Hi,
Here's the summary of the IRC meeting.
---
COMMUNITY MEETING
Place: #openvpn-meeting on libera.chat
Date: Wed 15th December 2021
Time: 14:00 CET (12:00 UTC)
Planned meeting topics for this meeting were here:
<https://community.openvpn.net/openvpn/wiki/Topics-2021-12-17>
Your local meeting time is easy to check from services such as
<http://www.timeanddate.com/worldclock>
SUMMARY
cron2, dazo, d12fk, lev, mattock, MaxF, novaflash, ordex, plaisthos,
rob0 and syzzer participated in this meeting.
---
Talked about the mbedtls dropping dual licensing (GPLv2 + Apache License
2) in favor of Apache License 2. This will probably make OpenVPN, which
is GPLv2 only, incompatible with mbedtls. The question here depends on
whether mbedtls can be considered a system library. If yes, our use of
mbedtls would not trigger license incompatibility. Agreed that
contacting an open source license lawyer about it might be a good idea.
---
Agreed to change meeting time to 10.30-11.30 CET/CEST. This works for
everyone who attends the meetings regularly, except rob0 from the US,
who was fine with the change nevertheless.
---
Talked about Google Titan and Yubikey giveway. Agreed that community
developers should get the free ones and OpenVPN Inc. developers can get
ones from the company.
---
Talked about mssfix. Agreed to set default mssfix to 1492.
--
Full chatlog attached
(15.00.14) mattock: hello
(15.00.20) MaxF: hello!
(15.00.30) mattock: hi!
(15.02.12) lev__: hello
(15.02.38) d12fk: hihi
(15.02.44) mattock: hi all!
(15.03.01) mattock: cron2 said he will join but may be distracted
(15.03.48) plaisthos: hey!
(15.03.55) plaisthos: MaxF: have you seen the license mail?
(15.04.09) mattock: https://community.openvpn.net/openvpn/wiki/Topics-2021-12-15
(15.04.12) MaxF: yes, and I did some googling
(15.04.29) MaxF: GPLv2 and Apache don't seem to be compatible :/
(15.04.47) cron2: I'm here, but we're having a heated discussion $overthere
about VPN access to corp network...
(15.05.01) MaxF: http://www.gnu.org/licenses/license-list.html#apache2
(15.05.42) cron2: is dazo around? he seems to understand licensing best (from
the core team)
(15.05.46) cron2: can one of you wake him? :-)
(15.06.00) mattock: I tried already
(15.06.14) mattock: he woke up
(15.06.24) dazo: I'm here!
(15.08.22) dazo: So ... GPLv2 is incompatible with Apache License 2 ....
https://fedoraproject.org/wiki/Licensing:Main#Good_Licenses
(15.09.05) ordex: heya
(15.09.09) ordex: partly here too!
(15.10.42) plaisthos: MaxF: maybe Fox IT has still contacts with mbed TLS
people and ask if there is any chance for our GPL2 only project ot be able to
continue to use mbed TLS
(15.11.25) MaxF: I don't think we still have contacts, but I'll ask around
(15.11.36) dazo: In regards to the LZO license exception .... That is for
OpenSSL only. The question is if OpenSSL or LibreSSL can be considered a
system library; likewise for mbed TLS. But that is not something we can
decide, that is the distro needing to define that.
(15.12.31) ordex: basically who builds the package?
(15.13.49) dazo: kinda ... both the SSL/TLS library packager but also the whole
OS/distro project, I'd say
(15.14.26) MaxF: in OpenVPN-NL, we statically link with an mbedtls version that
we check out, so I don't think we can claim it's a system library
(15.14.30) dazo: "We consider the SSL/TLS library a critical and important
component of this OS. It cannot function without it"
(15.14.50) MaxF: or am I misunderstanding that term?
(15.14.54) dazo: MaxF: That is true, static linking breaks the system library
part
(15.15.17) cron2: windows building also breaks it, as we ship the SSL library
(OpenSSL, in that case)
(15.16.18) dazo: The OpenSSL 1.x and older license challenge is a bit
different, so there *we* need to grant a linking exception. While with the
Apache license that is the reverse, I believe
(15.17.00) plaisthos: with apache it is the same for OpenVPN + OpenSSL 3.0
(15.17.15) dazo: Yeah, that is something which will bite us too
(15.18.34) plaisthos: You must obey the GNU General Public License in all
respects for all of the code used other than OpenSSL.
(15.18.39) plaisthos: is what we have in our COPYING
(15.18.57) dazo: MaxF: in regards to static linking ... if the OS you build on
provides a static linkable version, linking against that would probably be fine
and considered part of the system library. But building your own mbed TLS and
linking statically will not be a system library.
(15.19.04) plaisthos: so if something in the GPL would not hold true for the
OpenSSL library then you still free to use
(15.19.40) MaxF: dazo Well, that's unfortunate
(15.20.34) mattock: perhaps this would be material for an open source license
specialist
(15.20.44) dazo: Yes, I think so
(15.21.16) mattock: we want to avoid screwing this thing up, especially if we
have to go through the relicensing process
(15.21.26) dazo: I see our OpenVPN 2 Copying even has a linking grant from
Oberhumer, when used against OpenSSL (no version/license restriction)
(15.22.29) plaisthos: I think the summary is that we are lucky that our
exception for OpenSSL was broad enough to cover also their license switch and
for mbed TLS we screwed :/
(15.24.31) plaisthos: we could try to reach all commiters if they are fine with
another
(15.24.34) plaisthos: license
(15.24.35) plaisthos: Despite our best efforts, the FSF has never considered
the Apache License to be compatible with GPL version 2, citing the patent
termination and indemnification provisions as restrictions not present in the
older GPL license. The Apache Software Foundation believes that you should
always try to obey the constraints expressed by the copyright holder when
redistributing their work.
(15.24.46) plaisthos: btw. this the reason gplv2 is incompatible with Apache 2.0
(15.25.17) dazo: unfortunately, yes. If we get a license grant from mbed,
things might end up different ... but we should consider getting in touch with
a GPL license lawyer
(15.25.54) mattock: dazo: you still have the contacts?
(15.26.04) mattock: Pamela if I recall correctly
(15.26.34) dazo: yeah, I would send this via Gary
(15.26.40) mattock: +1
(15.26.44) mattock: shall we move on?
(15.27.20) mattock: lots of topics
(15.27.41) cron2: can we return to "meeting time"? This is about: Wednesday
14-1500 works increasingly poor for me - it conflicts with family, US
videoconfs, ...
(15.27.59) cron2: if I might choose, I'd go for a "10-11" CET timeslot
(15.28.40) MaxF: 10 would conflict with my daily standup
(15.28.54) MaxF: but if that's better for everyone else, I think we can survive
if I miss it once per week
(15.29.18) cron2: 10:30-11:30?
(15.29.32) MaxF: works for me!
(15.29.49) dazo: +1
(15.29.52) mattock: that's pretty optimal for me as well
(15.30.14) ordex: +1
(15.30.45) plaisthos: 10:30 is okay for me
(15.31.23) rob0: that's awful for anyone in .US, but that should not matter
(15.31.49) cron2: rob0: you are in NL, no?
(15.31.55) dazo: I think you're the only one from US appearing here, rob0
(15.32.07) mattock: rob0: we had meetings alternating between "ok for europe,
ok for us" for a long time
(15.32.21) rob0: no, .us ^^ and I'm not complaining
(15.32.22) d12fk: how about later then?
(15.32.22) mattock: it was very rare for anyone from the US to join the "US
meetings"
(15.32.37) mattock: therefore we stopped trying to involve the US people :D
(15.32.44) cron2: "later" is increasingly congested for me (kids, US video
calls)
(15.32.53) plaisthos: and the US meeting was at 18 or 19 CEST, so often live
got into the way for us Europeans
(15.33.02) mattock: yep
(15.33.48) d12fk: I live in PST currently. need to set an alarm then ;-)
(15.33.49) mattock: anyhow, 10.30 seems to be ok
(15.33.49) cron2: I'd suggest moving to "Wednesday 10:30-11:30" then, and rob0
sends in things to discuss (which can be done today :) )?
(15.33.57) cron2: thanks :)
(15.34.33) rob0: sure, if I have anything I'd fuss at dazo :)
(15.34.42) dazo: *sigh*
(15.34.44) dazo: :-P
(15.35.18) mattock: next topic
(15.35.28) mattock: Yubikey and Google Titankey giveaway
(15.35.34) mattock: what is this about?
(15.35.41) cron2: selva wants one
(15.35.56) mattock: is somebody offering them?
(15.36.00) mattock: or is openvpn offering them?
(15.36.08) plaisthos: google/github are offering
(15.36.31) plaisthos: basically both are u2f keys but the yubikey can also do
X509/PKCS11 and GPG
(15.36.42) MaxF: this is a thing one can use for 2FA on github instead of a
phone app right?
(15.36.51) dazo: yeah
(15.36.58) plaisthos: MaxF: yes via U2F
(15.37.00) dazo: it's U2F
(15.37.05) ordex: well, not just for login, but I think also for signing
commits?
(15.37.17) ordex: or commits/git are unrelated?
(15.37.18) dazo: then you need PKCS#11
(15.37.20) plaisthos: ordex: not the titan key that is only U2F iirc
(15.37.23) ordex: ok
(15.37.38) ordex: the yubikey sounds good then - I'd get one if we decide to do
this
(15.37.39) plaisthos: the yubikey is a normal yubikey and you can put your gpg
or x509 keys on it
(15.37.45) ordex: ok
(15.38.02) dazo: I would prefer Yubikey 5 too, tbh
(15.38.13) mattock: I have a yubikey from 2-3 years ago which I have not
touched, I wonder if that's up-to-date enough...
(15.38.15) dazo: Much more versatile
(15.38.27) plaisthos: I have a yubikey but wouldn't mind having another newer
one for testing if we don't use all 5 slots %)
(15.38.45) plaisthos: mattock: depending on what you do and what revision it
might be just as well
(15.38.56) cron2: I'd like one too
(15.39.06) d12fk: me too
(15.39.20) d12fk: where do I need to apply for it?
(15.39.24) plaisthos: so selva, cron2, d12fk, ordex
(15.39.37) plaisthos: d12fk: I think one of us has to reply to the email and
request codes for them
(15.39.43) mattock: plaishos: ok, need to check it out, it's a shame its just
sitting in a box
(15.39.52) plaisthos: and those codes can then distribute to team members
(15.39.55) dazo: Lets see have an internal discussion with our management and
see if we can sponsor this to community developers
(15.40.11) plaisthos: d12fk: sponsor what?
(15.40.22) cron2: I like sponsoring :-) but isn't google sponsoring already?
(15.40.47) plaisthos: sponsering might be interesting if we end up with more
than 5 yubikeys we want
(15.41.16) plaisthos: then corp people can get them just reimbured via corp
while we can use the free codes with community developers
(15.41.52) mattock: +1
(15.41.58) dazo: cron2: Google gives the Titan, which has just U2F ... which is
only useful for web based auth ... if we put our PGP keys on this key, then git
signing gets hardened
(15.42.00) mattock: mine is a corp key
(15.42.23) dazo: yubikey has HOTP, U2F, PKCS#11 and a few more features
(15.42.51) dazo: via the Yubico Authenticator application you also get TOTP
(with the secret keys stored on the token)
(15.44.00) mattock: so free codes for community developers, buy stuff for corp
developers?
(15.44.05) plaisthos: I will write a reply saying that for us OpenVPN developer
the use of a singing card/pkcs11 makes the yubikeys more valuable and we would
therefore like to request 5 yubikeys
(15.44.40) plaisthos: and then give them to community developers who want them
and to corp devel if they need one too
(15.44.53) plaisthos: if we are short on codes/keys we just buy the extra ones
from corp
(15.45.22) cron2: *like*
(15.46.12) dazo: plaisthos: sounds good
(15.47.22) mattock: next topic?
(15.47.25) mattock: New default for MSSFIX in patch set
(15.49.22) plaisthos: just copyring form the topics:
(15.49.25) plaisthos: New default for MSSFIX in patch set
(15.49.25) plaisthos: current default is 1450, which translates to 1478 packets
for udp4 and 1498 for udp6
(15.49.28) plaisthos: proposal have a new default based on the outer size (mtu
as new option)
(15.49.31) plaisthos: Idea for new default: 1472 (1500 - one extra IPv4/UDP
header) or 1452 (1500 - one extra IPv6/UDP header) so we have good chance to
work if tunneled ourselves.
(15.49.34) plaisthos: Datapoint: Wireguard uses mtu 1420 as default, which
assumes that it can use 1500 on the outer packets with IPv6 and 1480 with IPv4.
(15.49.56) ordex: ovpn-dco does something similar
(15.50.08) cron2: read that, but I'm not sure why we want to change the default
mssfix setting
(15.50.21) plaisthos: cron2: why not?
(15.50.22) cron2: I have no specific opinion, just wanting to understand the
reasoning
(15.50.32) plaisthos: current default is 1450, which translates to 1478 packets
for udp4 and 1498 for udp6
(15.51.18) plaisthos: 2 byte for IPv6 is just weird and having ipv4 and ipv6
enacapsulation different might be also weird
(15.51.26) cron2: which is a bit high for UDP6 to pass 1492, so changing this
is not a bad idea
(15.51.53) cron2: so I'd go for "default max outer packet size = 1492"
(15.52.40) lev__: for ovpn-dco-win I had to set tun mtu to 1428 to accommodate
for the worst cast overhead
(15.53.23) plaisthos: lev__: this is currently just about the mssfix vlaue
(15.53.31) plaisthos: default mtu is much more complex and complicated
(15.54.10) lev__: crypto overhead 24, udp 8, ipv6 40
(15.55.09) plaisthos: setting mtu to something other than 1500 on just one side
unfortunately breaks things in different ways
(15.56.19) cron2: mtu is a different bag of worms
(15.56.25) cron2: let's fish mssfix first :-)
(15.58.18) plaisthos: okay I will add a patch my patchset that sets the new
default to be mssfix 1492 mtu
(16.04.29) mattock: meeting concluded I assume?
(16.04.45) cron2: I disappear into the next meeting...
(16.04.59) dazo: c ya'll
(16.05.37) mattock: ok see you
(16.05.55) mattock: I'll copy and paste this log into safety and wrap up the
summary tomorrow morning (no time now)
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel