/common.h b/src/openvpn/common.h > index b94680885..dce

Re: [Openvpn-devel] OpenVPN 2.6.0 released

2023-01-27 Thread André via Openvpn-devel
eld wrote: > [...snip...] > > > On Red Hat derivatives we recommend using the Fedora Copr repository. > > > > https://copr.fedorainfracloud.org/coprs/dsommers/openvpn-release/ > > > > A slight update here. The repo above will be preserved for OpenVPN 2.5 &

Re: [Openvpn-devel] IRC community meeting summary (Feb 14th)

2024-02-14 Thread tincantech via Openvpn-devel
C3D44.asc Description: application/pgp-keys publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig Description: PGP signature _______ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH] Fix 'compress migrate' for 2.2 clients.

2021-04-02 Thread tincantech via Openvpn-devel
uot; or needs to be sent > > "comp-lzo no". > > Hi, > > What I'm still wondering is why is compression so dangerous with OpenVPN > but not so with things like SSH or SCP? > Simon, I believe the detail which you have over-looked is this: A lot of people use openvp

Re: [Openvpn-devel] [PATCH] Fix 'compress migrate' for 2.2 clients.

2021-04-02 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Sent with ProtonMail Secure Email. ‐‐‐ Original Message ‐‐‐ On Saturday, 3 April 2021 01:43, tincantech via Openvpn-devel wrote: > > But i believe you need to have access to both the compressed VPN data > and the uncompres

Re: [Openvpn-devel] [PATCH v2] Remove P2MP mode and check for gettimeofday

2021-04-03 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Sent with ProtonMail Secure Email. ‐‐‐ Original Message ‐‐‐ On Saturday, 3 April 2021 19:46, Arne Schwabe wrote: > Using OpenVPN without P2MP support (pull, TLS) is unrealistic and > building a binary without it is not someth

Re: [Openvpn-devel] [PATCH 11/14] Remove P2MP mode and check for gettimeofday

2021-04-03 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Before this goes any further, I doubt very much that Openvpn intends to "Remove P2MP mode". Sent with ProtonMail Secure Email. ‐‐‐ Original Message ‐‐‐ On Thursday, 1 April 2021 18:27, Arne Schwabe wrote: > Am 01.0

Re: [Openvpn-devel] [PATCH 2/3] Remove --ncp-disable option

2021-04-09 Thread tincantech via Openvpn-devel
: > https://github.com/OpenVPN/openvpn/blob/master/doc/man-sections/cipher-negotiation.rst > > That should also answer your question. > sorry for the noise but I created a quick ref. guide for cipher negotiation: https://community.openvpn.net/openvpn/wiki/CipherNegotiation It may be of

Re: [Openvpn-devel] make --persist-key always-on and remove "off" code path

2021-04-09 Thread tincantech via Openvpn-devel
SIGNATURE- publickey - tincantech@protonmail.com - 0x09BC3D44.asc Description: application/pgp-keys publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig Description: PGP signature _______ Openvpn-devel mailing list Openvpn-devel@lists.source

[Openvpn-devel] --tls-crypt-v2-verify env $daemon_pid

2021-04-22 Thread tincantech via Openvpn-devel
signature ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] --tls-crypt-v2-verify env $daemon_pid

2021-04-25 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Friday, 23 April 2021 07:13, Gert Doering wrote: > Hi, > > On Thu, Apr 22, 2021 at 09:02:30PM +, tincantech via Openvpn-devel wrote: > > > I am requesting that $daemon_pid be added to

Re: [Openvpn-devel] --tls-crypt-v2-verify env $daemon_pid

2021-04-25 Thread tincantech via Openvpn-devel
021 08:12, Antonio Quartulli a...@unstable.cc wrote: > > > > > Hi, > > > > > On 22/04/2021 23:02, tincantech via Openvpn-devel wrote: > > > > > > hi, > > > > I am requesting that $daemon_pid be added to the --tls-crypt-v2-verify > > &

Re: [Openvpn-devel] --tls-crypt-v2-verify env $daemon_pid

2021-04-25 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Friday, 23 April 2021 08:12, Antonio Quartulli wrote: > Hi, > > On 22/04/2021 23:02, tincantech via Openvpn-devel wrote: > > > hi, > > I am requesting that $daemon_pid be added to t

[Openvpn-devel] [openvpn-devel] Feature request - Include daemon_pid in --tls-crypt-v2-verify env - V2

2021-04-25 Thread tincantech via Openvpn-devel
pushed client variable IV_HWADDR can be matched against the fixed hardware address encrypted in the TLS Crypt V2 key metadata. Security: There are no known security concerns with regard to including the openvpn process ID (daemon_pid) in the --tls-crypt-v2-verify environment. Complexity: Ongoing

