On Sun, Apr 13, 2014 at 8:19 AM, Arne Schwabe <a...@rfc2549.org> wrote: > You could look at the TARGET_ANDROID. That uses the management interface and > fds over unix socket to achieve something similar.
Do you think it would be feasible to enable TARGET_ANDROID by default in the Linux OpenVPN builds, and change the logic so that if the user passes e.g. "--android" it will accept commands over the management socket instead of using the standard CLI? This would not work with ocproxy as-is, but I could write a wrapper program. Let me know if you think it's worth putting together a patch set. BTW, here is an example of how my current patch works with an existing OpenVPN service: $ ./src/openvpn/openvpn --config /tmp/vpnbook/vpnbook-us1-udp25000.ovpn \ --verb 0 --script-security 2 \ --dev "|/usr/bin/ocproxy -D 12345" & Sun Apr 13 08:46:44 2014 WARNING: file '/tmp/vpnbook/user.txt' is group or others accessible Sun Apr 13 08:46:44 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Sun Apr 13 08:46:44 2014 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this $ SOCKS5_SERVER=127.0.0.1:12345 socksify links -source ipchicken.com | grep -A1 Address Address: 198.7.62.204 </font></td> Using port forwarding with "ocproxy -L", socksify, or FoxyProxy, individual connections / applications / URLs can be seamlessly forwarded over different VPN links. Or, if I omit the --dev option, OpenVPN will fall back to standard "create tunX" behavior.