Hi,
I have noticed erratic (or at least not real reliable) throughput when using
OpenVPN in proto tcp mode (as I have to - UDP is not available to me, having to
go through a TCP Proxy server). On my home network I just ran some tests, using
iperf to characterize connection bandwidth
AM, "Karl O. Pinc" wrote:
>
On 03/03/2010 02:40:16 AM, Jason Haar wrote:
> > On 03/03/2010 04:52 PM, open...@rkmorris.us wrote:
> > >
> > > 1) Without OpenVPN - consistent performance, ~ 70 Mbps total
> > > throughput (on a 100 Mb LAN).
>
>
Hi,
I just tried this, and at least for my data throughput test it didn't seem to
help ... buy maybe I have this wrong.
I did this in the client configuration file ... is this right? I checked the
OpenVPN web site, and it may be that I need this on the server side instead.
P
iling list or not, but
let me try to attach a couple pictures showing this with and without OpenVPN
(to try to make this easier to see).
Thoughts?
Thanks!
On Fri, Mar 5, 2010 02:01 AM, Gert Doering wrote:
>
Hi,
>
> On Thu, Mar 04, 2010 at 05:21:43PM -0600, open...@rkmorris.
Hi,
That's a very good suggestion! I just tried this with OpenVPN-ALS (adito), and
while the average performance is slightly lower (java vs. compiled code?), the
throughput inconsistency is not there, rather it's only the case with OpenVPN!
Attached another throughput pl
Hi,
No, compression was on - so I also ran it again with it turned off (on both
ends). Here are the results ...
It seems that compression boosts performance from ~ 30 Mb/s to ~ 50 Mb/s
overall, but still very erratic results ... :-(.
Thoughts?
Thanks!
On Fri, Mar 5, 2010 05:20 P
Hi,
I am trying to write an application that monitors traffic over an OpenVPN link
- by using bytecount information from the management interface. However, after
I telnet in, and enter "bytecount 1" (for 1 second updates), I find that the
real-time bytecount updates are not re
Hi,
I'm running OpenVPN (client) on Windows - connecting to a Linux Server. I am
wondering if a value isn't reported if there is no traffic - that could be part
of this (though it would be better to report information anyways).
Make sense?
Thanks!
... Russell
On W
Hi,
All very good questions! Some thoughts, below.
Thanks for all your help!
... Russell
On Wed, Mar 17, 2010 05:01 PM, David Sommerseth
wrote:
>
On 17/03/10 22:40, open...@rkmorris.us wrote:
> > Hi,
> >
> >
> >
> > I'm running OpenVPN
Management Interface, but it's really a
telnet type response, not in a file.
Thanks,
... Russell
On Wed, Mar 17, 2010 05:38 PM, Davide Brini wrote:
>
On Wednesday 17 March 2010, open...@rkmorris.us wrote:
>
> > I am trying to write an application that monitors traffic ov
Hi,
I have been using two different config files to connect to my OpenVPN server -
as I am sometimes behind a proxy server, and sometimes not. So to fix this I
tried using auto-proxy ... but it didn't work (in the proxy case) ... :-(.
I am running the client on Windows - so it s
: Friday, April 02, 2010 5:31 PM
> To: openvpn-us...@lists.sourceforge.net; openvpn-devel@lists.sourceforge.net
> Subject: [Openvpn-users] Auto-Proxy
Hi,
I have been using two different config files to connect to my OpenVPN server -
as I am sometimes behind a proxy server, and someti
;>
> >>
> >>
> >> I have been using two different config files to connect to my OpenVPN
> >> server - as I am sometimes behind a proxy server, and sometimes not.
> >> So to fix this I tried using auto-proxy ... but it didn't work (in the
> &
(allowing OpenVPN to assign the IP address). When I did
this the management interface on the client reported the IP address that it was
assigned (both in real-time or manual state commands). However, now I have
changed the server configuration file to allow the local DHCP server (router)
to assign
: Saturday, April 24, 2010 5:08 AM
To: open...@rkmorris.us
Cc: openvpn-us...@lists.sourceforge.net; openvpn-devel@lists.sourceforge.net
Subject: Re: [Openvpn-devel] Status Message Missing IP Address
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 24/04/10 06:54, open...@rkmorris.us wrote:
>
>
e
> > management interface on the client ... why would it not know (or at
> > least report) it's IP address?
