Another ACK from me.  

I'm not sure I understand all the intricacies of our buffer/frame handling 
and *why* there is always enough "capacity" present, but since we're never 
reading more bytes than we have capacity, this is definitely *safe*.

Obviously the old code never requested more bytes than capacity (buf_safe()),
so the new code will read() "at least as many bytes as before" - and since
I remember that there is quite a bit of headroom in the frame stuff, the
goal should be achieved.

Your patch has been applied to the master and release/2.3 branch (the latter
because it helps with certain incompatibilities in --*-mtu setup, which
otherwise lead to hard-to-debug TLS failures).

commit 3c1b19e04745177185decd14da82c71458442b82 (master)
commit 358f513c008bf01fadb82759ac75ffb8613fc785 (release/2.3)

Author: Steffan Karger
List-Post: openvpn-devel@lists.sourceforge.net
Date:   Wed Jun 8 14:20:39 2016 +0200

     Don't limit max incoming message size based on c2->frame

     Signed-off-by: Steffan Karger <stef...@karger.me>
     Acked-by: Arne Schwabe <a...@rfc2549.org>
     Acked-by: Gert Doering <g...@greenie.muc.de>
     Message-Id: <1465388443-15484-2-git-send-email-stef...@karger.me>
     URL: http://article.gmane.org/gmane.network.openvpn.devel/11850
     Signed-off-by: Gert Doering <g...@greenie.muc.de>


--
kind regards,

Gert Doering


Reply via email to