Re: [Openvpn-devel] [openvpn-devel] Feature request - Include daemon_pid in --tls-crypt-v2-verify env - V2

2021-04-27 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, no complaints yet ? Sent with ProtonMail Secure Email. ProtonMail, as crap as googlemail. ‐‐‐ Original Message ‐‐‐ On Friday, 23 April 2021 22:16, tincantech via Openvpn-devel wrote: > Hi, > > I am requesting that daem

[Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify script environment

2021-04-28 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Openvpn process ID (daemon_pid) provides the most secure way for scripts to verify which process they were called by. This patch adds daemon_poid to --tls-crypt-v2-verify environment. Tested on Linux and Windows. diff --git a/src/openvpn

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify script environment

2021-04-28 Thread tincantech via Openvpn-devel
tincantech wrote: > Openvpn process ID (daemon_pid) provides the most secure way for > scripts to verify which process they were called by. > > This patch adds daemon_poid to --tls-crypt-v2-verify environment. > > Tested on Linux and Windows. > > diff --git a/src/openvpn/tls

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify script environment

2021-04-28 Thread tincantech via Openvpn-devel
‐‐‐ Original Message ‐‐‐ On Wednesday, 28 April 2021 18:48, tincantech via Openvpn-devel wrote: > Yeah, I forgot to apply and commit -- sorry. > > I guess I'll send again if this is an acceptable patch and my MTA didn't > screw it up ? > Please let me know .. th

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify script environment

2021-04-29 Thread tincantech via Openvpn-devel
would be willing to accept my proposed patch and > then I will persist to find a way. > > If you will not accept the addition then please let me know. > > Thanks > R > > ‐‐‐ Original Message ‐‐‐ > On Wednesday, 28 April 2021 18:48, tincantech via Openvpn-devel &

[Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify environment

2021-04-29 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Under Windows, programmatically retrieving the parent process ID of the openvpn instance which called a script is practically impossible. The only sensible way, currently available, is to write a PID file. This patch adds a single integer variable

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify environment

2021-05-03 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 ‐‐‐ Original Message ‐‐‐ On Thursday, 29 April 2021 18:15, Richard T Bonhomme wrote: > From: string vest stringves...@gmail.com > > Under Windows, programmatically retrieving the parent process ID of > the openvpn instance wh

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify environment

2021-05-04 Thread tincantech via Openvpn-devel
rieving the parent process ID of > > the openvpn instance which called a script is practically impossible. > > The only sensible way, currently available, is to write a PID file. > > This patch adds a single integer variable, named daemon_pid, to the > > script environment

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify environment

2021-05-04 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Tuesday, 4 May 2021 13:43, tincantech via Openvpn-devel wrote: > Hi, > > ‐‐‐ Original Message ‐‐‐ > On Tuesday, 4 May 2021 11:50, Arne Schwabe a...@rfc2549.org wrote: > > >

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify environment

2021-05-04 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Tuesday, 4 May 2021 20:41, Selva Nair wrote: > On Tue, May 4, 2021 at 3:04 PM tincantech via Openvpn-devel > openvpn-devel@lists.sourceforge.net wrote: > > > Due to the inordinate resist

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify environment

2021-05-04 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Sent with ProtonMail Secure Email. ‐‐‐ Original Message ‐‐‐ On Tuesday, 4 May 2021 21:36, tincantech via Openvpn-devel wrote: > Hi, > > ‐‐‐ Original Message ‐‐‐ > On Tuesday, 4 May 2021 20:41, Selva Nair selva.n.

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify environment

2021-05-05 Thread tincantech via Openvpn-devel
nderstand the secure in > > > this context. What are you protecting yourself against? You are not > > > protecting your script being called from a malicious program as that > > > could lookup the PID of openvpn and just set the daemon_id variable. > > > > The

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify environment

2021-05-10 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Monday, 10 May 2021 18:29, Gert Doering wrote: > Hi, > > On Wed, May 05, 2021 at 10:00:37PM +, tincantech via Openvpn-devel wrote: > > > thanks for the feedback, I can resubmit with

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify environment

2021-05-10 Thread tincantech via Openvpn-devel
x09BC3D44.asc Description: application/pgp-keys publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig Description: PGP signature ___________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify environment

2021-05-10 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Monday, 10 May 2021 23:10, Selva Nair wrote: > On Mon, May 10, 2021 at 4:24 PM tincantech via Openvpn-devel > openvpn-devel@lists.sourceforge.net wrote: > > > -BEGIN PGP SIGNED MESSAG

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify environment

2021-05-11 Thread tincantech via Openvpn-devel
3SW72J5RjdlLFPfKITfrPgIuzFhFc6rvmyplU Sz41k1Bd1QprZwIGE7JiZDLajOmYkmGUaqXQ6AoLWmTZJACNFDKyQZYXs7lY wwoROF6u14vxLh2TeQ1btfuxnGUs2HhpqZX80TrxAm80EQyBrnJ5bA== =17mP -END PGP SIGNATURE- publickey - tincantech@protonmail.com - 0x09BC3D44.asc Description: application/pgp-keys publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig Des

Re: [Openvpn-devel] [PATCH 9/9] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-13 Thread tincantech via Openvpn-devel
opefully, protonmail will have a solution, or maybe someone here knows what I can do/try ? Finally, I wrote a simple script which generates self-signed certs, keys and inlines the fingerprint for use with Openvpn. https://github.com/TinCanTech/easy-pfp I hope it is of some use in t

Re: [Openvpn-devel] [PATCH 9/9] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-13 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, I used sed to create my own reply .. comments inline. ‐‐‐ Original Message ‐‐‐ On Wednesday, 12 May 2021 14:15, Arne Schwabe wrote: > This is meant to give new users a quickstart for a useable OpenVPN > setup. O

Re: [Openvpn-devel] [PATCH 9/9] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-13 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, missed one.. ‐‐‐ Original Message ‐‐‐ On Thursday, 13 May 2021 22:48, tincantech via Openvpn-devel wrote: > Hi, > > I used sed to create my own reply .. > > comments inline. > > ‐‐‐ Original Message ‐

[Openvpn-devel] Feature request - Allow comments inside markers

2021-05-17 Thread tincantech via Openvpn-devel
- 0x09BC3D44.asc Description: application/pgp-keys publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig Description: PGP signature ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] Feature request - Allow comments inside markers

2021-05-17 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Monday, 17 May 2021 16:31, Gert Doering wrote: > Hi, > > On Mon, May 17, 2021 at 02:57:32PM +, tincantech via Openvpn-devel wrote: > > > I think it would useful to allow comment inside

Re: [Openvpn-devel] [PATCH 9/9] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-17 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Wednesday, 12 May 2021 14:15, Arne Schwabe wrote: > This is meant to give new users a quickstart for a useable OpenVPN > setup. Our own documentation is lacking in this regard and many often >

Re: [Openvpn-devel] [PATCH 9/9] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-17 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Monday, 17 May 2021 18:16, tincantech via Openvpn-devel wrote: > Hi, > > ‐‐‐ Original Message ‐‐‐ > On Wednesday, 12 May 2021 14:15, Arne Schwabe a...@rfc2549.org wrote: > > >

Re: [Openvpn-devel] [PATCH 9/9] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-18 Thread tincantech via Openvpn-devel
Schwabe a...@rfc2549.org wrote: > > > > > This is meant to give new users a quickstart for a useable OpenVPN > > > setup. Our own documentation is lacking in this regard and many often > > > tutorials that can be found online are often questionable in some > >

Re: [Openvpn-devel] [PATCH 9/9] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-18 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Monday, 17 May 2021 20:07, tincantech wrote: > Hi, > > ‐‐‐ Original Message ‐‐‐ > On Monday, 17 May 2021 18:16, tincantech via Openvpn-devel > openvpn-devel@lists.sourceforge.net

Re: [Openvpn-devel] Summary of the community meeting (19th May 2021)

2021-05-19 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Wednesday, 19 May 2021 14:31, Samuli Seppänen wrote: > Hi, > > Here's the summary of the IRC meeting. > > > > COMMUNITY MEETING >

Re: [Openvpn-devel] [PATCH 9/9] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-19 Thread tincantech via Openvpn-devel
M9CM5uuHEz3O29nyBPEjCUJS16bQ45lVtHzAbGcdzUEF9cn/gUsST 7v/3aMeFM76YSDXnI3DrA6PtlqXoWJ7K+NC3tzXb7suF3Zy0Gi8AWgJhKD8q tXvHtXdGD9ohsZTF4yio8PWCW4n0UFPUTImndr/R8D6TRO5umhBDkmQ9fWx0 3gPN6ln9FF2bE/gqG7Sj1s6uu5OLNqJ+aswet2B22DI/7CHlgQzFC38nuy5f CKFJ0eZnrQ8baDDOpOHlmLTarisRLcOP7rxT1qz5S6PWdGTP4+s/rg== =VNul -END PGP SIGNATURE- publickey - tincantech@protonmail.com - 0x09BC3D44.asc Description: application/pgp-keys publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig Description: PGP signature ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH 9/9] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-19 Thread tincantech via Openvpn-devel
- 0x09BC3D44.asc Description: application/pgp-keys publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig Description: PGP signature ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn

Re: [Openvpn-devel] [PATCH 9/9] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-19 Thread tincantech via Openvpn-devel
il.com - 0x09BC3D44.asc.sig Description: PGP signature _______ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH v2 2/2] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-20 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, again, I do not understand why openvpn choose to switch to .pem for this tutorial. PEM -> Private Email, which this is not. You have a certificate and a key and every other openvpn tutorial on openvpn and probably the entire planet uses .

Re: [Openvpn-devel] [PATCH v2 2/2] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-20 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Thursday, 20 May 2021 19:30, Arne Schwabe wrote: > Am 20.05.2021 um 18:56 schrieb tincantech: > > > Hi, > > again, I do not understand why openvpn choose to switch to .pem > >

Re: [Openvpn-devel] [PATCH v2 2/2] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-20 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Sent with ProtonMail Secure Email. ‐‐‐ Original Message ‐‐‐ On Thursday, 20 May 2021 22:05, Jan Just Keijser wrote: > Hi, > > On 20/05/21 21:49, tincantech via Openvpn-devel wrote: > > > > > Hi, > > >

Re: [Openvpn-devel] [PATCH v2 2/2] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-20 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Thursday, 20 May 2021 22:22, Jan Just Keijser wrote: > On 20/05/21 23:12, tincantech wrote: > > > [...] > > > > > > So, why switch to .pem when it has never been used before

Re: [Openvpn-devel] [PATCH v2 2/2] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-20 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, -‐‐ Original Message ‐‐‐ On Thursday, 20 May 2021 22:35, tincantech via Openvpn-devel wrote: > Hi, > > ‐‐‐ Original Message ‐‐‐ > On Thursday, 20 May 2021 22:22, Jan Just Keijser janj...@nikhef.nl wrote: > >

Re: [Openvpn-devel] [PATCH v2 2/2] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-20 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Friday, 21 May 2021 00:40, tincantech wrote: > I would like to hammer one final nail into this discussion. > > Openvpn option names and inline tags ALL use ificate .crt and > .key. > &g

[Openvpn-devel] --tls-verify runs twice for a single cert in Peer-fingerprint mode

2021-05-24 Thread tincantech via Openvpn-devel
---END PGP SIGNATURE- publickey - tincantech@protonmail.com - 0x09BC3D44.asc Description: application/pgp-keys publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig Description: PGP signature ___ Openvpn-devel mailing list Openvpn

Re: [Openvpn-devel] --tls-verify runs twice for a single cert in Peer-fingerprint mode

2021-05-24 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Monday, 24 May 2021 18:39, Selva Nair wrote: > Hi, > > On Mon, May 24, 2021 at 10:09 AM tincantech via Openvpn-devel > openvpn-devel@lists.sourceforge.net wrote: > > > -BEG

Re: [Openvpn-devel] --tls-verify runs twice for a single cert in Peer-fingerprint mode

2021-05-24 Thread tincantech via Openvpn-devel
> 2021-05-24 14:58:03 us=573751 10.10.201.226:60276 VERIFY SCRIPT OK: > > depth=0, CN=cli-arch-v21x > > 2021-05-24 14:58:03 us=573782 10.10.201.226:60276 VERIFY OK: depth=0, > > CN=cli-arch-v21x Openvpn/Openssl verify Then it repeats. I just wanted to clarify that

Re: [Openvpn-devel] --tls-verify runs twice for a single cert in Peer-fingerprint mode

2021-05-24 Thread tincantech via Openvpn-devel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, ‐‐‐ Original Message ‐‐‐ On Monday, 24 May 2021 21:43, Arne Schwabe wrote: > Am 24.05.2021 um 16:07 schrieb tincantech via Openvpn-devel: > > > Hi, > > Is this expected ? > > I might to check if it is even

Re: [Openvpn-devel] [PATCH 1/2] Improve documentation of AUTH_PENDING related directives

2021-06-02 Thread tincantech via Openvpn-devel
> Command examples: > > @@ -407,6 +407,7 @@ RECONNECTING -- A restart has occurred. > EXITING -- A graceful exit is in progress. > RESOLVE -- (Client only) DNS lookup > TCP_CONNECT -- (Client only) Connecting to TCP server > +AUTH_PENDING -- (Client only) Authentication pendi

  1   2   3   4   >