>
> Because it's not OpenVPN's IP address it's the client OS's
> IP address. OpenVPN is acting as a virtual wire. The
> client is obtaini
to be the way to do this (see
http://msdn.microsoft.com/en-us/library/aa384097(v=VS.85).aspx for an example).
I hope this helps!
... Russell
On Wed, Apr 28, 2010 09:01 AM, Samuli Seppänen wrote:
>
Hi all,
>
> A while back a user noticed that OpenVPN still uses
Hi,
I can't explain the information below, but hopefully someone a whole bunch
smarter than me understands it - as it seems to help with TCP throughput in
OpenVPN (the holy grail??? ... :-)).
I have added some plots and details to an open OpenVPN ticket, located here ...
hopefully someone a whole
> >> bunch smarter than me understands it - as it seems to help with
> >> TCP throughput in OpenVPN (the holy grail??? ... :-)).
> >>
> >
> > Did you change TCP window size on the client, or on the OpenVPN process?
> >
> &g
dear all,a few days ago I deployed an ovpn solution in a medium
sized company. One of the two ends of the vpn network is passing through
a proxy with NTLM authentication. ovpn has problems to recognize the
authentication because immediately after sending the message type 1, the
proxy sends no r
>
> ^@^A^@^@^@
>
> After this they differ noticeably. I'd guess they are just sending
> different NTLM flags:
>
>
>
> Can somebody more fluent in NTLM protocol decipher these two messages?
>
> --
> Samuli Sepp?nen
> Community Manager
>
Da: "Jan Just Keijser" janj...@nikhef.nl
A: "openvpn" open...@lucullo.it
Cc: openvpn-devel@lists.sourceforge.net
Data: Mon, 18 Oct 2010 12:58:35 +0200
Oggetto: Re: [Openvpn-devel] openvpn, NTLM and McAfee Web Gateway
> openvpn wrote:
> > dear all,
> >
&g
From: Jens Neuhalfen
Test results will be printed in a tabular format, e.g.
| ID | TEST| RESULT |
| -- | --- | |
| 1 | testing tun/udp/ipv4| [SUCCESS]|
| 2 | testing t
internal error in run_ping_tests arg 1: '$proto'" >&2
- exit 1 ;;
+4) cmd=fping ;;
+6) cmd=fping6 ;;
+*) echo "internal error in run_ping_tests arg 1: '$proto'" >&2
+ exit 1 ;;
esac
case $want in
-
review these patches have also been provided via GitHub pull
request:
https://github.com/OpenVPN/openvpn/pull/49
Due to moving code around and intention changes this patch looks rather large:
1 file changed, 267 insertions(+), 180 deletions(-).
This is a series of two patches that add unit testing support to openvpn.
See https://github.com/OpenVPN/openvpn/pull/44 for a discussion.
Thanks to syzzer for his nitty-gritty review!
Jens
From: Jens Neuhalfen
cmocka [1,2] is a testing framework for C. Adding unit test capabilities to the
openvpn repository will greatly ease the task of writing correct code.
cmocka source code is added as git submodule in ./vendor. A submodule approach
has been chosen over a classical library
int
-string_array_len (const char *array[])
-{
- int i = 0;
- if (array)
-{
- while (array[i])
- ++i;
-}
- return i;
-}
/*
* Socket read/write functions.
diff --git a/src/plugins/auth-pam/utils.c b/src/plugins/auth-pam/utils.c
new file mode 100644
index 000..4f2bec1
--- /dev/n
hi,
i'm building openvpn-2.1_rc4 on osx 10.4.10.
currently,
./configure \
--prefix=/usr/local/openvpn \
--enable-pthread \
--disable-password-save \
--with-ssl-headers=/usr/local/ssl/include/openssl/ \
--with-ssl-lib=/usr/local/ssl/lib/ \
--with-lzo-headers=/usr/local/include/lzo \
--wit
Hello.
I'm triying to execute a Windows CE 5.0 porting of openvpn client
application. I've been successful on compiling it but when i try to execute
i receive the message: "openvpn is not a valid WindowsCE application".
