Re: [Openvpn-devel] --tls-verify runs twice for a single cert in Peer-fingerprint mode

2021-05-24 Thread Selva Nair
s, imo. This was not required in the past when we used to call the script only when openssl verify has succeeded. Selva ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

[Openvpn-devel] [PATCH] Do not require CA when peer-fingerprint is used

2021-05-24 Thread selva . nair
From: Selva Nair Fix --ca or --ca-path check when --pkcs11-id or --cryptoapicert is used with --peer-fingerprint. The multiple --ca or --capath checks are consolidated into a function Signed-off-by: Selva Nair --- src/openvpn/options.c | 44 ++- 1 file

Re: [Openvpn-devel] --tls-verify runs twice for a single cert in Peer-fingerprint mode

2021-05-24 Thread Selva Nair
ould export the verification error-status to the env so that the script could make a more informed decision. Our internal callback is not meant to be executed multiple times with same depth, but the side effects appear to be benign -- like repeated VERIFY OK in the logs. Selva

[Openvpn-devel] [PATCH 3/3] Print format spec changes for tapctl and openvpnmscia

2021-05-21 Thread selva . nair
From: Selva Nair The tapctl and openvpnmscia codebase is written with an intent of supporting both unicode and ansi builds. This patch does not attempt to change that although non-unicode support looks untested and buggy. The main change is to replace %s by PRIsLPTSR that is defined as %ls

[Openvpn-devel] [PATCH 1/3] Make it explicit that WIndows build requires UNICODE support

2021-05-21 Thread selva . nair
From: Selva Nair The interactive service code implicitly treats TCHAR == WCHAR in several places with the assumption that we build only with UNICODE defined. Make this explicit and remove some redundant code. Also replace openvpn_sntprintf(), _tprintf() and similar with explicit wide string

[Openvpn-devel] [PATCH 2/3] Use C standard compliant format specs in wprintf functions

2021-05-21 Thread selva . nair
From: Selva Nair - Use %ls for wchar_t * and %hs for char * variables This makes it possible to build correctly with or without __USE_MINGW_ANIS_STDIO defined. When this define is not used all printf/scanf family functions are resolved from the windows runtime MSVCRT. Newer (since version 8

Re: [Openvpn-devel] [PATCH v2 2/2] Add detailed man page section to setup a OpenVPN setup with peer-fingerprint

2021-05-20 Thread Selva Nair
ame for cert and key. In practice I prefer .crt and .key as they are generally understood as PEM encoded, and allow the same filename stub to be used for both cert and key files: like server.crt and server.key while with pem it will have to be something like server-cert.

Re: [Openvpn-devel] [PATCH v3] Ignore leading whitespace and comment lines for peer-fingerprint.

2021-05-19 Thread Selva Nair
Hi On Wed, May 19, 2021 at 9:35 AM Gert Doering wrote: > > Inline peer-fingerprint blocks can benefit from a bit of structuring > by indentation or by putting comments ("# this is Alice's key"). > > v2: accept ';' and '#' as comment delimiter. Fix tab-indent. > v3: we want == > > Signed-off-by:

Re: [Openvpn-devel] [PATCH v2] Ignore leading whitespace and comment lines for peer-fingerprint.

2021-05-19 Thread Selva Nair
(line) == 0) > +/* ignore leading whitespace */ > +while(isspace(*line)) > +{ > +line++; > +} > +/* skip empty lines and comment lines */ > +if (strlen(line) == 0 || *line == '#' || *line = ';') We want == :) Selva _

Re: [Openvpn-devel] [PATCH] Ignore leading whitespace and comment lines for peer-fingerprint.

2021-05-18 Thread Selva Nair
{ > + line++; > + } > +/* skip empty lines and comment lines */ > +if (strlen(line) == 0 || *line == '#') As we support two comment characters ('#' and ';'), would be better to do the same here too. One could relax the req

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify environment

2021-05-10 Thread Selva Nair
y downside. And, on Windows it's a pain to get the parent pid from a batch file. Personally, I do not have a use case though. Selva ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

[Openvpn-devel] [PATCH v2] Allow PKCS#11 uri to be used as --cert and --key file names

2021-05-09 Thread selva . nair
From: Selva Nair v2 changes - do not allow so-path embedded in cert and key uri - add --pkcs11-engine option to optionally specify the engine and provider module to use If either --cert or --key is specified as a PKCS#11 uri, try to load the certificate and key from any accessible

Re: [Openvpn-devel] [PATCH] Allow PKCS#11 uri to be used as --cert and --key file names

2021-05-06 Thread Selva Nair
Hi, On Thu, May 6, 2021 at 6:12 AM Jan Just Keijser wrote: > > Hi Selva, > > Maybe I'll have to resurrect that idea or require --script-security 2 > > for this? In either case the core code will stay the same -- will wait > > for a review and/or more comments

Re: [Openvpn-devel] [PATCH] Allow PKCS#11 uri to be used as --cert and --key file names

2021-05-05 Thread Selva Nair
Hi JJK, On Wed, May 5, 2021 at 4:00 AM Jan Just Keijser wrote: > > Hi Selva, > > On 05/05/21 07:18, selva.n...@gmail.com wrote: > > From: Selva Nair > > > > If either --cert or --key is specified as a PKCS#11 uri, try to > > load the certificate and ke

[Openvpn-devel] [PATCH] Allow PKCS#11 uri to be used as --cert and --key file names

2021-05-04 Thread selva . nair
From: Selva Nair If either --cert or --key is specified as a PKCS#11 uri, try to load the certificate and key from any accessible PKCS#11 device. This does not require linking with any pkcs11 library, but needs pkcs11 engine to be available on the target machine. In its simplest form, just have

Re: [Openvpn-devel] [PATCH] Add daemon_pid to --tls-crypt-v2-verify environment

2021-05-04 Thread Selva Nair
data is > > --tls-crypt-v2-verify > > (And probably --learn-address but I have not tested that). > > > > Due to the inordinate resistance this patch has received, consider this my > official > withdrawal. I hereby NACK. Resistance is a good thing -- it means people are considering your patch seriously and are asking questions in earnest. I've had patches that languished for years and finally merged, without batting an eye.. Except for an occasional gentle nudge (say once a year), and some patience. Selva ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

[Openvpn-devel] Adding RSA-PSS support in pkcs11-helper

2021-05-02 Thread Selva Nair
, are most welcome. Thanks, Selva ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH] tapctl: support for ovpn-dco Windows driver

2021-04-25 Thread Selva Nair
Hi, On Wed, Apr 21, 2021 at 4:02 AM Lev Stipakov wrote: > From: Lev Stipakov > > Make tapctl aware of ovpn-dco. > > Signed-off-by: Lev Stipakov > --- > src/tapctl/main.c | 13 +++-- > 1 file changed, 7 insertions(+), 6 deletions(-) > > diff --git a/src/tapctl/main.c

[Openvpn-devel] Fwd: [PATCH] tapctl: support for ovpn-dco Windows driver

2021-04-25 Thread Selva Nair
(sourceforge seems to be refusing to accept mail from me.. sending again) Hi, On Wed, Apr 21, 2021 at 4:02 AM Lev Stipakov wrote: > From: Lev Stipakov > > Make tapctl aware of ovpn-dco. > > Signed-off-by: Lev Stipakov > --- > src/tapctl/main.c | 13 +++-- > 1 file changed, 7

[Openvpn-devel] [PATCH] tun.c on WIN32: remove more unused variables

2021-04-03 Thread selva . nair
From: Selva Nair Fixes: tun.c: In function ‘do_ifconfig_ipv4’: tun.c:1217:17: warning: variable ‘ifconfig_remote_netmask’ set but not used [-Wunused-but-set-variable] const char *ifconfig_remote_netmask = NULL; tun.c:1213:10: warning: unused variable ‘tun’ [-Wunused-variable

Re: [Openvpn-devel] [PATCH] tun.c: remove unused variable

2021-04-03 Thread Selva Nair
Hi On Sat, Apr 3, 2021 at 12:01 PM Antonio Quartulli wrote: > > From: Antonio Quartulli > > Signed-off-by: Antonio Quartulli > --- > src/openvpn/tun.c | 1 - > 1 file changed, 1 deletion(-) > > diff --git a/src/openvpn/tun.c b/src/openvpn/tun.c > index 6b7c8ef1..60a3a179 100644 > ---

[Openvpn-devel] [PATCH] Remove automatic service

2021-03-28 Thread selva . nair
From: Selva Nair This has been replaced by openvpnserv2 since 2.4.0 and we have stopped setting up this service in the installer since 2.5.0. Get rid of the unused code. The mechanics of supporting multiple services with the same executable is retained for possible future use. For backwards

Re: [Openvpn-devel] [PATCH applied] Re: Require at least 100MB of mlock()-able memory if --mlock is used.

2021-03-11 Thread Selva Nair
Hi, On Thu, Mar 11, 2021 at 12:24 PM Gert Doering wrote: > Thanks, Selva. > > v3 has actually been buildbot-tested on all the platforms (I tested > v2 after the ACK, and it failed OpenSolaris, so I grumbled and adjusted > the #ifdef's...). It has been "tested for real&

Re: [Openvpn-devel] [PATCH v2] Require at least 100MB of mlock()-able memory if --mlock is used.

2021-03-09 Thread Selva Nair
(MCL_CURRENT | MCL_FUTURE)) > { > msg(M_WARN | M_ERRNO, "WARNING: mlockall call failed"); > diff --git a/src/openvpn/platform.h b/src/openvpn/platform.h > index 01f3200c..02c23e38 100644 > --- a/src/openvpn/platform.h > +++ b/src/openvpn/platform.h > @@ -4

Re: [Openvpn-devel] [PATCH] Require at least 20MB of mlock()-able memory if --mlock is used.

2021-03-07 Thread Selva Nair
Hi, On Sun, Mar 7, 2021 at 1:44 PM Gert Doering wrote: > Hi, > > On Sun, Mar 07, 2021 at 01:36:03PM -0500, Selva Nair wrote: > > > "I'm not sure", TBH. rlimit handling in unix is a bit of an unknown > > > territory for me. > > > > > > Wh

Re: [Openvpn-devel] [PATCH] Require at least 20MB of mlock()-able memory if --mlock is used.

2021-03-07 Thread Selva Nair
On Sun, Mar 7, 2021 at 1:10 PM Gert Doering wrote: > Hi, > > thanks for the review. > > On Sun, Mar 07, 2021 at 12:22:32PM -0500, Selva Nair wrote: > > On Sun, Mar 7, 2021 at 11:31 AM Gert Doering > wrote: > > > > > If --mlock is used, the amou

Re: [Openvpn-devel] [PATCH] Require at least 20MB of mlock()-able memory if --mlock is used.

2021-03-07 Thread Selva Nair
crease > limit"); > Mbyte -> MB or megabytes > + } > +} > +#endif > + > if (mlockall(MCL_CURRENT | MCL_FUTURE)) > { > msg(M_WARN | M_ERRNO, "WARNING: mlockall call failed"); > diff --git a/src/openvpn/platform

Re: [Openvpn-devel] [Openvpn-devel/users] Debugging Windows based server scripts

2021-02-18 Thread Selva Nair
t /b (ii) move the script to a function and call it, redirecting o/p @echo off call :do_work >up_script.log 2>&1 exit /b :do_work @echo on @rem the original script follows.. @rem end of script @echo off exit /b Selva ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

[Openvpn-devel] [PATCH] Quote the domain name argument passed to the wmic command

2021-02-16 Thread selva . nair
From: Selva Nair It appears wmic needs domain names containing hyphens to be quoted. Trac #1375 Signed-off-by: Selva Nair --- src/openvpnserv/interactive.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/openvpnserv/interactive.c b/src/openvpnserv/interactive.c index

[Openvpn-devel] rfc: mingw and the interactive service code

2021-01-27 Thread Selva Nair
defined. AFICT, the only change required would be to replace %s and %S by %ls and %hs in some places -- mostly in interactive service, one instance in tun.c Any thoughts? I'm leaning towards option (ii). Selva ___ Openvpn-devel mailing list Openvpn-devel

Re: [Openvpn-devel] [PATCH v3] Document common uses of 'echo' directive, re-enable logging for 'echo'.

2021-01-18 Thread Selva Nair
driving the openvpn core via management interface. Which commands > exists and their syntax has so far been mostly undocumented. > > Condense the long and good discussion between Selva Nair and > Jonathan K. Bullard into doc/gui-notes.txt (initial draft from > Jonathan, comments from Sel

Re: [Openvpn-devel] [PATCH v2] Document common uses of 'echo' directive, re-enable logging for 'echo'.

2021-01-18 Thread Selva Nair
Hi, On Mon, Jan 18, 2021 at 8:17 AM Gert Doering wrote: > > There will be a v3, as I just added "Android: Planned" to all the > msg stuff. > > Selva, which GUI version will be "the one with msg support"? So I can > have this fixed as well. GUI is at 11.2

Re: [Openvpn-devel] is it possible to store saved password in tpm instead of registry ?

2021-01-13 Thread Selva Nair
and space permits, I see little point in putting it in TPM. DPAPI supports an app-specific salt, and we could have it wrapped by TPM to add some extra protection but I would be wary of inventing our own schemes like that. Storing the certificate private key in TPM makes sense. Selva On Wed, Jan

Re: [Openvpn-devel] [PATCH] Document common uses of 'echo' directive, re-enable logging for 'echo'.

2020-12-30 Thread Selva Nair
far been mostly undocumented. > > Condense the long and good discussion between Selva Nair and > Jonathan K. Bullard into doc/gui-notes.txt (initial draft from > Jonathan, comments from Selva and Arne), with a pointer added > to doc/management-notes.txt. > > See: > > > ht

Re: [Openvpn-devel] wanted: mechanism to send text messages to client

2020-12-25 Thread Selva Nair
Hi Thanks for the comments. On Fri, Dec 25, 2020 at 3:03 PM Gert Doering wrote: > Hi, > > On Sun, Dec 20, 2020 at 07:31:42PM -0500, Selva Nair wrote: > > Here is the link again. > > https://github.com/selvanair/openvpn-gui/releases/tag/v11-echo-msg > > I got no f

Re: [Openvpn-devel] wanted: mechanism to send text messages to client

2020-12-25 Thread Selva Nair
Hi, Merry Christmas! On Wed, Dec 23, 2020 at 6:15 AM Jan Just Keijser wrote: > On 21/12/20 18:22, Selva Nair wrote: > > > > On Mon, Dec 21, 2020 at 2:04 AM Gert Doering wrote: > >> Hi, >> >> On Sun, Dec 20, 2020 at 07:31:42PM -0500, Selva Nair wrote: &g

