return;
+}
+
if (dco->dco_message_type != OVPN_CMD_PACKET)
{
msg(D_DCO_DEBUG, "%s: received message of type %u - ignoring",
__func__,
--
2.36.0
___________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://
const struct context *src);
diff --git a/src/openvpn/multi.c b/src/openvpn/multi.c
index 958712f1..47e1c6cc 100644
--- a/src/openvpn/multi.c
+++ b/src/openvpn/multi.c
@@ -2452,6 +2452,8 @@ multi_client_connect_late_setup(struct multi_context *m,
mi->context.c2.tls_multi->multi_state = CAS_FAILED;
}
+finish_options(&mi->context);
+
/* send push reply if ready */
if (mi->context.c2.push_request_received)
{
--
2.36.0
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
strncpynt(dynamic_name, dev, sizeof(dynamic_name));
}
else
{
--
2.36.0
___________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
Hi,
Here's the latest revision of the FreeBSD DCO patch, as well as three
DCO-related fixes.
Best regards,
Kristof
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
rc/openvpn/tun.c
+++ b/src/openvpn/tun.c
@@ -1797,7 +1797,7 @@ open_tun_generic(const char *dev, const char *dev_type,
const char *dev_node,
"/dev/%s%d", dev, i);
openvpn_snprintf(dynamic_name, sizeof(dynamic_name),
"%s%d", dev, i);
-#ifdef TARGET_LINUX
+#if defined(TARGET_LINUX) || defined(TARGET_FREEBSD)
if (!tt->options.disable_dco)
{
if (open_tun_dco(tt, ctx, dynamic_name) == 0)
@@ -1832,7 +1832,7 @@ open_tun_generic(const char *dev, const char *dev_type,
const char *dev_node,
}
}
-#ifdef TARGET_LINUX
+#if defined(TARGET_LINUX) || defined(TARGET_FREEBSD)
if (!tt->options.disable_dco)
{
if (!dynamic_opened)
@@ -2012,7 +2012,7 @@ open_tun(const char *dev, const char *dev_type, const
char *dev_node, struct tun
{
open_null(tt);
}
-#if defined(TARGET_LINUX)
+#if defined(TARGET_LINUX) || defined(TARGET_FREEBSD)
else if (!tt->options.disable_dco)
{
open_tun_generic(dev, dev_type, NULL, true, tt, ctx);
@@ -2268,7 +2268,7 @@ close_tun(struct tuntap *tt, openvpn_net_ctx_t *ctx)
net_ctx_reset(ctx);
}
-#ifdef TARGET_LINUX
+#if defined(TARGET_LINUX) || defined(TARGET_FREEBSD)
if (!tt->options.disable_dco)
{
close_tun_dco(tt, ctx);
diff --git a/src/openvpn/tun.h b/src/openvpn/tun.h
index 39a32106..652abe07 100644
--- a/src/openvpn/tun.h
+++ b/src/openvpn/tun.h
@@ -145,6 +145,12 @@ struct tuntap_options {
bool disable_dco;
};
+#elif defined(TARGET_FREEBSD)
+
+struct tuntap_options {
+bool disable_dco;
+};
+
#else /* if defined(_WIN32) || defined(TARGET_ANDROID) */
struct tuntap_options {
--
2.36.0
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
ble-dco to connect"
@@ -2407,7 +2407,7 @@ finish_options(struct context *c)
return false;
}
- if (c->options.ping_send_timeout || c->c2.frame.mss_fix)
+if (dco_enabled(&c->options) && (c->options.ping_send_timeout ||
c->c2.frame.mss_fix))
{
int ret = dco_set_peer(&c->c1.tuntap->dco,
c->c2.tls_multi->peer_id,
I’ll post an updated series in due course, but wanted to point this
issue out already.
Kristof___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
nst uint32_t hv = hash_value(hash, &mi->real);
struct hash_bucket *bucket = hash_bucket(hash, hv);
+multi_assign_peer_id(m, mi);
+
he = hash_lookup_fast(hash, bucket, &mi->real, hv);
if (he)
--
2.36.1
________
rc/openvpn/tun.c
+++ b/src/openvpn/tun.c
@@ -1797,7 +1797,7 @@ open_tun_generic(const char *dev, const char *dev_type,
const char *dev_node,
"/dev/%s%d", dev, i);
openvpn_snprintf(dynamic_name, sizeof(dynamic_name),
"%s%d", dev, i);
-#ifdef TARGET_LINUX
+#if defined(TARGET_LINUX) || defined(TARGET_FREEBSD)
if (!tt->options.disable_dco)
{
if (open_tun_dco(tt, ctx, dynamic_name) == 0)
@@ -1832,7 +1832,7 @@ open_tun_generic(const char *dev, const char *dev_type,
const char *dev_node,
}
}
-#ifdef TARGET_LINUX
+#if defined(TARGET_LINUX) || defined(TARGET_FREEBSD)
if (!tt->options.disable_dco)
{
if (!dynamic_opened)
@@ -2005,7 +2005,7 @@ open_tun(const char *dev, const char *dev_type, const
char *dev_node, struct tun
{
open_null(tt);
}
-#if defined(TARGET_LINUX)
+#if defined(TARGET_LINUX) || defined(TARGET_FREEBSD)
else if (!tt->options.disable_dco)
{
open_tun_generic(dev, dev_type, NULL, true, tt, ctx);
@@ -2261,7 +2261,7 @@ close_tun(struct tuntap *tt, openvpn_net_ctx_t *ctx)
net_ctx_reset(ctx);
}
-#ifdef TARGET_LINUX
+#if defined(TARGET_LINUX) || defined(TARGET_FREEBSD)
if (!tt->options.disable_dco)
{
close_tun_dco(tt, ctx);
diff --git a/src/openvpn/tun.h b/src/openvpn/tun.h
index 39a32106..652abe07 100644
--- a/src/openvpn/tun.h
+++ b/src/openvpn/tun.h
@@ -145,6 +145,12 @@ struct tuntap_options {
bool disable_dco;
};
+#elif defined(TARGET_FREEBSD)
+
+struct tuntap_options {
+bool disable_dco;
+};
+
#else /* if defined(_WIN32) || defined(TARGET_ANDROID) */
struct tuntap_options {
--
2.36.1
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
Hi,
Here's an updated version for the FreeBSD DCO support, as well as a few
generic bugfixes.
Best regards,
Kristof
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
t *dest,
const struct context *src);
diff --git a/src/openvpn/multi.c b/src/openvpn/multi.c
index 958712f1..47e1c6cc 100644
--- a/src/openvpn/multi.c
+++ b/src/openvpn/multi.c
@@ -2452,6 +2452,8 @@ multi_client_connect_late_setup(struct multi_context *m,
mi->context.c2.tls_multi->multi_state = CAS_FAILED;
}
+finish_options(&mi->context);
+
/* send push reply if ready */
if (mi->context.c2.push_request_received)
{
--
2.36.1
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
ot set DCO peer: %s", strerror(-ret));
+return false;
+}
+}
+
return true;
}
--
2.36.1
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
On 17 May 2022, at 15:28, Antonio Quartulli wrote:
> On 16/05/2022 20:56, Kristof Provost via Openvpn-devel wrote:
>> From: Kristof Provost
>>
>> We must create the peer before we can dco_set_peer or dco_new_key.
>> On the other hand, we must first process options, beca
On 17 May 2022, at 15:25, Antonio Quartulli wrote:
> Hi,
>
> On 16/05/2022 20:56, Kristof Provost via Openvpn-devel wrote:
>> From: Kristof Provost
>>
>> Signed-off-by: Kristof Provost
>> ---
>> src/openvpn/init.c | 15 +++
>> 1 file
Nair
> Message-Id: <20240606103441.26598-1-g...@greenie.muc.de>
> URL:
>https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg28726.html
> Signed-off-by: Gert Doering
Thanks for pushing this to master.