I am compiling to ARM-Thumb architecture. I suspect the
nly need to stablish a connection to a VPN server without need of a GUI,
all configuration must be transparent to the user. Therefore I think we only
need the openvpn executable and TAP_CE driver. If i'm not wrong, the
ovpncmgr module is to provide a GUI for the openVPN client. Is that correct?
>
> Assuming your error message really means 'missing dlls' instead of 'invalid
> binary' then you should be better off.
>
> Again, if you want to send me your compiled binary, I can inspect it more
> closely if that is useful.
>
> -Dave
>
&
Hello.
I'm triying to execute a Windows CE port of OpenVPN in a custom hardware.
First of all, let me say that I cannot use the connection manager due to the
plattform i am using.
I've been succesfull on open the socket and retrieve initial information
from the OpenVPN server. I also
Hey guys...
Was wondering if you were familiar with this:
http://news.ycombinator.com/item?id=2029640
And, well... it sounded really familiar:
http://www.mail-archive.com/cryptography@metzdowd.com/msg07521.html
--
Good code works on most inputs; correct code works on all inputs.
My emails do n
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2d-oct___
Sent from ProtonMail Mobile
On Thu, Jun 15, 2017 at 8:00 PM,
wrote: Send Openvpn-devel mailing list submissions to
openvpn-devel@lists.sourceforge.net To subscribe or unsubscribe via the World
Wide Web, visit https://lists.sourceforge.net/lists/listinfo/openvpn-devel or,
via email, send a
Sent from my iPhone
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
Hi,
I have developed a bash script to make openvpn work with obfs4. It's hosted on
github: https://github.com/HRomie/obfs4proxy-openvpn
It might be worth updating the obfuscation article article and include it:
https://community.openvpn.net/openvpn/wiki/TrafficObfuscation
Re
gt; default cipher for the VPN tunnel when starting OpenVPN via systemd
> > and the openvpn-server@.service unit file.
> > To avoid breaking existing running configurations defaulting to BF-CBC,
> > the Negotiable Crypto Parameters (NCP) list contains the BF-CBC in
> > addi
Hi,
Regarding radius plugin:
https://community.openvpn.net/openvpn/wiki/PluginOverview
The source is here: https://www.nongnu.org/radiusplugin/
Edited Wiki page.
W.k.r
Pippin
Sent with ProtonMail Secure Email.
___
Openvpn-devel mailing list
Hi,
Regarding,
https://community.openvpn.net/openvpn/wiki/DeprecatedOptions#Option:--route-nopull
"Openvpn devs would like to know if you use this option".
Many pfSense users use this option to policy route.
P.S.
Made a feature request at pfSense Redmine to add --pull-filter six
Hi,
> Am 23.07.2020 um 20:14 schrieb André via Openvpn-devel:
>
> > Hi,
> > Regarding,
> > https://community.openvpn.net/openvpn/wiki/DeprecatedOptions#Option:--route-nopull
> > "Openvpn devs would like to know if you use this option".
> > Many
years (!!) waiting for someone to go
> > and implement it... 6 years it sat on your lap, 4 years on mine (or so),
> > so it looks like this is not going to happen any time soon.
>
> It also feels like a feature from a different area when pushed options
> were few and not as essent
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Forwarding to openvpn-devel, as requested.
CC'ing -users FTR.
--- Original Message ---
On Tuesday, June 28th, 2022 at 02:59, Selva Nair wrote:
> Hi,
>
>
> >
> > the \\config-auto folder is only created i
/bGCj3DJCioYy8r1A==
=AASZ
-END PGP SIGNATURE-
publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
___
Openvpn-devel mailing list
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi Magnus,
can you report this as an issue on github, please ?
https://github.com/OpenVPN/easy-rsa/issues
My first guess would be the version of openssl 3.0.1 is at fault.
Thanks,
Richard
Sent with Proton Mail secure email.
--- Original
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
Plus one more typo.
Sent with Proton Mail secure email.
--- Original Message ---
On Thursday, October 20th, 2022 at 11:05, Arne Schwabe wrote:
> diff --git a/src/openvpn/common.h b/src/openvpn/common.h
> index b94680885..dce
eld wrote:
> [...snip...]
>
> > On Red Hat derivatives we recommend using the Fedora Copr repository.
> >
> > https://copr.fedorainfracloud.org/coprs/dsommers/openvpn-release/
>
>
>
> A slight update here. The repo above will be preserved for OpenVPN 2.5
&
C3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
uot; or needs to be sent
> > "comp-lzo no".
>
> Hi,
>
> What I'm still wondering is why is compression so dangerous with OpenVPN
> but not so with things like SSH or SCP?
>
Simon, I believe the detail which you have over-looked is this:
A lot of people use openvp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Saturday, 3 April 2021 01:43, tincantech via Openvpn-devel
wrote:
>
> But i believe you need to have access to both the compressed VPN data
> and the uncompres
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Saturday, 3 April 2021 19:46, Arne Schwabe wrote:
> Using OpenVPN without P2MP support (pull, TLS) is unrealistic and
> building a binary without it is not someth
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Before this goes any further, I doubt very much that Openvpn intends to "Remove
P2MP mode".
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Thursday, 1 April 2021 18:27, Arne Schwabe wrote:
> Am 01.0
:
> https://github.com/OpenVPN/openvpn/blob/master/doc/man-sections/cipher-negotiation.rst
>
> That should also answer your question.
>
sorry for the noise but I created a quick ref. guide for cipher negotiation:
https://community.openvpn.net/openvpn/wiki/CipherNegotiation
It may be of
SIGNATURE-
publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
_______
Openvpn-devel mailing list
Openvpn-devel@lists.source
signature
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Friday, 23 April 2021 07:13, Gert Doering wrote:
> Hi,
>
> On Thu, Apr 22, 2021 at 09:02:30PM +, tincantech via Openvpn-devel wrote:
>
> > I am requesting that $daemon_pid be added to
021 08:12, Antonio Quartulli a...@unstable.cc wrote:
> >
> > > Hi,
> >
> > > On 22/04/2021 23:02, tincantech via Openvpn-devel wrote:
> >
> > > > hi,
> > > > I am requesting that $daemon_pid be added to the --tls-crypt-v2-verify
> > &
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Friday, 23 April 2021 08:12, Antonio Quartulli wrote:
> Hi,
>
> On 22/04/2021 23:02, tincantech via Openvpn-devel wrote:
>
> > hi,
> > I am requesting that $daemon_pid be added to t
pushed client variable IV_HWADDR can be
matched against the fixed hardware address encrypted in the TLS Crypt V2
key metadata.
Security:
There are no known security concerns with regard to including the openvpn
process ID (daemon_pid) in the --tls-crypt-v2-verify environment.
Complexity:
Ongoing
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
no complaints yet ?
Sent with ProtonMail Secure Email.
ProtonMail, as crap as googlemail.
‐‐‐ Original Message ‐‐‐
On Friday, 23 April 2021 22:16, tincantech via Openvpn-devel
wrote:
> Hi,
>
> I am requesting that daem
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Openvpn process ID (daemon_pid) provides the most secure way for
scripts to verify which process they were called by.
This patch adds daemon_poid to --tls-crypt-v2-verify environment.
Tested on Linux and Windows.
diff --git a/src/openvpn
tincantech wrote:
> Openvpn process ID (daemon_pid) provides the most secure way for
> scripts to verify which process they were called by.
>
> This patch adds daemon_poid to --tls-crypt-v2-verify environment.
>
> Tested on Linux and Windows.
>
> diff --git a/src/openvpn/tls
‐‐‐ Original Message ‐‐‐
On Wednesday, 28 April 2021 18:48, tincantech via Openvpn-devel
wrote:
> Yeah, I forgot to apply and commit -- sorry.
>
> I guess I'll send again if this is an acceptable patch and my MTA didn't
> screw it up ?
> Please let me know .. th
would be willing to accept my proposed patch and
> then I will persist to find a way.
>
> If you will not accept the addition then please let me know.
>
> Thanks
> R
>
> ‐‐‐ Original Message ‐‐‐
> On Wednesday, 28 April 2021 18:48, tincantech via Openvpn-devel
&
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Under Windows, programmatically retrieving the parent process ID of
the openvpn instance which called a script is practically impossible.
The only sensible way, currently available, is to write a PID file.
This patch adds a single integer variable
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
‐‐‐ Original Message ‐‐‐
On Thursday, 29 April 2021 18:15, Richard T Bonhomme
wrote:
> From: string vest stringves...@gmail.com
>
> Under Windows, programmatically retrieving the parent process ID of
> the openvpn instance wh
rieving the parent process ID of
> > the openvpn instance which called a script is practically impossible.
> > The only sensible way, currently available, is to write a PID file.
> > This patch adds a single integer variable, named daemon_pid, to the
> > script environment
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Tuesday, 4 May 2021 13:43, tincantech via Openvpn-devel
wrote:
> Hi,
>
> ‐‐‐ Original Message ‐‐‐
> On Tuesday, 4 May 2021 11:50, Arne Schwabe a...@rfc2549.org wrote:
>
> >
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Tuesday, 4 May 2021 20:41, Selva Nair wrote:
> On Tue, May 4, 2021 at 3:04 PM tincantech via Openvpn-devel
> openvpn-devel@lists.sourceforge.net wrote:
>
> > Due to the inordinate resist
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Tuesday, 4 May 2021 21:36, tincantech via Openvpn-devel
wrote:
> Hi,
>
> ‐‐‐ Original Message ‐‐‐
> On Tuesday, 4 May 2021 20:41, Selva Nair selva.n.
nderstand the secure in
> > > this context. What are you protecting yourself against? You are not
> > > protecting your script being called from a malicious program as that
> > > could lookup the PID of openvpn and just set the daemon_id variable.
> >
> > The
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Monday, 10 May 2021 18:29, Gert Doering wrote:
> Hi,
>
> On Wed, May 05, 2021 at 10:00:37PM +, tincantech via Openvpn-devel wrote:
>
> > thanks for the feedback, I can resubmit with
x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
___________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Monday, 10 May 2021 23:10, Selva Nair wrote:
> On Mon, May 10, 2021 at 4:24 PM tincantech via Openvpn-devel
> openvpn-devel@lists.sourceforge.net wrote:
>
> > -BEGIN PGP SIGNED MESSAG
3SW72J5RjdlLFPfKITfrPgIuzFhFc6rvmyplU
Sz41k1Bd1QprZwIGE7JiZDLajOmYkmGUaqXQ6AoLWmTZJACNFDKyQZYXs7lY
wwoROF6u14vxLh2TeQ1btfuxnGUs2HhpqZX80TrxAm80EQyBrnJ5bA==
=17mP
-END PGP SIGNATURE-
publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Des
opefully, protonmail will have a solution, or maybe someone here knows
what I can do/try ?
Finally, I wrote a simple script which generates self-signed certs, keys
and inlines the fingerprint for use with Openvpn.
https://github.com/TinCanTech/easy-pfp
I hope it is of some use in t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
I used sed to create my own reply ..
comments inline.
‐‐‐ Original Message ‐‐‐
On Wednesday, 12 May 2021 14:15, Arne Schwabe wrote:
> This is meant to give new users a quickstart for a useable OpenVPN
> setup. O
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
missed one..
‐‐‐ Original Message ‐‐‐
On Thursday, 13 May 2021 22:48, tincantech via Openvpn-devel
wrote:
> Hi,
>
> I used sed to create my own reply ..
>
> comments inline.
>
> ‐‐‐ Original Message ‐
- 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Monday, 17 May 2021 16:31, Gert Doering wrote:
> Hi,
>
> On Mon, May 17, 2021 at 02:57:32PM +, tincantech via Openvpn-devel wrote:
>
> > I think it would useful to allow comment inside
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Wednesday, 12 May 2021 14:15, Arne Schwabe wrote:
> This is meant to give new users a quickstart for a useable OpenVPN
> setup. Our own documentation is lacking in this regard and many often
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Monday, 17 May 2021 18:16, tincantech via Openvpn-devel
wrote:
> Hi,
>
> ‐‐‐ Original Message ‐‐‐
> On Wednesday, 12 May 2021 14:15, Arne Schwabe a...@rfc2549.org wrote:
>
> >
Schwabe a...@rfc2549.org wrote:
> >
> > > This is meant to give new users a quickstart for a useable OpenVPN
> > > setup. Our own documentation is lacking in this regard and many often
> > > tutorials that can be found online are often questionable in some
> >
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Monday, 17 May 2021 20:07, tincantech wrote:
> Hi,
>
> ‐‐‐ Original Message ‐‐‐
> On Monday, 17 May 2021 18:16, tincantech via Openvpn-devel
> openvpn-devel@lists.sourceforge.net
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Wednesday, 19 May 2021 14:31, Samuli Seppänen wrote:
> Hi,
>
> Here's the summary of the IRC meeting.
