> To find out what went wrong, you need to have some understanding of
> certificates and the openssl application and scripts. There are other
> tools that will allow you to create and maintain a CA depending on
> your requirements, one thing holds true however: The CA must not be on
> your pro
tion: everybody is talking about Perfect Forward
Secercy to avoid deciphering past communications; are we sure OpenVPN
implements this?
I do not think this is a configurable item !?
Best regards,
Jakob Curdes
--
P
Am 08.04.2014 15:13, schrieb Joe Patterson:
> I think that what's being referred to here is that a VPN service with
> multiple independent clients could have one nefarious client who used
> a valid client key/cert to establish a session, then used that session
> plus this vulnerability to compr
ashes used by plugins
e.g.? Because this could mean that these passwords, which might be used
in very different contexts if e.g. we talk about a PAM plugin, need to
be changed too. And this would open attack vectors that are nor related
to OpenVPN anymore.
Regards,
Jakob Curdes
> Hi
ith leaving things as they are,
but the general recommendation in this case is to replace host keys,
certificates, and other credentials used in the process.
Best regards,
Jakob Curdes
--
Start Your Social Network To
> Would the server config file affect the log level on the client side?
No. Some server side configuration items might do, though, in
conjunction with a non-matching client side configuration.
JC
--
Am 02.01.2017 um 11:21 schrieb Tibin Geo k k:
> How to connect OpenVPN through ssh tunnel, I have configured OpenVPN
> server on a ubuntu machine, and it is working fine, recently my
> network admin blocked connection to external vpn.
I think if your network admin blocked connections to externa
code treat
backslashes differently... how can I get this going, if at all? Should I
contact the openvpn-devel list for this?
Best regards and thank you for hints,
Jakob Curdes
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
Am 10.03.2022 um 12:22 schrieb Jan Just Keijser:
Thu Mar 10 10:35:32 2022 Restart pause, 5 second(s)
*Thu Mar 10 10:35:40 2022 Previous command sent to management failed:
ERROR: Options warning: Bad backslash ('\') usage in TCP:0: remember
that backslashes are treated as shell-escapes and i
vive "AuthPoint", in a transition period, you cannot do this with
the OpenVPN client as you would prepend the AD domain or the "authpoint"
domain to the username, which then leads to the error in the second auth
round.
Best regards, Jakob Curdes
_
sts.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
--
Jakob Curdes
Anschrift
iS information systems oHG
Donnerschweer Str. 89-91
D-26123 Oldenburg
Tel.: (0)441 - 92 31 99 0
Fax: (0)441 - 92 31 99 99
Web: w
Am 23.01.2024 um 13:32 schrieb Peter Davis via Openvpn-users:
Hello,
I want to use OpenVPN and HTTPS. I found the following article:
(...)
server 20.20.0.0 255.255.255.0
First of all, from where did you take that IP network? This is not a
private network range as far as I
Hi,
these vulnerabilities are already fixed in the current versions since
March 2024, so if you keep your software up to date, there is no threat.
Also they are limited to Windws environments and not easy to exploit.
See: https://openvpn.net/security-advisories/
So the subject of your mail s
Hello all,
in Germany we are reading articles like this one:
https://www.heise.de/news/Schwere-Luecke-bei-kritischen-Anwendungen-Klartextpasswoerter-im-Prozessspeicher-9830774.html
https://www.secuvera.de/blog/studie-klartextpassworter-in-passwortspeichern/
which mentions CWE-316: "Cleartext S
14 matches
Mail list logo