Hi, since Samuli is still hiding somewhere on a beach, it's my pleasure to serve as a stand-in and bring you today's minutes...
Summary: - man page integration: patch set on the list, cron2 will skim-and-merge tomorrow'ish - list of deprecated options in the wiki: we have patches for OpenSSL 1.0.1 and --key-method v1, and we need patches for --no-replay --ifconfig-pool-linear --client-cert-not-required - ns-cert-type depreciation was moved from 2.5 to 2.6 or later - async-client-connect patchset is on v7 now, half of it is merged, rest of it is being tested and will go in "tomorrowish" - timeline: aim at "having all patches in by Wednesday, then go about testing even harder and decide on alpha/beta/final release schedule" - server test framework - cron2 was allowed to brag a bit - plugin collection - cron2 wants to collect information about OpenVPN plugins (what plugins exists, where to find them, ...) in the wiki - auth-token and network manager "NM has a long backlog of issues" (quote) - side discussion about /30 support in OpenVPN on Windows, see trac #1302 Full chat log: 20:07 * cron2 wakes up ordex and plaisthos 20:07 < plaisthos> I am already awake 20:08 < dazo> For the man-page stuff ... I'm massaging the vrf documentation. Mostly looks good, but just doing some style changes and moving the --bind-dev option description into the VPN network config section (while keeping the example understandable) 20:08 < cron2> cool, thanks 20:08 < plaisthos> how much review does that need right now? 20:08 < dazo> other than that ... I would say these patches should be fine to be merged 20:09 < plaisthos> It is non-code so I am okay with doing less review than normal 20:09 < cron2> so we "merge what is on the list"? And you send further integration as it comes along? 20:10 < cron2> (like all the patches from wiscii, and plaisthos 6/6 v7) 20:10 < dazo> yeah ... but we have a challenge with one of the patches .... ML puts them into a quarantine due to the size of it 20:10 < dazo> and I don't have access to the ML admin pages 20:10 < plaisthos> who has the list admin pw? 20:10 < cron2> which one? 20:10 < plaisthos> only samuli? 20:10 < dazo> I think so 20:10 < plaisthos> dazo: did you try OpenVPN2019? 20:10 < cron2> ah, 05 is missing 20:10 < plaisthos> or maybe OpenVPN2005? ;) 20:11 < dazo> yeah 20:11 < cron2> I have 01..04, 06..16 20:11 < dazo> plaisthos: :-P 20:11 < cron2> what is in 05? 20:11 < dazo> 05 is missing ... splitting it up into sections 20:11 < dazo> https://gitlab.com/dazo/openvpn/-/commit/c4d2d70c204f4cbda398387d 20:12 < dazo> patch 2/16 could need some extra testing and review ... as that does some autoconf/automake tweaks, other than that it is basically just patching .rst files) 20:13 < cron2> maybe you could change 01 to introduce all the individual files, instead of introducing one big file and then splitting it right away in the next patch? 20:13 < plaisthos> hm lets not try make a lot of extra work 20:13 < cron2> or just poke mattock, he should read SMS :-) to give you the password 20:14 < dazo> that's going to be a lot of work ... because the conversion was pretty messy ... and getting the .8 file into .rst is needed before starting to chop it up into pieces 20:15 < dazo> if we need to split up the .8 file first ... it almost means re-doing everything from scratch 20:15 < cron2> huh? 20:15 < cron2> just squash "make a .rst" and "split the .rst into lots of small .rst" 20:16 < cron2> we do not really need the intermediate "all in one .rst" in our tree, do we? 20:16 < cron2> (it's a bit messy as 03 and 04 change the big file) 20:16 < cron2> but yeah, otherwise, just find the list password from mattock :) 20:16 < dazo> ahh, so you mean to squash most of this into fewer commits ... that's fine ... but that patch will again be rejected by the ML 20:17 < cron2> dazo: if the "introduce the big fat file" can go through, "introduce the same amount in lots of small files" should be fine 20:17 < dazo> the problem with 5/16 is this line: doc/openvpn.8.rst | 5614 +---------------- 20:17 < cron2> the "split one big file into lots of small files" patch is *twice* the size 20:17 < dazo> right ... I can try to move the removal of openvpn.8 into a separate commit 20:17 < plaisthos> r make split and the remove two comments %) 20:17 < plaisthos> 5a and 5b 20:18 < cron2> removal of openvpn.8 is a different commit already 20:18 < cron2> 01 is "introduce .rst" 20:18 < dazo> meh ... right 20:18 < cron2> 02 is "remove .8" 20:18 < cron2> bout about ~200k 20:18 < cron2> 05 is "split .rst into small pieces" which makes ~400k 20:18 < cron2> because all the content is in the diff twice 20:19 < cron2> yeah, what plaisthos says should also work (send 05a, 05b, and I can squash them back togehter if we really want that) 20:19 < dazo> alright ... so ... I'll keep all the man-section/*.rst files as is .... submit the first few patches, then a patch adding the man-sections/*.rst files and then a separate patch changing openvpn.8.rst into a small one 20:20 < cron2> 05a, 05b :) 20:20 < dazo> yeah, that's basically what will happen :) 20:21 < dazo> alright ... so I'll fix that ... and get most of this squashed to fewer commits 20:22 < cron2> good, and then fire it over and can get myself busy with merging 20:23 < cron2> next? 20:23 < cron2> https://community.openvpn.net/openvpn/wiki/DeprecatedOptions 20:24 < cron2> can we have a quick look here and see what we have for 2.5 and what is left to do? 20:24 < plaisthos> There is massive commit from me that deals with cipher and bf-cbc 20:24 < plaisthos> you guys can read the commit and say if that is good or not 20:25 < cron2> is it on the list already? or one of last week's? 20:25 < plaisthos> 19:59:07 <plaisthos> https://github.com/schwabe/openvpn/commit/988aa2f78c5f7c0efb1bb080e9e01554441b0 20:25 < vpnHelper> Title: Rework NCP compability logic and drop BF-CBC support by default \u00b7 schwabe/openvpn@988aa2f \u00b7 GitHub (at github.com) 20:26 < cron2> the page states "To be removed in: OpenVPN v2.6" as goal for removal of BF-CBC (et al)? 20:26 < plaisthos> I think I said 2.6 a few times when I meant 2.5 in teh commit message 20:27 < cron2> not looking at the commit (not sure we have time for that during the meeting) but at the DeprecatedOptions page 20:27 < cron2> that says "2.6" 20:28 < plaisthos> by default in this context means when you specify no --cipher in the config in p2mp mode 20:28 < cron2> I can't remember when we discussed this and what we decided, so I'm just going through that list 20:28 < dazo> what plaisthos is proposing is a step into such a complete deprecation in 2.6 ... basically supporting it in 2.5, but not having it as default 20:28 < cron2> ah, so it's something else than removing the ciphers totally? 20:28 < dazo> yeah 20:28 < cron2> can we please sort of stick to the agenda? 20:29 < dazo> it's kinda related to DeprecatedOptions though ;-) 20:30 < cron2> I'm trying to figure out what is left in work items for 2.5, going through this list... not saying we do not want the other patch, but it's a bit orthogonal 20:30 < cron2> I see --ifconfig-pool-linear, --client-cert-not-required and --ns-cert-type there with "To be removed in: OpenVPN v2.5 20:31 < cron2> (but not gone yet, or "no patch on the list yet"). Anything else? 20:31 < plaisthos> for key-method 1 I have a patch on the mailing list 20:31 < cron2> yes (thanks), and syzzer already requested MOAR OF THIS :-) 20:32 < dazo> for the DeprecatedOptions stuff ... I see we need to remote --key-method, --no-replay and possibly --ifconfig-pool-linear ... still going through the list 20:32 < cron2> key-method is on the list. yeah, --no-replay. 20:32 < cron2> many others already gone \o/ 20:33 < dazo> plaisthos: what about the --ns-cert-type ... did that add some ugly issues with AS? 20:33 < plaisthos> yeah 20:33 < plaisthos> published AS still use only ns-cert 20:33 < cron2> so we bump that to 2.6? 20:33 < dazo> That would be good 20:34 < plaisthos> looking at the pace that customers upgrade probably 2.7 20:34 < dazo> It will anyhow enforce itself into removal with time now, as OpenSSL 1.1.1 doesn't even support this 20:34 < dazo> (iirc) 20:34 < plaisthos> well 20:34 < plaisthos> you cannot check for ns-cert server anymore 20:35 < cron2> I think it's mutating into a no-op due to the SSL libraries ignoring it 20:35 < plaisthos> but you can check for ns-server or eku server 20:35 < dazo> ahh, right 20:36 < dazo> so ... the summary is, need removal patches for key-method, no-replay and ifconfig-pool-linear, while ns-cert-type removal will be postponed to 2.7 ... right? 20:37 < cron2> and client-cert-not-required 20:37 < cron2> yes 20:38 < dazo> ahh, right, missed that one 20:38 < dazo> I can get those patches out this today or tomorrow 20:38 < cron2> any objections on that one from AS side? I think AS *always* does certs? 20:38 < dazo> I think so too 20:39 < plaisthos> no 20:39 < plaisthos> most installations do certs but always in OpenVPN products there are obscure optionss to be configured 20:40 < cron2> I wonder why this sounds so familiar 20:41 < plaisthos> but client-cert-not-required on server side is not a problem 20:41 < plaisthos> the mess on client side is a different topic and we should not have that discussion right now 20:41 < dazo> :) 20:42 < cron2> good. Next! 20:42 < dazo> async-cc! 20:42 < cron2> async-cc - when I wrote that agenda, we were still in discussion on the right format or shape of v7. I think we are nearly there - 5 code patches, 1 doc patch, and my test server says "up to code patch 4, things do not break anything" 20:43 < cron2> 1/6 even has an ACK already :) 20:43 < cron2> I'll work on adding some sort of connect plugin to my setup and see if I can break things in interesting ways :-) 20:43 < dazo> sounds good! 20:44 < cron2> unless ordex or plaisthos want to add more, this brings us to 20:44 < cron2> timeline! 20:44 < cron2> I think we should be able to have "everything in" by mid of next week if we keep up the pace 20:45 < plaisthos> I really want the NCP patch in too 20:45 < cron2> it depends to some extent on "chocolate and diet coke" streaming to plaisthos 20:45 < plaisthos> to get that cipher/BF-CBC mess resolved 20:45 < cron2> now is the time, indeed 20:45 < plaisthos> it lacks only a bit of testing and sending it to the ml from my side 20:45 < plaisthos> but the general approach needs to be okay with everybody 20:45 < cron2> and then review :) (and we need openssl 1.0.1 v2 and key-method v2 from you) 20:46 < cron2> I wonder what I need to send to Delft to get more syzzer time 20:46 < cron2> when is lev__ coming back? dazo? 20:47 < plaisthos> the other v2 are ready but not yet send to list 20:47 < cron2> ah, cool 20:47 < dazo> cron2: I've heard next week 20:47 < cron2> so I think next week we really need to test this from all angles (and I hope Lev__ has some new ideas we've not explored yet - like async-push stuff) 20:48 < plaisthos> so who looks at dazo's patch and acks it? 20:48 * cron2 needs to test and merge the fast-push stuff ("you get soup without asking!") 20:48 < cron2> plaistos: the manpage stuff? 20:48 < plaisthos> conversation to rst 20:49 < cron2> I feel it's on my plate to "skim through and ack-merge" 20:49 < cron2> wiscii has actually *read* all the stuff and sent language fixes 20:49 < plaisthos> cron2: okay thanks 20:49 < cron2> so ordex is free to review and complain about whitespace :) 20:50 < dazo> wiscii has done a realy good job on the language side ... I'm sure more things will surface, as it's an enormous amount of text ... but what he has picked on so far has been really good 20:50 < cron2> so I would say: "aim at getting everything in by wednesday, and then decide on timelines for alpha, beta, final release, and test plan for msi etc"? 20:51 < dazo> sounds like a plan 20:51 < cron2> \o/ 20:51 < cron2> next - two short info points from my side 20:52 < cron2> - server test framework - I need to brag about this! - this has become really sophisticated in the last weeks. I am now testing with 2.2, 2.3-enable-small, 2.3, 2.4 and master clients, and excercising quite a bit of code including async-auth plugin, auth *failure*, ccd/ ccd/DEFAULT, --client-connect script 20:52 < cron2> enough bragging :) 20:52 < plaisthos> :) 20:52 < dazo> nice! 20:53 < cron2> - plugin collection: I found out that I have no idea and we have no list about "what plugins do exist, where are they found, what do they do?" so I started to ask on the list 20:53 < cron2> I did not get much feedback yet (basically, one, from the mozilla folks) 20:53 < plaisthos> I am not even sure even one plugin for connect v2 exists 20:54 < cron2> I plan to have this in a wiki page which could then also have "how to build a plugin?" documentation or link to the documentation we have 20:54 < cron2> oh, yes, and I intend to do a connect and connect v2 plugin for "sample/" to actually excercise these code paths on the server rig 20:54 < dazo> I can certainly help with plug-in documentation .... I might not have a time enough to drive that alone, but can certainly contribute 20:55 < cron2> dazo: if you know about other plugins than I already have, please reply to the mail on the -devel list 20:55 < cron2> I'll do the wiki page then and mail it around 20:56 < cron2> (dazo has an ACK on 12/16 \o/ ) 20:56 < cron2> so - if one of you has anything on plugins, feel free to just throw my way, I'll collect. 