Re: [Openvpn-devel] wanted: mechanism to send text messages to client

2020-12-21 Thread Selva Nair
the client display this? > > > > (I admit that I'm neither an expert on AUTH_FAILED message, nor on > > "what is the client doing on variations of it", nor on "what *should* > > be the expected outcome?". Selva, Arne will know more). > > It is easy to a

Re: [Openvpn-devel] wanted: mechanism to send text messages to client

2020-12-21 Thread Selva Nair
On Mon, Dec 21, 2020 at 2:04 AM Gert Doering wrote: > Hi, > > On Sun, Dec 20, 2020 at 07:31:42PM -0500, Selva Nair wrote: > > I thought we already went through this when we discussed the proposed > "echo > > msg" in considerable detail 3 years ago. > &

Re: [Openvpn-devel] wanted: mechanism to send text messages to client

2020-12-20 Thread Selva Nair
A message to the user can be delivered in a useful fashion only if there is a UI. The core itself can only write the message to log which may not be seen in time, or to the console if one exists. And, IMO, any decent UI of openvpn should use the management interface -- almost all do (except

Re: [Openvpn-devel] wanted: mechanism to send text messages to client

2020-12-20 Thread Selva Nair
s/tag/v11-echo-msg IIRC, Jonathan had written up documentation for the proposed syntax. I don't have links to the relevant mails at hand, but should be in the archives. It may be best to resurrect that effort. Selva ___ Openvpn-devel mailing list Op

Re: [Openvpn-devel] [PATCH] Fix too early argv freeing when registering DNS

2020-12-15 Thread Selva Nair
g between ipconfig calls solves the problem. > > Oh! Yes, now with your patch, this is very obvious - there is a trac > ticket (so when I merge this, I'll add the trac ticket number to the > commit message) but it sort of puzzled Selva and me, because

Re: [Openvpn-devel] [PATCH 2/3] netsh: Clear existing IPv6 DNS servers before configuring new ones

2020-09-28 Thread Selva Nair
e overwritten unless explicitly asked for. At the same time, we do delete all addresses for v4 (not v6) while closing tun. But, if we want to ensure a clean state for the adapter, as argued here, we should be clearing current values regardless of whether new one's are being

[Openvpn-devel] [PATCH] Improve documentation of --username-as-common-name

2020-09-27 Thread selva . nair
From: Selva Nair Trac #1079 Signed-off-by: Selva Nair --- doc/man-sections/server-options.rst | 12 +--- 1 file changed, 9 insertions(+), 3 deletions(-) diff --git a/doc/man-sections/server-options.rst b/doc/man-sections/server-options.rst index c0b22a5..4b649b1 100644 --- a/doc/man

[Openvpn-devel] [PATCH v2] Set DNS Domain using iservice

2020-09-25 Thread selva . nair
From: Selva Nair Use wmic instead of directly editing the registry as the former does not take full effect unless the dns client service is restarted. Editing the registry appears to work erratically depending on whether its followed with a dchp renew or ipconfig /registerdns etc. DOMAIN

Re: [Openvpn-devel] [PATCH] Set DNS Domain using iservice

2020-09-25 Thread Selva Nair
ains comes from (unprivileged) client and might > not be NULL terminated. Shall we do something like > > msg->domains[sizeof(msg->domains) - 1] = '\0'; > > Same for interface_t::name. Or am I missing something? > My mistake. Will fix. Also our own safer strncpynt instead o

[Openvpn-devel] [PATCH] Set DNS Domain using iservice

2020-09-24 Thread selva . nair
From: Selva Nair Use wmic instead of directly editing the registry as the former does not take full effect unless the dns client service is restarted. Editing the registry appears to work erratically depending on whether its followed with a dchp renew or ipconfig /registerdns etc. DOMAIN

Re: [Openvpn-devel] [PATCH] Allow --dhcp-option in config file when windows-driver is wintun

2020-09-15 Thread Selva Nair
a user option. Default to dynamic or adaptive, automatically fail-over to alternate methods or change it internally as required for wintun etc. And work towards supporting more dhcp-options when dhcp is not possible -- using iservice, API, netsh etc. Selva

[Openvpn-devel] [PATCH] Allow --dhcp-option in config file when windows-driver is wintun

2020-09-14 Thread selva . nair
From: Selva Nair When wintun is in use we mutate ip_win32_type to NETSH and then complain that ip-win32 option should be dynamic or adaptive if any --dhcp-option directive is present in the config file. This causes a fatal error. How to reproduce: specify a --dhcp-option in the config

Re: [Openvpn-devel] problem with beta3 and wintun

2020-09-11 Thread Selva Nair
Hi On Fri, Sep 11, 2020 at 1:45 PM RafaeHil Gava wrote: > Hi Selva, > > I was wondering if it's possible to detect UAC during the installation. > What do you think? > There are many ways of running the GUI as admin and all involve some deliberate action on the part of the user.

Re: [Openvpn-devel] problem with beta3 and wintun

2020-09-11 Thread Selva Nair
uble updating some software by > > automated script and turning UAC off was required. > > > > After re-enabling UAC, wintun started normally. > > Cool, thanks for digging into this and reporting back. > > Selva, is there any reasonable way to detect this? Or do we just go > for

Re: [Openvpn-devel] [PATCH] Fix client's poor man NCP fallback

2020-09-10 Thread Selva Nair
Hi On Thu, Sep 10, 2020 at 3:10 AM Marvin Adeff wrote: > Selva, > > Please allow me to back up a moment and restate this: > 1. I installed the beta3 msi from the web site logged in as a user that > has admin privileges. But no elevation was used to install it, just > double

Re: [Openvpn-devel] [PATCH] Fix client's poor man NCP fallback

2020-09-09 Thread Selva Nair
Hi, On Thu, Sep 10, 2020 at 12:19 AM Marvin wrote: > Hi Selva, > > The GUI did not have this error unless run as administrator which you >> should not and will never work. > > So you are saying that if OpenVPN is installed by a user who has admin > privileges (as

Re: [Openvpn-devel] [PATCH] Fix client's poor man NCP fallback

2020-09-09 Thread Selva Nair
Hi On Wed, Sep 9, 2020 at 8:30 PM Marvin wrote: > Selva, > > Sorry for the wrong thread. I was replying to an earlier thread about > this same error on Beta1 and beta2. So i am a bit confused by your > statement that this error did not show up in earlier betas, because that's

Re: [Openvpn-devel] [PATCH] Fix client's poor man NCP fallback

2020-09-09 Thread Selva Nair
ror running from the command line as SYSTEM please check the logs to be sure its beta3. Selva ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

[Openvpn-devel] [PATCH] Add a remark on dropping privileges when --mlock is used

2020-09-09 Thread selva . nair
From: Selva Nair trac #1059 Signed-off-by: Selva Nair --- doc/man-sections/generic-options.rst | 7 +++ 1 file changed, 7 insertions(+) diff --git a/doc/man-sections/generic-options.rst b/doc/man-sections/generic-options.rst index a07fe7e..d5f0883 100644 --- a/doc/man-sections/generic

[Openvpn-devel] [PATCH] In tap.c use DiInstallDevice to install the driver on a new adapter

2020-09-03 Thread selva . nair
From: Selva Nair As reported in Trac 1321, additional adapter instalaltion by tapctl.exe fails to fully setup the device node (some registry keys missing, error in setapi.dev.log etc.). Although the exact cause of this failure is unclear, letting the Plug and Play subsystem handle

Re: [Openvpn-devel] On tap-windows6 adapter installation by tapctl.exe

2020-09-03 Thread Selva Nair
on runtime. I'll check those hard corners again and submit a patch soonish (hopefully today). Selva On Thu, Sep 3, 2020 at 8:11 AM Lev Stipakov wrote: > Hi, > > > > > As per setupapi.dev.log, it appears that step 4 (d) is failing with some > access error to the driver

[Openvpn-devel] On tap-windows6 adapter installation by tapctl.exe

2020-09-02 Thread Selva Nair
it with driver_info = NULL which will force the system to use the latest matching driver. That would also eliminate step 3 which is right now very inefficient, though not required to fix the problem at hand. If this sounds sane, I'll submit a patch. Selva ___ Openvpn

Re: [Openvpn-devel] [PATCH] openvpnmsica: make adapter renaming non-fatal

2020-09-02 Thread Selva Nair
oo. > > > Or, better, print a warning message saying the rename failed. > > Warning is printed inside tap_delete_adapter(). > tap_delete_adapter() is not called here. I was suggesting that if we do check the return value, let us also print a war

Re: [Openvpn-devel] [PATCH] openvpnmsica: make adapter renaming non-fatal

2020-09-02 Thread Selva Nair
toring the return value and add the comment. Or, better, print a warning message saying the rename failed. Selva > } > } > } > -- > 2.17.1 > > > > ___ > Openvpn

Re: [Openvpn-devel] [PATCH] openvpnmsica: remove adapter renaming

2020-09-02 Thread Selva Nair
Hi, I would suggest to keep this renaming but make it not fatal. A descriptive name is nice to have and we could even make the name configurable at some point in future. Selva On Wed, Sep 2, 2020 at 8:40 AM Lev Stipakov wrote: > From: Lev Stipakov > > Renaming doesn't work on some

Re: [Openvpn-devel] Help testing OpenVPN 2.5-beta2 driver installation?

2020-08-31 Thread Selva Nair
and probably used an elevated command prompt which will obviously lead to that behaviour. Selva ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] Help testing OpenVPN 2.5-beta2 driver installation?

2020-08-29 Thread Selva Nair
all of beta2 brings in all binaries dated Aug 27. Selva ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH 1/2] Send auth-fail messages to clients on renegotiation failures via auth-token or user-pass expiry

2020-08-24 Thread Selva Nair
On Mon, Aug 24, 2020 at 3:49 AM Eric Thorpe wrote: > Hi Selva, > > my suggestion would be to make > this conditional on MANAGEMNET_DEF_AUTH so that we can > then get it from session->opt->mda_context just as we do it when > auth is done via the management. In practice,

Re: [Openvpn-devel] [PATCH 1/2] Send auth-fail messages to clients on renegotiation failures via auth-token or user-pass expiry

2020-08-22 Thread Selva Nair
ode. I see no compelling reason for such fine-grained build options. A marginal increase in code size is of little consequence all but embedded devices which can continue to cope without this as they do now. Selva ___ Openvpn-devel mailing list Openvpn-dev

Re: [Openvpn-devel] [PATCH] tun.c: enable using wintun driver under SYSTEM

2020-08-21 Thread Selva Nair
Hi, On Wed, Aug 19, 2020 at 3:08 AM Lev Stipakov wrote: > From: Lev Stipakov > > Commit 6d19775a468 has removed SYSTEM elevation hack, > but introduced regression - inability to use wintun without interactive > service. > > Proceed with ring buffers registration even if iservice is unavailable

Re: [Openvpn-devel] 2.5-beta-1 Wintun requires SYSTEM privileges

2020-08-18 Thread Selva Nair
Hi On Tue, Aug 18, 2020 at 3:42 PM Gert Doering wrote: > Hi, > > On Tue, Aug 18, 2020 at 03:29:19PM -0400, Selva Nair wrote: > > > If you already have SYSTEM, accessing wintun from openvpn directly will > > > also work and should bring quite a bit of speed impro

Re: [Openvpn-devel] 2.5-beta-1 Wintun requires SYSTEM privileges

2020-08-18 Thread Selva Nair
starting openvpn. It will return you the PID of openvpn.exe which can be monitored. An advantage of this approach is that your service and openvpn.exe can run with limited privileges like LOCAL SERVICE or a dedicated openvpn service user. That said, I don't know anyone who has tested such a

Re: [Openvpn-devel] 2.5-beta-1 Wintun requires SYSTEM privileges

2020-08-18 Thread Selva Nair
the logs (or use the GUI) to see what went wrong. Selva ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] 2.5-beta-1 Wintun requires SYSTEM privileges

2020-08-18 Thread Selva Nair
in the GUI. I think we can also relax the "do not connect to iservice if admin" restriction as that was added to protect against some Windows Vista mis-behaviour. An additional check in openvpn.exe whether it's started as SYSTEM could be useful as well, but less critical, IMO. Selva _

[Openvpn-devel] [PATCH v2] Improve the documentation for --dhcp-option

2020-08-16 Thread selva . nair
From: Selva Nair - Stress that these are handled internally only on some platforms - Correct the statement about wintun - Document DOMAIN-SEARCH Signed-off-by: Selva Nair --- v2: Rebase to master and reword to match the new rst version Add doc for DOMAIN-SEARCH doc/man-sections/vpn

Re: [Openvpn-devel] [PATCH v2] Allow management to kill client instances by CN wildcard

2020-08-14 Thread Selva Nair
ement interface was missed in the previous version of the patch. Selva > > -- > Best Regards, Vladislav Grishenko > > -Original Message- > From: Selva Nair > Sent: Friday, August 14, 2020 11:22 PM > To: openvpn-devel > Subject: Re: [Openvpn-devel] [PATCH v2]

Re: [Openvpn-devel] [PATCH v2] Allow management to kill client instances by CN wildcard

2020-08-14 Thread Selva Nair
'*' is an allowed character in x509 common name unless we explicitly forbid it. So killing a client with name ending in * would get tricky if not impossible without side effects. Selva ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [PATCH] Improve error msg when all TAP adapters are in use "or disabled"

2020-08-06 Thread Selva Nair
are triggered by CreateFile, so just wondering.. Selva On Thu, Aug 6, 2020 at 3:02 PM Richard Bonhomme wrote: > > Ref: https://github.com/OpenVPN/openvpn-gui/issues/356 > > Signed-off-by: Richard Bonhomme > --- > src/openvpn/tun.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-)

Re: [Openvpn-devel] Regarding deprecation of --route-nopull

2020-07-23 Thread Selva Nair
lack of alternatives in 2.3 and older. I didn't know 3.x does not support pull-filter. Why? It's easy to code (at least I know that for sure) so that can't be the reason. Selva ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [Openvpn-users] Join PC with OpenVpn to Active Directory

2020-07-19 Thread Selva Nair
name. Both of these are described in OpenVPN howto. See https://community.openvpn.net/openvpn/wiki/HOWTO#IncludingmultiplemachinesontheserversidewhenusingaroutedVPNdevtun and https://community.openvpn.net/openvpn/wiki/HOWTO#PushingDHCPoptionstoclients Selva On Sun, Jul 19, 2020 at 1:07 PM Fermin Francisco via Ope

Re: [Openvpn-devel] [PATCH v3] Add deferred authentication support to plugin-auth-pam

2020-07-15 Thread Selva Nair
-- > "all forwarding for all other clients" Acked-by: Selva Nair On Wed, Jul 15, 2020 at 5:02 AM Gert Doering wrote: > > If OpenVPN signals deferred authentication support (by setting > the internal environment variables "auth_control_file" and > "deferr

Re: [Openvpn-devel] [PATCH v2] Add deferred authentication support to plugin-auth-pam

2020-07-14 Thread Selva Nair
service, ) < 0) > +{ > +goto done; Do we have to abort in this case? This will exit the background process and cripple the server while this could be a temporary memory pressure causing the fork to fail. Why not just break and plough along? The core will fail to get a response via the ac_file, but that could happen if the grand-child fails as well -- the server is supposed to cope with such failures. > +} > +break; > +} > + > + > +/* non-deferred auth: wait for pam result and send > + * result back via control socketpair > + */ > if (pam_auth(service, )) /* Succeeded */ > { > if (send_control(fd, RESPONSE_VERIFY_SUCCEEDED) == -1) > -- Apart from these minor issues that could be corrected or ignored at merge time, all look good. We should put the usage info into README.auth-pam as that seems to be the only documentation of the plugin. Also an entry in changelog? Could be a separate patch. Acked-by: Selva Nair ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Re: [Openvpn-devel] [Openvpn-users] Multiple DNS search suffixes on Windows

2020-06-23 Thread Selva Nair
Hi, On Tue, Jun 23, 2020 at 3:22 AM Jan Just Keijser wrote: > > Hi, > > On 21/06/20 17:14, Selva Nair wrote: > > On Sun, Jun 21, 2020 at 7:14 AM Gert Doering wrote: > >> > >> going through OpenVPN threads that went stale - I think this is > >> actu

Re: [Openvpn-devel] [PATCH] systemd: Change the default cipher to AES-256-GCM for server configs

2020-06-22 Thread Selva Nair
@/openvpn --status %t/openvpn-server/status-%i.log > --status-version 2 --suppress-timestamps --config %i.conf > +ExecStart=@sbindir@/openvpn --status %t/openvpn-server/status-%i.log > --status-version 2 --suppress-timestamps --cipher AES-256-GCM --ncp-ciphers > AES-2

Re: [Openvpn-devel] [PATCH] Convert plugin/auth-pam.c from stderr logging to plugin_log().

2020-06-21 Thread Selva Nair
Hi, This was long overdue after patches after patches sprinkling fprintf() all over the place.. mea culpa too.. Acked-by: Selva Nair On Sat, Jun 20, 2020 at 11:18 AM Gert Doering wrote: > > More recent OpenVPN APIs pass a function pointer for a logging function > (plugin_log()) t

Re: [Openvpn-devel] [PATCH] Add deferred authentication support to plugin-auth-pam

2020-06-21 Thread Selva Nair
O, MODULE, "cannot > write to '%s'", ac_file_name ); > +} > +close(ac_fd); > +plugin_log(PLOG_NOTE, MODULE, "BACKGROUND: deferred auth > finished" ); > +exit(0); > +

Re: [Openvpn-devel] [Openvpn-users] Multiple DNS search suffixes on Windows

2020-06-21 Thread Selva Nair
I think we need both --- the current one retained as the connection specific suffix which would be just one entry and then this search list. As we allow multiple entries for DOMAIN right now, a user friendly approach would be to continue doing so but internally treat all but the first as a part of --dh

Re: [Openvpn-devel] async plugin-auth-pam

2020-06-12 Thread Selva Nair
fort to make it handle pam auth asynchronously. Things may be easier if modules that take long to verify the credentials, return something like PAM_INCOMPLETE, so that it can be called back later. But that is beyond our control, and I'm not familiar with async support within PAM or in PAM modules.

[Openvpn-devel] [PATCH v2] Allow repeated cycles through remotes when management-query-remote is in use

2020-05-15 Thread selva . nair
From: Selva Nair (i) Let the management-client predictably cycle through remote entries. This is done by not aborting after two cycles. The client can abort or restart the connection using signals (USR/HUP/TERM) as necessary. In the current behaviour, the daemon can unexpectedly exit when

Re: [Openvpn-devel] [PATCH 2/2] Allow repeated cycles through remotes when management-query-remote is in use

2020-05-13 Thread Selva Nair
Hi, On Wed, May 13, 2020 at 12:36 PM Gert Doering wrote: > > Hi, > > On Sun, Jun 09, 2019 at 03:33:55PM -0400, Selva Nair wrote: > > Ref: https://patchwork.openvpn.net/project/openvpn2/list/?series=201 > > > > These patches were meant to help implement choosing the

Re: [Openvpn-devel] [PATCH applied] Re: Parse static challenge response in auth-pam plugin

2020-04-23 Thread Selva Nair
s in 2.4. If we do, we'll need this one (commit 7369d01bf360bcfa02f26c05b86dde5496d120f6) and the followup one 7a8109023f4c345fe12f23421c5fa7e88e1ea85b Both should cherry-pick without conflicts. See also Trac #1275 https://community.openvpn.net/openvpn/ticket/1275 Thanks, Selva __

Re: [Openvpn-devel] [PATCH applied] Re: Skip expired certificates in Windows certificate store

2020-04-15 Thread Selva Nair
ved. aa6affe should cherry-pick with no issues. Selva ___ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel

[Openvpn-devel] [PATCH 2/2] When auth-user-pass file has no password query the management interface (if available).

2020-04-03 Thread selva . nair
From: Selva Nair When only username is found in the file, redirect the auth-user-pass query to the management interface if management-query-passwords is enabled. Otherwise the user is prompted on console, if available, as before. This changes the behaviour for those who run from the command

[Openvpn-devel] [PATCH for-2.4 1/2] Move querying username/password from management interface to a function

2020-04-03 Thread selva . nair
From: Selva Nair This helps the next patch. No functionality changes, only refactoring. Same as commit 461e566fb274d6f7647dc3aa81c02e4fbf362a23 in master except for additional ifdef ENABLE_CLIENT_CR Signed-off-by: Selva Nair --- src/openvpn/misc.c | 61

Re: [Openvpn-devel] [PATCH v2 2/2] When auth-user-pass file has no password, query the management

2020-04-02 Thread Selva Nair
Hi, On Thu, Apr 2, 2020 at 12:56 PM Jonathan K. Bullard wrote: > Hi, > > On Mon, Mar 30, 2020 at 2:06 PM wrote: > > > > From: Selva Nair > > > > When only username is found in the file, redirect the auth-user-pass > > query to the management i

Re: [Openvpn-devel] [PATCH] [PATCH v5] Insert client connection data into PAM environment

2020-03-30 Thread Selva Nair
for nul termination More importantly, you have to provide a single updated patch preferably with version indicated in the subject and sent out with --in-reply-to referring to the previous version. Submitting incremental pieces of fixup commits doesn't

[Openvpn-devel] [PATCH v2 1/2] Move querying username/password from management to a function

2020-03-30 Thread selva . nair
From: Selva Nair This helps the next patch. No functionality changes, only refactoring. Signed-off-by: Selva Nair --- No changes from v1 src/openvpn/misc.c | 54 ++ 1 file changed, 34 insertions(+), 20 deletions(-) diff --git a/src/openvpn

[Openvpn-devel] [PATCH v2 2/2] When auth-user-pass file has no password, query the management

2020-03-30 Thread selva . nair
From: Selva Nair When only username is found in the file, redirect the auth-user-pass query to the management if management-query-passwords is enabled. Otherwise the user is prompted on console, if available, as before. This changes the behaviour for those who run from the command line

Re: [Openvpn-devel] [PATCH 2/2] When auth-user-pass file has no password, query the management

2020-03-30 Thread Selva Nair
Hi, On Mon, Mar 30, 2020 at 12:11 PM Jonathan K. Bullard wrote: > Hi, > > On Mon, Mar 30, 2020 at 11:12 AM Selva Nair wrote: > > Jonathan K. Bullard wrote: > > > > > > If the OS X command line user was using --management-query-passwords > > >

Re: [Openvpn-devel] [PATCH 2/2] When auth-user-pass file has no password, query the management

2020-03-30 Thread Selva Nair
Hi, On Mon, Mar 30, 2020 at 2:07 AM Gert Doering wrote: > > Hi, > > On Sun, Mar 29, 2020 at 07:58:15PM -0400, Selva Nair wrote: > > Yes, that's right. However, that logic wont be proper on OS-X, would it? > > Command line users who use --log can still see password >

Re: [Openvpn-devel] [PATCH 2/2] When auth-user-pass file has no password, query the management

2020-03-29 Thread Selva Nair
Hi, On Sun, Mar 29, 2020 at 7:13 PM Jonathan K. Bullard wrote: > > Hi, > > On Sun, Mar 29, 2020 at 4:34 PM wrote: > > > > From: Selva Nair > > > > If only username is found in the file, redirect the auth-user-pass > > query to the management on

Re: [Openvpn-devel] [PATCH] Document some limitations of --auth-user-pass

2020-03-29 Thread Selva Nair
Hi, On Tue, Mar 17, 2020 at 6:25 AM Gert Doering wrote: > > Hi, > > On Tue, Mar 17, 2020 at 11:06:53AM +0100, David Sommerseth wrote: > > On 16/03/2020 14:48, Selva Nair wrote: > > [...snip...] > > >> I would just rephrase it to say: > > >>

[Openvpn-devel] [PATCH 2/2] When auth-user-pass file has no password, query the management

2020-03-29 Thread selva . nair
From: Selva Nair If only username is found in the file, redirect the auth-user-pass query to the management on Windows if (i) management-query-passwords is enabled and (ii) stdout is redirected to a log file. These restrictions avoid regressive behaviour: those running from the command line

[Openvpn-devel] [PATCH 1/2] Move querying username/password from management to a function

2020-03-29 Thread selva . nair
From: Selva Nair This helps the next patch. No functionality changes, only refactoring. Signed-off-by: Selva Nair --- src/openvpn/misc.c | 54 ++ 1 file changed, 34 insertions(+), 20 deletions(-) diff --git a/src/openvpn/misc.c b/src

<    1   2   3   4   5   6   7   8   9   10   >