Hi, On 15-08-17 22:53, David Sommerseth wrote: > A simple clean-up where the version references have been unified > all those places I could find now. The versioning scheme used is: > > * OpenVPN 2.x > * v2.x > > We want to avoid: > * 2.x (2.4 can be just an ordindary decimal number, > OID reference, a version number or anything else) > * OpenVPN v2.x (OpenVPN indicates we're talking about a version) > > In addition, several places where it made sense I tried to ensure > the first version reference uses "OpenVPN 2.x" and the following > references in the same section/paragraph uses "v2.x", to set the > context for the version reference. > > In Changes.rst modified paragraphs exceeding 80 chars lines where > reformatted as well. > > Signed-off-by: David Sommerseth <dav...@openvpn.net> > --- > Changes.rst | 52 > ++++++++++++++++++---------------- > doc/openvpn.8 | 34 +++++++++++----------- > sample/sample-config-files/client.conf | 2 +- > sample/sample-config-files/server.conf | 4 +-- > src/openvpn/options.c | 8 +++--- > 5 files changed, 51 insertions(+), 49 deletions(-) > > diff --git a/Changes.rst b/Changes.rst > index 4358f78b..0999a835 100644 > --- a/Changes.rst > +++ b/Changes.rst > @@ -161,25 +161,26 @@ Asynchronous push reply > > Deprecated features > ------------------- > -- ``--key-method 1`` is deprecated in 2.4 and will be removed in 2.5. > Migrate > - away from ``--key-method 1`` as soon as possible. The recommended approach > - is to remove the ``--key-method`` option from the configuration files, > OpenVPN > - will then use ``--key-method 2`` by default. Note that this requires > changing > - the option in both the client and server side configs. > +- ``--key-method 1`` is deprecated in OpenVPN 2.4 and will be removed in > v2.5. > + Migrate away from ``--key-method 1`` as soon as possible. The recommended > + approach is to remove the ``--key-method`` option from the configuration > + files, OpenVPN will then use ``--key-method 2`` by default. Note that this > + requires changing the option in both the client and server side configs. > > -- ``--tls-remote`` is removed in 2.4, as indicated in the 2.3 man-pages. > Similar > - functionality is provided via ``--verify-x509-name``, which does the same > job in > - a better way. > +- ``--tls-remote`` is removed in OpenVPN 2.4, as indicated in the v2.3 > + man-pages. Similar functionality is provided via ``--verify-x509-name``, > + which does the same job in a better way. > > -- ``--compat-names`` and ``--no-name-remapping`` were deprecated in 2.3 and > will > - be removed in 2.5. All scripts and plug-ins depending on the old > non-standard > - X.509 subject formatting must be updated to the standardized formatting. > See > - the man page for more information. > +- ``--compat-names`` and ``--no-name-remapping`` were deprecated in OpenVPN > 2.3 > + and will be removed in v2.5. All scripts and plug-ins depending on the old > + non-standard X.509 subject formatting must be updated to the standardized > + formatting. See the man page for more information. > > -- ``--no-iv`` is deprecated in 2.4 and will be removed in 2.5. > +- ``--no-iv`` is deprecated in OpenVPN 2.4 and will be removed in v2.5. > > -- ``--keysize`` is deprecated and will be removed in v2.6 together > - with the support of ciphers with cipher block size less than 128 bits. > +- ``--keysize`` is deprecated in OpenVPN 2.4 and will be removed in v2.6 > + together with the support of ciphers with cipher block size less than > + 128-bits. > > > User-visible Changes > @@ -302,7 +303,7 @@ Maintainer-visible changes > files instead of older ones, to provide a unified behaviour across systemd > based Linux distributions. > > -- With OpenVPN v2.4, the project has moved over to depend on and actively use > +- With OpenVPN 2.4, the project has moved over to depend on and actively use > the official C99 standard (-std=c99). This may fail on some older > compiler/libc > header combinations. In most of these situations it is recommended to > use -std=gnu99 in CFLAGS. This is known to be needed when doing > @@ -324,7 +325,7 @@ New features > Security > -------- > - CVE-2017-7522: Fix ``--x509-track`` post-authentication remote DoS > - A client could crash a 2.4+ mbedtls server, if that server uses the > + A client could crash a v2.4+ mbedtls server, if that server uses the > ``--x509-track`` option and the client has a correct, signed and unrevoked > certificate that contains an embedded NUL in the certificate subject. > Discovered and reported to the OpenVPN security team by Guido Vranken. > @@ -381,7 +382,7 @@ User-visible Changes > Bugfixes > -------- > - Fix fingerprint calculation in mbed TLS builds. This means that mbed TLS > users > - of OpenVPN 2.4.0, 2.4.1 and 2.4.2 that rely on the values of the > + of OpenVPN 2.4.0, v2.4.1 and v2.4.2 that rely on the values of the > ``tls_digest_*`` env vars, or that use ``--verify-hash`` will have to > change > the fingerprint values they check against. The security impact of the > incorrect calculation is very minimal; the last few bytes (max 4, typically > @@ -410,17 +411,18 @@ Version 2.4.2 > > Bugfixes > -------- > -- Fix memory leak introduced in 2.4.1: if ``--remote-cert-tls`` is used, we > leaked > - some memory on each TLS (re)negotiation. > +- Fix memory leak introduced in OpenVPN 2.4.1: if ``--remote-cert-tls`` is > + used, we leaked some memory on each TLS (re)negotiation. > > > Security > -------- > -- Fix a pre-authentication denial-of-service attack on both clients and > servers. > - By sending a too-large control packet, OpenVPN 2.4.0 or 2.4.1 can be forced > - to hit an ASSERT() and stop the process. If ``--tls-auth`` or > ``--tls-crypt`` > - is used, only attackers that have the ``--tls-auth`` or ``--tls-crypt`` key > - can mount an attack. (OSTIF/Quarkslab audit finding 5.1, CVE-2017-7478) > +- Fix a pre-authentication denial-of-service attack on both clients and > + servers. By sending a too-large control packet, OpenVPN 2.4.0 or v2.4.1 > can > + be forced to hit an ASSERT() and stop the process. If ``--tls-auth`` or > + ``--tls-crypt`` is used, only attackers that have the ``--tls-auth`` or > + ``--tls-crypt`` key can mount an attack. > + (OSTIF/Quarkslab audit finding 5.1, CVE-2017-7478) > > - Fix an authenticated remote DoS vulnerability that could be triggered by > causing a packet id roll over. An attack is rather inefficient; a peer > diff --git a/doc/openvpn.8 b/doc/openvpn.8 > index 056ae145..2d22fb57 100644 > --- a/doc/openvpn.8 > +++ b/doc/openvpn.8 > @@ -1994,7 +1994,7 @@ could be either > .B execve > or > .B system. > -As of OpenVPN v2.3, this flag is no longer accepted. In most *nix > environments the execve() > +As of OpenVPN 2.3, this flag is no longer accepted. In most *nix > environments the execve() > approach has been used without any issues. > > Some directives such as \-\-up allow options to be passed to the external > @@ -2006,7 +2006,7 @@ To run scripts in Windows in earlier OpenVPN > versions you needed to either add a full path to the script interpreter > which can parse the > script or use the > .B system > -flag to run these scripts. As of OpenVPN v2.3 it is now a strict > requirement to have > +flag to run these scripts. As of OpenVPN 2.3 it is now a strict requirement > to have > full path to the script interpreter when running non-executables files. > This is not needed for executable files, such as .exe, .com, .bat or .cmd > files. For > example, if you have a Visual Basic script, you must use this syntax now: > @@ -2201,7 +2201,7 @@ passwords, or key pass phrases anymore. This has > certain consequences, > namely that using a password-protected private key will fail unless the > .B \-\-askpass > option is used to tell OpenVPN to ask for the pass phrase (this > -requirement is new in 2.3.7, and is a consequence of calling daemon() > +requirement is new in v2.3.7, and is a consequence of calling daemon() > before initializing the crypto layer). > > Further, using > @@ -2474,7 +2474,7 @@ The > parameter may be "lzo", "lz4", or empty. LZO and LZ4 > are different compression algorithms, with LZ4 generally > offering the best performance with least CPU usage. > -For backwards compatibility with OpenVPN versions before 2.4, use "lzo" > +For backwards compatibility with OpenVPN versions before v2.4, use "lzo" > (which is identical to the older option "\-\-comp\-lzo yes"). > > If the > @@ -3678,7 +3678,7 @@ is less secure than requiring certificates from all > clients. > > > .B Please note: > -This option is now deprecated and will be removed in OpenVPN v2.5. > +This option is now deprecated and will be removed in OpenVPN 2.5. > It is replaced by > .B \-\-verify\-client\-cert > which allows for more flexibility. The option > @@ -3745,7 +3745,7 @@ rather than the common name from the client cert. > .