20:56 < cron2> next 20:56 < cron2> auth-token and network manager and suspend/resume 20:57 < cron2> this is not 2.5 material but something I wonder how to tackle 20:57 < dazo> I thought we had a wiki page with plugins mattock collected ages ago ... but might have been removed as it was out-of-date 20:57 < plaisthos> still on my todo list but since it is a bugfix this can also go into 2.5.1 20:57 < cron2> if you do network manager with openvpn, it will kill the process on suspend, and restart it on resume 20:57 < cron2> plaisthos: I think this is something else (or maybe not) 20:58 < dazo> yes ... that's a NM "artefact" ... iirc, this requires quite some general NM refactoring, iirc 20:58 < cron2> so if I understand the flow of things right, the new openvpn instance has no way to use the token handed to the old instance, which means "re-enter 2FA". Am I interpreting this correct? Is there a way to fix NM here? 20:58 < plaisthos> well then, still this is my plan for auth-token fix :D 20:58 < dazo> as it tears down all VPNs when the physical network devices are shutdown 20:58 < cron2> plaisthos: oh, this is on your radar? nice :) 20:59 * cron2 is silent and waits for the wonders to happen :-) 20:59 < dazo> I discussed this with thaller (NM developer) a couple of years ago 20:59 < cron2> (my intention was to bounce this at dazo, who is rumored to have good ties to the NM folks and see if something can be fixed there) 21:00 < dazo> thaller is available on #nm here on FreeNode though :-P 21:01 < ordex> meh I forgot again due to dinner 21:01 < ordex> sorry 21:01 < dazo> those italians and their dinners! :-P 21:01 < ordex> :-P 21:01 * ordex studies the backlog 21:03 < cron2> dazo: so what was the result of that discussion? 21:04 < plaisthos> I will send the rest of my patch as patch set tommorrow 21:04 < dazo> cron2: that NM has a long backlog of issues needing to be fixed .... 21:04 < cron2> it will be a busy day for me :) 21:04 < dazo> cron2: which distro did you last test this suspend/resume issue on? 21:06 < cron2> I'm not using NM, but I will ask the colleague who complained to me yesterday 21:07 < cron2> dazo: 21:06 < mme> fc31+32 21:07 < dazo> I have some patches pending for openvpn3-linux which will do the proper suspend/resume automatically as NM switches between offline/online mode ... and I need to set aside some time to at least provide a start/stop of VPN sessions via NM for openvpn3-linux 21:08 < dazo> okay, that is definitely recent enough ... so then that disconnect stuff is related to NM tearing down all VPNs when the network link is stopped 21:10 < cron2> yes 21:13 < cron2> so 21:13 * cron2 does the mattock 21:13 < cron2> "anything else, we're 13 minutes over time?" 21:13 < dazo> :) 21:13 < plaisthos> anyone want to read the commit message and comment on it? ;) 21:14 < dazo> Not on my side ... I have enough to pick at on my plate 21:14 < dazo> plaisthos: I'll try to have a look tomorrow 21:14 < plaisthos> thanks 21:14 < cron2> you need wiscii there :-) 21:14 < dazo> hehehe :) 21:14 < cron2> "It also us to finally drop ..." 21:14 < plaisthos> yeah I will also need to proof read it 21:15 < dazo> cron2: regarding the /30 issue .... https://community.openvpn.net/openvpn/ticket/1302 21:15 < dazo> hahaha ... just spotted the "keywords" for this ticket .... :-P 21:15 < cron2> plaisthos: there's 2.5s that want to be 2.4, and 2.6 that wants to be 2.5 21:16 < plaisthos> I know :/ 21:16 < cron2> otherwise, from a quick glance, sounds okayish 21:17 < cron2> dazo: well, it's possible that /30 on *windows* does not work with tapv9 21:17 < cron2> because you need a 3rd IP address for the "I pretend to be a DHCP server" 21:19 < dazo> it is claimed to work with OpenVPN Connect though ... which uses the same tap-windows6 driver .... I do vaguely remember some discussions about it, might be lev__ was involved in fixing some of it ... but my memory is fading 21:19 < cron2> your folks should really know to include log files with relevant bits ("PUSH_REPLY")... 21:19 < dazo> hahahaha 21:20 < dazo> yeah .... 21:20 < cron2> and maybe relevant parts from the server config... 21:20 < dazo> I'll slap novaflash for that ... but it might be what he received from the user 21:20 < cron2> if connect can do that, show us the logs :-) 21:20 < dazo> IIRC, it's an OpenVPN Cloud user 21:21 < cron2> yeah, but novaflash could just lab it and test it himself - I have seen him use windows! live on zoom! 21:22 < cron2> anyway, thanks for the relayed report, let's see if there is more data 21:23 < cron2> (this bug report is too cloudy, it needs to have more material to work with!) -- "If was one thing all people took for granted, was conviction that if you feed honest figures into a computer, honest figures come out. Never doubted it myself till I met a computer with a sense of humor." Robert A. Heinlein, The Moon is a Harsh Mistress Gert Doering - Munich, Germany g...@greenie.muc.de
signature.asc
Description: PGP signature
_______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel