Hello
I'm curious about this as well. Doesn't the openvpn server has a built in
security mechanism to
protect against unwanted ip change from CCD clients?
Let's say the server is assigning me 192.168.77.22:
Mon Jan 19 09:36:22 2015 /sbin/ip link set dev tun0 up mtu 1350
Mon Jan 19 09:36:22 2015
Hi,
On Mon, Jan 19, 2015 at 09:46:54AM +0100, Stephan Alz wrote:
> I'm curious about this as well. Doesn't the openvpn server has a built in
> security mechanism to
> protect against unwanted ip change from CCD clients?
Very much so - it will just ignore packets a client sends using different
so
Hello OpenVPN community!
Line below was extract from my openvpn server log.
Jan 8 17:44:25 myserver openvpn[28644]: a.b.178.157:22853 VERIFY
ERROR: could not extract CN from X509 subject string (' ***user
certificate dn here*** ') -- note that the username length is limited
to 64 characters
Init
Hi Jorge,
On 19-01-15 23:47, Jorge Luiz Silva Peixoto wrote:
> Is the comparison between strlen ((char *)buf) and size correct?
> Shouldn't be less equal?
That check is correct, since strlen() excludes the NULL-character, and
we rely on the string begin NULL-terminated.
> I'll do some tests, e.g