>
>
>
> COMMUNITY MEETING
>
M9CM5uuHEz3O29nyBPEjCUJS16bQ45lVtHzAbGcdzUEF9cn/gUsST
7v/3aMeFM76YSDXnI3DrA6PtlqXoWJ7K+NC3tzXb7suF3Zy0Gi8AWgJhKD8q
tXvHtXdGD9ohsZTF4yio8PWCW4n0UFPUTImndr/R8D6TRO5umhBDkmQ9fWx0
3gPN6ln9FF2bE/gqG7Sj1s6uu5OLNqJ+aswet2B22DI/7CHlgQzFC38nuy5f
CKFJ0eZnrQ8baDDOpOHlmLTarisRLcOP7rxT1qz5S6PWdGTP4+s/rg==
=VNul
-END PGP SIGNATURE-
publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
- 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn
il.com - 0x09BC3D44.asc.sig
Description: PGP signature
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
again, I do not understand why openvpn choose to switch to .pem
for this tutorial. PEM -> Private Email, which this is not.
You have a certificate and a key and every other openvpn tutorial
on openvpn and probably the entire planet uses .
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Thursday, 20 May 2021 19:30, Arne Schwabe wrote:
> Am 20.05.2021 um 18:56 schrieb tincantech:
>
> > Hi,
> > again, I do not understand why openvpn choose to switch to .pem
> >
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Thursday, 20 May 2021 22:05, Jan Just Keijser wrote:
> Hi,
>
> On 20/05/21 21:49, tincantech via Openvpn-devel wrote:
>
> > > > Hi,
> > >
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Thursday, 20 May 2021 22:22, Jan Just Keijser wrote:
> On 20/05/21 23:12, tincantech wrote:
>
> > [...]
> >
> > > > So, why switch to .pem when it has never been used before
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
-‐‐ Original Message ‐‐‐
On Thursday, 20 May 2021 22:35, tincantech via Openvpn-devel
wrote:
> Hi,
>
> ‐‐‐ Original Message ‐‐‐
> On Thursday, 20 May 2021 22:22, Jan Just Keijser janj...@nikhef.nl wrote:
>
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Friday, 21 May 2021 00:40, tincantech wrote:
> I would like to hammer one final nail into this discussion.
>
> Openvpn option names and inline tags ALL use ificate .crt and
> .key.
>
&g
---END PGP SIGNATURE-
publickey - tincantech@protonmail.com - 0x09BC3D44.asc
Description: application/pgp-keys
publickey - tincantech@protonmail.com - 0x09BC3D44.asc.sig
Description: PGP signature
___
Openvpn-devel mailing list
Openvpn
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Monday, 24 May 2021 18:39, Selva Nair wrote:
> Hi,
>
> On Mon, May 24, 2021 at 10:09 AM tincantech via Openvpn-devel
> openvpn-devel@lists.sourceforge.net wrote:
>
> > -BEG
> 2021-05-24 14:58:03 us=573751 10.10.201.226:60276 VERIFY SCRIPT OK:
> > depth=0, CN=cli-arch-v21x
> > 2021-05-24 14:58:03 us=573782 10.10.201.226:60276 VERIFY OK: depth=0,
> > CN=cli-arch-v21x
Openvpn/Openssl verify
Then it repeats.
I just wanted to clarify that
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
‐‐‐ Original Message ‐‐‐
On Monday, 24 May 2021 21:43, Arne Schwabe wrote:
> Am 24.05.2021 um 16:07 schrieb tincantech via Openvpn-devel:
>
> > Hi,
> > Is this expected ?
>
> I might to check if it is even
> Command examples:
>
> @@ -407,6 +407,7 @@ RECONNECTING -- A restart has occurred.
> EXITING -- A graceful exit is in progress.
> RESOLVE -- (Client only) DNS lookup
> TCP_CONNECT -- (Client only) Connecting to TCP server
> +AUTH_PENDING -- (Client only) Authentication pendi
1 - 100 of 394 matches
Mail list logo