I wonder if it would be
vice method calls
netcfg: Return when no DNS resolver is configured in
method_add_dns_search()
Frank Lichtenheld (1):
build-selinux-policy: make sure to use bash
Razvan Cojocaru (4):
GDBus++: Migrate openvpn3-service-configmgr
build: Use version_compare(), not lexicographical comparisons
Use get_option('sbindir') instead of hardcoded 'sbin'
log/syslog: Don't assign NULL to const std::string& parameter
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
a elliptic curve (`secp384`), which allows
+Note: This example use a elliptic curve (`ed25519`), which allows
``--dh`` to be set to ``none``.
Example 3: A tunnel with full PKI and TLS-based security
--
2.45.2
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
d of overwriting
netcfg: Check stub-resolv.conf before giving up on systemd-resolved
common: give SingleCommand a virtual destructor
addons/devposture: Add core_ver and extra_ver to client_info
------------
-
ly.
I've seen your patch, and it makes total sense. It's in my pipe to get
merged as soon as I have cleaned up a bunch of other changes as well.
Again, sorry for the slow response.
--
kind regards,
David Sommerseth
OpenVPN Inc
_______
Op
!
--
kind regards,
David Sommerseth
OpenVPN Inc
___________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
ou're welcome to join at #openvpn-meeting on Libera IRC
network every Wednesday at 14:00 Central European Time.
Kind regards,
Johan Draaisma
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listin
ere.
Your changes makes sense, so I don't expect any issues here. Going to
test it a bit first, though.
--
kind regards,
David Sommerseth
OpenVPN Inc
___________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourcefo
nesday at 14:00 Central European Time.
Kind regards,
Johan Draaisma
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
return ret;
@@ -750,6 +763,7 @@ retry:
if (!nvlist_exists_nvlist_array(nvl, "peers"))
{
/* no peers */
+nvlist_destroy(nvl);
return 0;
}
@@ -762,6 +776,7 @@ retry:
dco_update_peer_stat(m, peerid, nvlist_get_nvlist(peer, "bytes&qu
,
Johan Draaisma
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
return ret;
@@ -750,6 +763,7 @@ retry:
if (!nvlist_exists_nvlist_array(nvl, "peers"))
{
/* no peers */
+nvlist_destroy(nvl);
return 0;
}
@@ -762,6 +776,7 @@ retry:
dco_update_peer_stat(m, peerid, nvlist_get_nvlist(peer, "bytes&qu
27;re welcome to join at #openvpn-meeting on Libera IRC
network every Wednesday at 14:00 Central European Time.
Kind regards,
Johan Draaisma
___________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
On 13/11/2024 14:59, נתי שטרן wrote:
-- Forwarded message -
מאת: *נתי שטרן* mailto:nsh...@gmail.com>>
Date: יום ד׳, 13 בנוב׳ 2024, 15:52
Subject: Re: [Openvpn-devel] Inquiry About Potential Vulnerabilities in
OpenVPN for Remote Code Execution (RCE)
To: Gert Doering ma
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
C
network every Wednesday at 14:00 Central European Time.
Kind regards,
Johan Draaisma
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
ves this challenge better.
That's my 2cents.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
Robert A.
Heinlein, The Moon
> is a Harsh Mistress
>
> Gert Doering - Munich, Germany
g...@greenie.muc.de <mailto:g...@greenie.muc.de>
> <mailto:g...@greenie.muc.de
//netanel.ml>
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
<mailto:Openvpn-devel@lists.sourceforge.net>
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
ing all people took for
> granted, was
> > conviction that if you
> > feed honest figures into a computer,
honest
> figures come
> > out. Neve
ards,
David Sommerseth
OpenVPN Inc
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
ide -> Override
sessionmgr: Remove unused Session::connection_started bool
netcfg/resolvconf-file: Don't add nameservers that already exist
----------------
OpenPGP_signature
Description: OpenPGP digital signature
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
seth
OpenVPN Inc
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
cb6c73234>
--
kind regards,
David Sommerseth
OpenVPN Inc
___________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
make -j3
+ - name: configure checks
+run: echo 'RUN_SUDO="sudo -E"' >tests/t_server_null.rc
+ - name: make check
+ run: make -j3 check VERBOSE=1
\ No newline at end of file
--
2.39.5 (Apple Git-154)
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
on was added in commit
f3bc7fdc7bf47193a9f8618a7d22a6ceec2df6f7) since 2011, released with
systemd v25. I think we can assume anything using a modern openvpn is
also using something newer than this as well.
--Ben
___
Openvpn-devel mailing list
Openvpn
On 31/12/2024 21:46, Ben Boeckel via Openvpn-devel wrote:
Without this, the password request will expire after 90 seconds leaving
no way to provide the password without OpenVPN asking for it again.
Given that interactive use will wait for input without a timeout, it
makes sense to have non
SSL_VERSION_NUMBER < 0x101fL || defined(OPENSSL_IS_AWSLC)
STACK_OF(SSL_CIPHER) *sk = SSL_get_ciphers(ssl);
#else
STACK_OF(SSL_CIPHER) *sk = SSL_get1_supported_ciphers(ssl);
--
2.39.5 (Apple Git-154)
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
SUDO="sudo -E"' >tests/t_server_null.rc
+ - name: make check
+run: LD_LIBRARY_PATH="${{ env.AWS_LC_INSTALL }}/lib" make -j3 check
VERBOSE=1
\ No newline at end of file
--
2.39.5 (Apple Git-154)
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
sl);
#else
STACK_OF(SSL_CIPHER) *sk = SSL_get1_supported_ciphers(ssl);
--
2.39.5 (Apple Git-154)
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
run: make -j3
+ - name: configure checks
+run: echo 'RUN_SUDO="sudo -E"' >tests/t_server_null.rc
+ - name: make check
+ run: make -j3 check VERBOSE=1
\ No newline at end of file
--
2.39.5 (Apple Git-154)
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
On 31/12/2024 21:46, Ben Boeckel via Openvpn-devel wrote:
Without this, the password request will expire after 90 seconds leaving
no way to provide the password without OpenVPN asking for it again.
Given that interactive use will wait for input without a timeout, it
makes sense to have non
ther it's a bugfix or a feature).
Looking forward to it :) .
--Ben
_______________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
(std_out = openvpn_popen(&argv, NULL)) < 0)
--
2.47.1
___________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
rds,
David Sommerseth
OpenVPN Inc
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
gering the issue is even more
> perplexing.
Well. If it was expected, we wouldn't be here investigating ;)
Can I assist you with some test or extra log line?
Cheers,
Walter
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
, I betting you're right on these points.
I don't know where the "tls state session ID" is and if it's there. I'm
dealing with OpenVPN 2.5 clients (no older ones, I hope).
If you can point me in the right direction, I'd be grateful. This is my
first venture into o
second connection.
I haven't checked if it's something I can fix yet. But At least we have a
culprit now.
Cheers,
Walter Doekes
OSSO B.V.
_______
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
sh_set))
{
msg(D_MULTI_LOW, "Disallow float to an address taken by another
client %s",
multi_instance_string(ex_mi, false, &gc));
--
2.34.1
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
rsion tags to contain dots and minor version digits
configmgr/proxy: Ignore minor version number in feature check
OpenPGP_signature.asc
Description: OpenPGP digital signature
_________
ection that blocks you. And there is no explaination why
this connection exist in the first place. You are fixing the sympton of
this ghost connection that blocks your float but from my perspective we
have not really established why it exists in the first place.
Arne
___________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
> The thing is that I do not really understand your scenario and how it
> exactly breaks for you to the extend that I cannot reproduce the issue.
I thought I explained things sufficiently in:
https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg31502.html
Apparently not.
+else if (!cert_hash_compare(m1->locked_cert_hash_set,
> m2->locked_cert_hash_set))
> {
> msg(D_MULTI_LOW, "Disallow float to an address taken by
> another client %s",
> multi_instance_string(ex_mi, false, &gc));
> --
> 2.34.1
>
>
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
t;bar" as the password and 8675309
+For example, if user "foo" entered "bar" as the password and 8675309
as the PIN, the following management interface commands should be
issued:
username "Auth" foo
- password "Auth" "SCRV1:Zm9v:ODY3NTMwOQ=="
-
-Client-side support for challenge/response protocol:
+ password "Auth" "SCRV1:YmFy:ODY3NTMwOQ=="
-Currently, the Access Server client and standalone OpenVPN
-client support both static and dynamic challenge/response
-protocols. However, any OpenVPN client UI that drives OpenVPN
-via the management interface needs to add explicit support
-for the challenge/response protocol.
+ ("YmFy" is the base 64 encoding of "bar" and "ODY3NTMwOQ==" is the
+ base 64 encoding of "8675309".)
--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
command:
> >
> > - the management interface client can issue this command:
>
> Same here -- clarify that a response must be provided?
Same here : ) -- other examples use "should", which I like better.
I'll send a v2 incorporating your other comments soon.
h as double quotes or backslashes must be
+escaped. See the "Command Parsing" section above for more info.)
+
+For example, if user "foo" entered "bar" as the password and 8675309
as the PIN, the following management interface commands should be
issued:
username "Auth" foo
- password "Auth" "SCRV1:Zm9v:ODY3NTMwOQ=="
-
-Client-side support for challenge/response protocol:
+ password "Auth" "SCRV1:YmFy:ODY3NTMwOQ=="
-Currently, the Access Server client and standalone OpenVPN
-client support both static and dynamic challenge/response
-protocols. However, any OpenVPN client UI that drives OpenVPN
-via the management interface needs to add explicit support
-for the challenge/response protocol.
+ ("YmFy" is the base 64 encoding of "bar" and "ODY3NTMwOQ==" is the
+ base 64 encoding of "8675309".)
--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
{
dup2(fd, 2);
--
2.32.0 (Apple Git-132)
_______________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
e sent in
> commit a480eaae1d32a6, which was only applied to one of the plugins in
> question (plugins/down-root) and not plugins/auth-pam.
>
> Your patch has been applied to the master branch.
>
> commit d5c1ec2913620cec5b453c35d5c851f8c79a7ae1
> Author: Saifur Rahman Mohsin via O
snprintf(dynamic_name, sizeof(dynamic_name),
"%s%d", dev, i);
+#endif
if ((tt->fd = open(tunname, O_RDWR)) > 0)
{
dynamic_opened = true;
--
2.47.1
signature.asc
Description: OpenPGP digital signature
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
const struct in6_addr *dest, openvpn_net_ctx_t *ctx)
+{
+/* TODO: Same for ipv6 with AF_INET6 */
+CLEAR(*rgi6);
+}
+
#elif defined(TARGET_DARWIN) || defined(TARGET_SOLARIS)\
|| defined(TARGET_FREEBSD) || defined(TARGET_DRAGONFLY)\
|| defined(TARGET_OPENBSD) || defined(TARGET_NETBSD)
--
2.47.1
signature.asc
Description: OpenPGP digital signature
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
On Tuesday, November 26th, 2024 at 8:32 AM, Gert Doering
wrote:
>
> this is great, but alas...
> On Tue, Nov 26, 2024 at 02:26:52PM +, Alexander von Gluck via
> Openvpn-devel wrote:
>
> > +#el
> > if defined(TARGET_HAIKU)
>
> ...
>
> > +#
networking is up.
-if [ ${NETWORKING} = "no" ]
+if [ "${NETWORKING}" = "no" ]
then
echo "Networking is down"
exit 0
--
2.11.0
___________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel
netmask alias : on client add 1-to-1 NAT
rule.\n"
+"--client-nat snat|dnat network|'client-ip' netmask alias : on client add
1-to-1 NAT rule.\n"
"--push-peer-info : (client only) push client info to server.\n"
"--setenv name value : Set a cust
301 - 367 of 367 matches
Mail list logo