\"********************************************************* > .TP > .B \-\-compat\-names [no\-remapping] (DEPRECATED) > -Until OpenVPN v2.3 the format of the X.509 Subject fields was formatted > +Until OpenVPN 2.3 the format of the X.509 Subject fields was formatted > like this: > .IP > .B > @@ -3763,13 +3763,13 @@ option, this old formatting and remapping will be > re-enabled again. This is > purely implemented for compatibility reasons when using older plug-ins or > scripts which does not handle the new formatting or UTF-8 characters. > .IP > -In OpenVPN v2.3 the formatting of these fields changed into a more > +In OpenVPN 2.3 the formatting of these fields changed into a more > standardised format. It now looks like: > .IP > .B > C=US, L=Somewhere, CN=John Doe, emailAddress=j...@example.com > .IP > -The new default format in OpenVPN v2.3 also does not do the character > remapping > +The new default format in OpenVPN 2.3 also does not do the character > remapping > which happened earlier. This new format enables proper support for UTF\-8 > characters in the usernames, X.509 Subject fields and Common Name variables > and > it complies to the RFC 2253, UTF\-8 String Representation of Distinguished > @@ -3789,7 +3789,7 @@ carriage-return. no-remapping is only available on the > server side. > .B Please note: > This option is immediately deprecated. It is only implemented > to make the transition to the new formatting less intrusive. It will be > -removed in OpenVPN v2.5. So please update your scripts/plug-ins where > necessary. > +removed in OpenVPN 2.5. So please update your scripts/plug-ins where > necessary. > .\"********************************************************* > .TP > .B \-\-no\-name\-remapping (DEPRECATED) > @@ -3802,7 +3802,7 @@ It ensures compatibility with server configurations > using the > option. > > .B Please note: > -This option is now deprecated. It will be removed in OpenVPN v2.5. > +This option is now deprecated. It will be removed in OpenVPN 2.5. > So please make sure you support the new X.509 name formatting > described with the > .B \-\-compat\-names > @@ -4204,8 +4204,8 @@ will inherit the cipher of the peer if that cipher is > different from the local > .B \-\-cipher > setting, but the peer cipher is one of the ciphers specified in > .B \-\-ncp\-ciphers\fR. > -E.g. a non-NCP client (<=2.3, or with \-\-ncp\-disabled set) connecting to a > -NCP server (2.4+) with "\-\-cipher BF-CBC" and "\-\-ncp-ciphers > +E.g. a non-NCP client (<=v2.3, or with \-\-ncp\-disabled set) connecting to a > +NCP server (v2.4+) with "\-\-cipher BF-CBC" and "\-\-ncp-ciphers > AES-256-GCM:AES-256-CBC" set can either specify "\-\-cipher BF-CBC" or > "\-\-cipher AES-256-CBC" and both will work. > > @@ -5010,8 +5010,8 @@ response. > (required) is a file in OpenVPN static key format which can be generated by > .B \-\-genkey > > -Older versions (up to 2.3) supported a freeform passphrase file. > -This is no longer supported in newer versions (2.4+). > +Older versions (up to OpenVPN 2.3) supported a freeform passphrase file. > +This is no longer supported in newer versions (v2.4+). > > See the > .B \-\-secret > @@ -5568,7 +5568,7 @@ Write key to > .B file. > .\"********************************************************* > .SS TUN/TAP persistent tunnel config mode: > -Available with linux 2.4.7+. These options comprise a standalone mode > +Available with Linux 2.4.7+. These options comprise a standalone mode > of OpenVPN which can be used to create and delete persistent tunnels. > .\"********************************************************* > .TP > @@ -5895,7 +5895,7 @@ flag. > .TP > .B \-\-dhcp\-release > Ask Windows to release the TAP adapter lease on shutdown. > -This option has no effect now, as it is enabled by default starting with > version 2.4.1. > +This option has no effect now, as it is enabled by default starting with > OpenVPN 2.4.1. > .\"********************************************************* > .TP > .B \-\-register\-dns > @@ -6178,7 +6178,7 @@ isprint() function to return true. > > .B \-\-client\-config\-dir filename as derived from common name or username: > Alphanumeric, underbar ('_'), dash ('-'), and dot ('.') except for "." or > -".." as standalone strings. As of 2.0.1-rc6, the at ('@') character has > +".." as standalone strings. As of v2.0.1-rc6, the at ('@') character has > been added as well for compatibility with the common name character class. > > .B Environmental variable names: > diff --git a/sample/sample-config-files/client.conf > b/sample/sample-config-files/client.conf > index f5c69e34..5fd4a948 100644 > --- a/sample/sample-config-files/client.conf > +++ b/sample/sample-config-files/client.conf > @@ -110,7 +110,7 @@ tls-auth ta.key 1 > # Select a cryptographic cipher. > # If the cipher option is used on the server > # then you must also specify it here. > -# Note that 2.4 client/server will automatically > +# Note that v2.4 client/server will automatically > # negotiate AES-256-GCM in TLS mode. > # See also the ncp-cipher option in the manpage > cipher AES-256-CBC > diff --git a/sample/sample-config-files/server.conf > b/sample/sample-config-files/server.conf > index aa7d5b39..1dd477bd 100644 > --- a/sample/sample-config-files/server.conf > +++ b/sample/sample-config-files/server.conf > @@ -246,13 +246,13 @@ tls-auth ta.key 0 # This file is secret > # Select a cryptographic cipher. > # This config item must be copied to > # the client config file as well. > -# Note that 2.4 client/server will automatically > +# Note that v2.4 client/server will automatically > # negotiate AES-256-GCM in TLS mode. > # See also the ncp-cipher option in the manpage > cipher AES-256-CBC > > # Enable compression on the VPN link and push the > -# option to the client (2.4+ only, for earlier > +# option to the client (v2.4+ only, for earlier > # versions see below) > ;compress lz4-v2 > ;push "compress lz4-v2" > diff --git a/src/openvpn/options.c b/src/openvpn/options.c > index ef7009c1..5346fcdc 100644 > --- a/src/openvpn/options.c > +++ b/src/openvpn/options.c > @@ -6186,7 +6186,7 @@ add_option(struct options *options, > else if (streq(p[0], "max-routes") && !p[2]) > { > msg(M_WARN, "DEPRECATED OPTION: --max-routes option ignored." > - "The number of routes is unlimited as of version 2.4. " > + "The number of routes is unlimited as of OpenVPN 2.4. " > "This option will be removed in a future version, " > "please remove it from your configuration."); > } > @@ -7016,7 +7016,7 @@ add_option(struct options *options, > VERIFY_PERMISSION(OPT_P_GENERAL); > if (streq(p[1], "env")) > { > - msg(M_INFO, "NOTE: --win-sys env is default from OpenVPN v2.3. > " > + msg(M_INFO, "NOTE: --win-sys env is default from OpenVPN 2.3. > " > "This entry will now be ignored. " > "Please remove this entry from your configuration file."); > } > @@ -7862,7 +7862,7 @@ add_option(struct options *options, > msg(msglevel, "you cannot use --compat-names with > --verify-x509-name"); > goto err; > } > - msg(M_WARN, "DEPRECATED OPTION: --compat-names, please update your > configuration. This will be removed in OpenVPN v2.5."); > + msg(M_WARN, "DEPRECATED OPTION: --compat-names, please update your > configuration. This will be removed in OpenVPN 2.5."); > compat_flag(COMPAT_FLAG_SET | COMPAT_NAMES); > #if P2MP_SERVER > if (p[1] && streq(p[1], "no-remapping")) > @@ -7878,7 +7878,7 @@ add_option(struct options *options, > msg(msglevel, "you cannot use --no-name-remapping with > --verify-x509-name"); > goto err; > } > - msg(M_WARN, "DEPRECATED OPTION: --no-name-remapping, please update > your configuration. This will be removed in OpenVPN v2.5."); > + msg(M_WARN, "DEPRECATED OPTION: --no-name-remapping, please update > your configuration. This will be removed in OpenVPN 2.5."); > compat_flag(COMPAT_FLAG_SET | COMPAT_NAMES); > compat_flag(COMPAT_FLAG_SET | COMPAT_NO_NAME_REMAPPING); > #endif >
Makes our communication more consistent, which is good. ACK. -Steffan ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel