[Openvpn-devel] [PATCH v3] Delete the IPv6 route to the "connected" network on tun close

2018-03-01 Thread selva . nair
From: Selva Nair 

This was missing on Windows when interactive service is in use.

v3: Mar 1, 2017: avoid code repetition and rebase to master

Signed-off-by: Selva Nair 
---
 src/openvpn/tun.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/src/openvpn/tun.c b/src/openvpn/tun.c
index 9f3b98d..263cacd 100644
--- a/src/openvpn/tun.c
+++ b/src/openvpn/tun.c
@@ -6185,6 +6185,9 @@ close_tun(struct tuntap *tt)
 {
 if (tt->did_ifconfig_ipv6_setup)
 {
+/* remove route pointing to interface */
+delete_route_connected_v6_net(tt, NULL);
+
 if (tt->options.msg_channel)
 {
 do_address_service(false, AF_INET6, tt);
@@ -6198,9 +6201,6 @@ close_tun(struct tuntap *tt)
 const char *ifconfig_ipv6_local;
 struct argv argv = argv_new();
 
-/* remove route pointing to interface */
-delete_route_connected_v6_net(tt, NULL);
-
 /* "store=active" is needed in Windows 8(.1) to delete the
  * address we added (pointed out by Cedric Tabary).
  */
-- 
2.6.2


--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel


Re: [Openvpn-devel] Fwd: [PATCH] Delete the IPv6 route to the "connected" network on tun close

2018-03-01 Thread Selva Nair
Hi,

On Thu, Mar 1, 2018 at 12:51 PM, Gert Doering  wrote:
> Hi,
>
> On Thu, Mar 01, 2018 at 11:09:32AM -0500, Selva Nair wrote:
>> This one is too old to cleanly apply, but still sending again
>> just to get it into patchwork.
>
> Oh, completely fell of my radar.  But now that you mention it, yes,
> there was something about clearing bits :-)
>
>> (For some reason bouncing to patchwork somehow never works for me, else
>> this could have beaten the oldest pending patch record :)
>
> Bouncing my own usually works, bouncing others "sometimes".  Might be
> related to SPF records and/or DKIM/DMARC checks...

One difference is that I'm bouncing @gmail.com mails using mutt. But
its sending through gmail's smtp server, so shouldn't raise any red
flags. And DKIM/SPF failures should be even worse for mails send
through the list. Probably sourceforge.net is whitelisted in
patchwork... Anyway, I can live with it.

>
> [..]
>> This was missing on Windows when interactive service is in use.
>>
>> - Added route_ipv6_clear_host_bits(r6) to delete_route_ipv6: this is
>>   required for Windows IP-helper API. Won't hurt other platforms (?)
>>
>> Signed-off-by: Selva Nair 
>> ---
>>  src/openvpn/route.c | 2 ++
>>  src/openvpn/tun.c   | 3 +++
>>  2 files changed, 5 insertions(+)
>>
>> diff --git a/src/openvpn/route.c b/src/openvpn/route.c
>> index fec12c1..85f969e 100644
>> --- a/src/openvpn/route.c
>> +++ b/src/openvpn/route.c
>> @@ -2124,6 +2124,8 @@ delete_route_ipv6 (const struct route_ipv6 *r6,
>> const struct tuntap *tt, unsigne
>>
>>gc_init ();
>>
>> +  route_ipv6_clear_host_bits (r6);
>> +
>
> This is no longer needed, as the clearing is done in
>
>   delete_route_connected_v6_net()
>
> now (2cea72005cb5a825c).
>
>> diff --git a/src/openvpn/tun.c b/src/openvpn/tun.c
>> index 560b1a8..40ce202 100644
>> --- a/src/openvpn/tun.c
>> +++ b/src/openvpn/tun.c
>> @@ -5663,6 +5663,9 @@ close_tun (struct tuntap *tt)
>>  {
>>if (tt->options.msg_channel)
>>  {
>> +  /* remove route pointing to interface */
>> +  delete_route_connected_v6_net(tt, NULL);
>> +
>>do_address_service (false, AF_INET6, tt);
>>   if (tt->options.dns6_len > 0)
>>   do_dns6_service (false, tt);
>
> So this part remains, but to avoid code duplication I'd move the
> "delete_route_connected_v6_net()" call from the else() branch up
> and before the if (tt->options.msg_channel) clause.

Good point. A new version was unavoidable because of the recent
clear_host_bits fix and uncrustify changes.

Actually there was an old v2 but no longer required. So v3 is coming.

> Looking at the context, this patch is amazingly old... "before the
> code reorganization", so it somehow missed 2.4.0...
> thanks for bringing it back :-)

Trying to delete old local branches. There are two other ones which
need David's attention but it seems he is too busy and no one else
would touch plugins code :)

Selva

--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel


Re: [Openvpn-devel] tls fix for upcoming 2.4.5

2018-03-01 Thread Selva Nair
Hi,


>
>> --- openvpn-2.4.5/src/openvpn/openssl_compat.h.orig 2018-02-28 
>> 21:56:54.0 +0100
>> +++ openvpn-2.4.5/src/openvpn/openssl_compat.h 2018-03-01 11:44:57.0 
>> +0100
>> @@ -672,14 +672,18 @@
>>  {
>>  return TLS1_VERSION;
>>  }
>> +#ifdef SSL_OP_NO_TLSv1_1
>>  if (!(sslopt & SSL_OP_NO_TLSv1_1))
>>  {
>>  return TLS1_1_VERSION;
>>  }
>> +#endif
>> +#ifdef SSL_OP_NO_TLSv1_2
>>  if (!(sslopt & SSL_OP_NO_TLSv1_2))
>>  {
>>  return TLS1_2_VERSION;
>>  }
>> +#endif
>>  return 0;
>>  }
>>
>> #endif /* SSL_CTX_get_min_proto_version */
>
> These ifdefs are needed for older openssl (e.g., 0.9.8), but how did we miss 
> it?
>
> Turns out commit 2d705accea3e538a555631ef7c39eb4bc4fd4acf cherry-picked
> from f8a92a4393a was not fully ripe..
>
> As we do not support Windows build using pre 1.0 openssl, this is the
> only change needed. So ACK, assuming a commit message and Author: may
> be slapped on during merge.
>
> Acked-by: Selva Nair 

Forgot to add: 2.4 only.  Master is good as is.

Selva

--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel


Re: [Openvpn-devel] Fwd: [PATCH] Delete the IPv6 route to the "connected" network on tun close

2018-03-01 Thread Gert Doering
Hi,

On Thu, Mar 01, 2018 at 11:09:32AM -0500, Selva Nair wrote:
> This one is too old to cleanly apply, but still sending again
> just to get it into patchwork.

Oh, completely fell of my radar.  But now that you mention it, yes, 
there was something about clearing bits :-)

> (For some reason bouncing to patchwork somehow never works for me, else
> this could have beaten the oldest pending patch record :)

Bouncing my own usually works, bouncing others "sometimes".  Might be
related to SPF records and/or DKIM/DMARC checks...

[..]
> This was missing on Windows when interactive service is in use.
> 
> - Added route_ipv6_clear_host_bits(r6) to delete_route_ipv6: this is
>   required for Windows IP-helper API. Won't hurt other platforms (?)
> 
> Signed-off-by: Selva Nair 
> ---
>  src/openvpn/route.c | 2 ++
>  src/openvpn/tun.c   | 3 +++
>  2 files changed, 5 insertions(+)
> 
> diff --git a/src/openvpn/route.c b/src/openvpn/route.c
> index fec12c1..85f969e 100644
> --- a/src/openvpn/route.c
> +++ b/src/openvpn/route.c
> @@ -2124,6 +2124,8 @@ delete_route_ipv6 (const struct route_ipv6 *r6,
> const struct tuntap *tt, unsigne
> 
>gc_init ();
> 
> +  route_ipv6_clear_host_bits (r6);
> +

This is no longer needed, as the clearing is done in

  delete_route_connected_v6_net()

now (2cea72005cb5a825c).

> diff --git a/src/openvpn/tun.c b/src/openvpn/tun.c
> index 560b1a8..40ce202 100644
> --- a/src/openvpn/tun.c
> +++ b/src/openvpn/tun.c
> @@ -5663,6 +5663,9 @@ close_tun (struct tuntap *tt)
>  {
>if (tt->options.msg_channel)
>  {
> +  /* remove route pointing to interface */
> +  delete_route_connected_v6_net(tt, NULL);
> +
>do_address_service (false, AF_INET6, tt);
>   if (tt->options.dns6_len > 0)
>   do_dns6_service (false, tt);

So this part remains, but to avoid code duplication I'd move the
"delete_route_connected_v6_net()" call from the else() branch up 
and before the if (tt->options.msg_channel) clause.

(I'm not adamant on it, though - leaving it there is "all we do is 
in one place").

Looking at the context, this patch is amazingly old... "before the
code reorganization", so it somehow missed 2.4.0...

thanks for bringing it back :-)

gert

-- 
now what should I write here...

Gert Doering - Munich, Germany g...@greenie.muc.de


signature.asc
Description: PGP signature
--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel


[Openvpn-devel] OpenVPN 2.4.5 released

2018-03-01 Thread Samuli Seppänen
The OpenVPN community project team is proud to release OpenVPN 2.4.5. It
can be downloaded from here:



This release includes a large number of fixes and enhancements. One of
the biggest changes is that 2.4.5 Windows installers bundle OpenSSL
1.1.0 instead of OpenSSL 1.0.2 by default. The Windows installer also
comes with OpenVPN GUI (11.10.0.0) that has a large number of fixes and
improvements. Some easy-rsa 2 fixes are also included.

Please note that LibreSSL is not a supported crypto backend. We accept
patches and we do test on OpenBSD 6.0 which comes with LibreSSL, but if
newer versions of LibreSSL break API compatibility we do not take
responsibility to fix that.

Also note that  Windows installers have been built with NSIS version
that has been patched against several NSIS installer code execution and
privilege escalation problems:



Based on our testing, though, older Windows versions such as Windows 7
might not benefit from these fixes. We thus strongly encourage you to
always move NSIS installers to a non-user-writeable location before
running them. Our long-term plan is to migrate to using MSI installers
instead.

A summary of all included changes is available here:



A full list of changes is available here:



Compared to OpenVPN 2.3 this is a major update with a large number of
new features, improvements and fixes. Some of the major features are
AEAD (GCM) cipher and Elliptic Curve DH key exchange support, improved
IPv4/IPv6 dual stack support and more seamless connection migration when
client's IP address changes (Peer-ID). Also, the new --tls-crypt feature
can be used to increase users' connection privacy.

OpenVPN GUI bundled with the Windows installer has a large number of new
features compared to the one bundled with OpenVPN 2.3. One of major
features is the ability to run OpenVPN GUI without administrator privileges.

For full details, look here:



The new OpenVPN GUI features are documented here:



Please note that OpenVPN 2.4 installers will not work on Windows XP.

For generic help use these support channels:

Official documentation:

Wiki: 
Forums: 
User mailing list: 
User IRC channel: #openvpn at irc.freenode.net

Please report bugs and ask development questions here:

Bug tracker and wiki: 
Developer mailing list: 
Developer IRC channel: #openvpn-devel at irc.freenode.net (requires
Freenode registration)

-- 
Samuli Seppänen
Community Manager
OpenVPN Technologies, Inc

irc freenode net: mattock

Antonio Quartulli (4):
  reload HTTP proxy credentials when moving to the next connection profile
  Allow learning iroutes with network made up of all 0s (only if netbits < 
8)
  mbedtls: fix typ0 in comment
  manpage: fix simple typ0

Arne Schwabe (2):
  Treat dhcp-option DNS6 and DNS identical
  show the right string for key-direction

Bertrand Bonnefoy-Claudet (1):
  Fix typo in error message: "optione" -> "option"

David Sommerseth (8):
  lz4: Fix confused version check
  lz4: Fix broken builds when pkg-config is not present but system library 
is
  Remove references to keychain-mcd in Changes.rst
  lz4: Rebase compat-lz4 against upstream v1.7.5
  systemd: Add and ship README.systemd
  Update copyright to include 2018 plus company name change
  man: Add .TQ groff support macro
  man: Reword --management to prefer unix sockets over TCP

Emmanuel Deloget (1):
  OpenSSL: check EVP_PKEY key types before returning the pkey

Gert Doering (3):
  Remove warning on pushed tun-ipv6 option.
  Fix removal of on-link prefix on windows with netsh
  Preparing for release v2.4.5 (ChangeLog, version.m4, Changes.rst)

Ilya Shipitsin (2):
  travis-ci: add brew cache, remove ccache
  travis-ci: modify openssl build script to support openssl-1.1.0

James Bottomley (1):
  autoconf: Fix engine checks for openssl 1.1

Jeremie Courreges-Anglas (2):
  Cast time_t to long long in order to print it.
  Fix build with LibreSSL

Selva Nair (14):
  Check whether in pull_mode before warning about previous connection blocks
  Avoid illegal memory access when malformed data is read from the pipe
  Fix missing check for return value of malloc'd buffer
  Return NULL if GetAdaptersInfo fails
  Use RSA_meth_free instead of free
  Bring cryptoapi.c upto speed with openssl 1.1
  Add SSL_CTX_get_max_proto_version() not 

[Openvpn-devel] Fwd: [PATCH] Delete the IPv6 route to the "connected" network on tun close

2018-03-01 Thread Selva Nair
This one is too old to cleanly apply, but still sending again
just to get it into patchwork.
(For some reason bouncing to patchwork somehow never works for me, else
this could have beaten the oldest pending patch record :)

-- Forwarded message --
From: Selva Nair 
Date: Thu, Nov 24, 2016 at 4:19 PM
Subject: [PATCH] Delete the IPv6 route to the "connected" network on tun close
To: openvpn-devel@lists.sourceforge.net
Cc: Selva Nair 


This was missing on Windows when interactive service is in use.

- Added route_ipv6_clear_host_bits(r6) to delete_route_ipv6: this is
  required for Windows IP-helper API. Won't hurt other platforms (?)

Signed-off-by: Selva Nair 
---
 src/openvpn/route.c | 2 ++
 src/openvpn/tun.c   | 3 +++
 2 files changed, 5 insertions(+)

diff --git a/src/openvpn/route.c b/src/openvpn/route.c
index fec12c1..85f969e 100644
--- a/src/openvpn/route.c
+++ b/src/openvpn/route.c
@@ -2124,6 +2124,8 @@ delete_route_ipv6 (const struct route_ipv6 *r6,
const struct tuntap *tt, unsigne

   gc_init ();

+  route_ipv6_clear_host_bits (r6);
+
   network = print_in6_addr( r6->network, 0, );
   gateway = print_in6_addr( r6->gateway, 0, );

diff --git a/src/openvpn/tun.c b/src/openvpn/tun.c
index 560b1a8..40ce202 100644
--- a/src/openvpn/tun.c
+++ b/src/openvpn/tun.c
@@ -5663,6 +5663,9 @@ close_tun (struct tuntap *tt)
 {
   if (tt->options.msg_channel)
 {
+  /* remove route pointing to interface */
+  delete_route_connected_v6_net(tt, NULL);
+
   do_address_service (false, AF_INET6, tt);
  if (tt->options.dns6_len > 0)
  do_dns6_service (false, tt);
--
2.1.4

--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel


Re: [Openvpn-devel] tls fix for upcoming 2.4.5

2018-03-01 Thread Selva Nair
On Thu, Mar 1, 2018 at 6:14 AM, Simon Matter  wrote:
> Hi,
>
> I've just done some test builds with 2.4.5 tagged version.
>
> Attached patch makes it build with older systems. Do you see any issue
> with the change?

.. from the attachment

> --- openvpn-2.4.5/src/openvpn/openssl_compat.h.orig 2018-02-28 
> 21:56:54.0 +0100
> +++ openvpn-2.4.5/src/openvpn/openssl_compat.h 2018-03-01 11:44:57.0 
> +0100
> @@ -672,14 +672,18 @@
>  {
>  return TLS1_VERSION;
>  }
> +#ifdef SSL_OP_NO_TLSv1_1
>  if (!(sslopt & SSL_OP_NO_TLSv1_1))
>  {
>  return TLS1_1_VERSION;
>  }
> +#endif
> +#ifdef SSL_OP_NO_TLSv1_2
>  if (!(sslopt & SSL_OP_NO_TLSv1_2))
>  {
>  return TLS1_2_VERSION;
>  }
> +#endif
>  return 0;
>  }
>
> #endif /* SSL_CTX_get_min_proto_version */

These ifdefs are needed for older openssl (e.g., 0.9.8), but how did we miss it?

Turns out commit 2d705accea3e538a555631ef7c39eb4bc4fd4acf cherry-picked
from f8a92a4393a was not fully ripe..

As we do not support Windows build using pre 1.0 openssl, this is the
only change needed. So ACK, assuming a commit message and Author: may
be slapped on during merge.

Acked-by: Selva Nair 

Selva

--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel


Re: [Openvpn-devel] tls fix for upcoming 2.4.5

2018-03-01 Thread Gert Doering
Hi,

On Thu, Mar 01, 2018 at 12:14:06PM +0100, Simon Matter wrote:
> I've just done some test builds with 2.4.5 tagged version.
> 
> Attached patch makes it build with older systems. Do you see any issue
> with the change?

As a side note: this won't make 2.4.5 release, which is already "mostly
done" (things are built, release announcement coming) - but if it's
needed I see no issue with having it in 2.4.6, and release that "quicker
than only in 5 month time" :-)

gert
-- 
now what should I write here...

Gert Doering - Munich, Germany g...@greenie.muc.de


signature.asc
Description: PGP signature
--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel


Re: [Openvpn-devel] tls fix for upcoming 2.4.5

2018-03-01 Thread Gert Doering
Hi,

On Thu, Mar 01, 2018 at 12:14:06PM +0100, Simon Matter wrote:
> I've just done some test builds with 2.4.5 tagged version.
> 
> Attached patch makes it build with older systems. Do you see any issue
> with the change?

Which SSL library version needs this?

(I thought we have test systems for everything we officially support, plus
a few more to catch avoidable LibreSSL breakage etc)

gert

-- 
now what should I write here...

Gert Doering - Munich, Germany g...@greenie.muc.de


signature.asc
Description: PGP signature
--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel


[Openvpn-devel] tls fix for upcoming 2.4.5

2018-03-01 Thread Simon Matter
Hi,

I've just done some test builds with 2.4.5 tagged version.

Attached patch makes it build with older systems. Do you see any issue
with the change?

Regards,
Simon--- openvpn-2.4.5/src/openvpn/openssl_compat.h.orig	2018-02-28 21:56:54.0 +0100
+++ openvpn-2.4.5/src/openvpn/openssl_compat.h	2018-03-01 11:44:57.0 +0100
@@ -672,14 +672,18 @@
 {
 return TLS1_VERSION;
 }
+#ifdef SSL_OP_NO_TLSv1_1
 if (!(sslopt & SSL_OP_NO_TLSv1_1))
 {
 return TLS1_1_VERSION;
 }
+#endif
+#ifdef SSL_OP_NO_TLSv1_2
 if (!(sslopt & SSL_OP_NO_TLSv1_2))
 {
 return TLS1_2_VERSION;
 }
+#endif
 return 0;
 }
 #endif /* SSL_CTX_get_min_proto_version */--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel


[Openvpn-devel] 2.4.5 typo in ChangeLog file

2018-03-01 Thread Gert Doering
Hi,

most of the 2.4.5 release is fine and well tested, but one typo managed
to sneak into the "ChangeLog" file - it talks "2.4.4" release, with
the proper timestamp.

As the commit has been tagged and the tag pushed, fixing this will 
break git repos of people that have already pulled - and the common
wisdom is "DO NOT DO THAT!".  It's not an emergency breakage which 
might warrant "skip 2.4.5 then, and re-tag everything as 2.4.6".

Thus, I'm just going to apply (+PGP-sign) the following patch to the
release/2.4 tree, so the ChangeLog is factually correct now - even if
it won't change the shipping tarballs.

Sorry.

gert

-- 
now what should I write here...

Gert Doering - Munich, Germany g...@greenie.muc.de
From 161afbebdc2b7e244a136182a676ad55347c9cf5 Mon Sep 17 00:00:00 2001
From: Gert Doering 
Date: Thu, 1 Mar 2018 10:11:08 +0100
Subject: [PATCH] Correct version in ChangeLog - should be 2.4.5, was mistyped
 as 2.4.4

Signed-off-by: Gert Doering 
---
 ChangeLog | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/ChangeLog b/ChangeLog
index 99772a33..0db3e5b8 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,7 +1,7 @@
 OpenVPN Change Log
 Copyright (C) 2002-2018 OpenVPN Inc 
 
-2018.02.28 -- Version 2.4.4
+2018.02.28 -- Version 2.4.5
 Antonio Quartulli (4):
   reload HTTP proxy credentials when moving to the next connection profile
   Allow learning iroutes with network made up of all 0s (only if netbits < 8)
-- 
2.16.1



signature.asc
Description: PGP signature
--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel


Re: [Openvpn-devel] [PATCH] Add a warning that we do not officially support LibreSSL

2018-03-01 Thread Steffan Karger
[resending because the list rejected my mail from yesterday...]

On 1 March 2018 at 00:11, Steffan Karger  wrote:
> +msg(M_WARN, "WARNING: This OpenVPN was built against LibreSSL. "
> +"This might work, but is *not* supported and can break at any time.")

Gah, this of course needs a ; at the end of the line - forgot to amend
the commit before git send-email...

-Steffan

--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel


[Openvpn-devel] [PATCH applied] Re: management: Warn if TCP port is used without password

2018-03-01 Thread Gert Doering
Your patch has been applied to the master and release/2.4 branch.

commit 4db7715a3aa62f2e8d8234c1852fb141f62318e2 (master)
commit ab218befec67dc0f5bb08973d2ec3476350f9ab3 (release/2.4)
Author: David Sommerseth
Date:   Wed Feb 28 14:19:18 2018 +0100

 management: Warn if TCP port is used without password

 Signed-off-by: David Sommerseth 
 Acked-by: Gert Doering 
 Message-Id: <20180228131918.12954-3-dav...@openvpn.net>
 URL: 
https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg16574.html
 Signed-off-by: Gert Doering 


--
kind regards,

Gert Doering


--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
___
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel