Hi, Here's the summary of the IRC meeting.
--- COMMUNITY MEETING Place: #openvpn-meeting on irc.freenode.net Date: Wed 10th June 2020 Time: 11:30 CEST (10:30 UTC) Planned meeting topics for this meeting were here: <https://community.openvpn.net/openvpn/wiki/Topics-2020-06-10> Your local meeting time is easy to check from services such as <http://www.timeanddate.com/worldclock> SUMMARY cron2, dazo, mattock, ordex, plaisthos and uip participated in this meeting. --- Talked about deprecating net30 topology. Agreed that in 2.5 we should print a deprecation and warning: "Topology net30 support will be removed in a future release. Please migrate to topology subnet as soon as possible" The client-side code is less harmful, so it can stay a bit longer than the server-side code. Noted that there are ways to work around lack of net30. Also agreed that we should document those workarounds. --- Had a lengthy discussion about deprecation/removal of obsolete options. An option that was brought up was having "config levels" which would set reasonable, modern defaults for several settings. The config level would have to be defined explicitly by the user and the actual defaults would not be touched. Nobody was opposed to cron2's suggestion, which was "write up a list, agree on what the goal should be, and whether we can get there with negotiations or not". --- Talked about the release schedule for OpenVPN 2.5. Agreed that given how far we are now releasing 2.5-beta1 on 30th June is doable, followed by 2.5-rc1 on 3rd August. The 2.5.0 release would happen around 15th August. --- Talked about dazo's man-page patches. The man-page is now split into multiple sections: <https://gitlab.com/dazo/openvpn/-/tree/dev/man-reformatting/doc/man-sections> Options in each section are currently sorted alphabetically. As the next step we need to get people to review the section contents and the order of the items to make sure they make sense. --- Noted that the IPv6-only patchset is now merged. Also noted that cron2 will merge the non-SSO patches "really soon now". -- Full chatlog attached
(12:28:01) ***uip says hi! (12:29:09) dazo: hey! (12:29:47) cron2: ho (12:31:05) ordex: hi (12:31:18) mattock: hi! (12:32:39) mattock: https://community.openvpn.net/openvpn/wiki/Topics-2020-06-10 (12:32:41) vpnHelper: Title: Topics-2020-06-10 – OpenVPN Community (at community.openvpn.net) (12:33:17) ordex: revised timeline! (12:33:43) cron2: I have updated the StatusOf25 (or how it is called) page with a new proposed timeline (12:33:51) cron2: discuss and agree or not :-) (12:33:58) plaisthos: hey (12:34:33) plaisthos: net30 deprecation, no problem for me (12:34:54) plaisthos: It is hack anyway (12:34:58) mattock: https://community.openvpn.net/openvpn/wiki/StatusOfOpenvpn25 (12:34:59) vpnHelper: Title: StatusOfOpenvpn25 – OpenVPN Community (at community.openvpn.net) (12:35:27) dazo: I don't think we can remove net30 ... it will break an incredibly amount of configs, as that has been the default since at least 2.0 (12:35:53) cron2: my idea was (12:35:56) dazo: I agree to deprecate it, maybe even switch to subnet as default ... but I don't think we can remove it easily (12:36:04) cron2: - announce depreciation for 2.6 now (12:36:18) cron2: - but leave it "as it is" in 2.5, except for a warning message (12:36:53) cron2: changing the default alone won't really do much good, as we'd still have to maintain all the special cases (12:37:14) ordex: I agree this this plan (12:37:34) dazo: Don't get me wrong, it would be good to see it gone. I'm even open to accept that certain features won't work with net30 ... but I fear 2.6 might be too early to see it gone (12:37:40) cron2: we might decide to only depreciate it - and only remove it - for the server side initially (12:38:07) ordex: if we add the warning now..we give people at least another year before it will break (12:38:09) plaisthos: we have to deprecate it if we want to remove it (12:38:09) dazo: what is the challenge with net30 today? (12:38:20) plaisthos: messy (12:38:27) dazo: yes, deprecate should be done (12:38:27) ordex: legacy stuff that has no real reason to exist ? :D (12:38:34) cron2: switch (pool->ipv4.type) (12:38:37) cron2: case IFCONFIG_POOL_30NET: (12:38:39) cron2: case IFCONFIG_POOL_INDIV: (12:38:41) plaisthos: we also need something that sets better defaults (12:38:57) plaisthos: we have a lot defaults that do not make sense today anymore (12:39:07) cron2: dazo: it affects how pools are handled, and that is quite a bit of senseless code in pool.c (12:39:17) cron2: plaisthos: yeah (12:40:13) cron2: tun.c is actually fairly harmless, so we can keep the client side of net30 around for longer (12:41:05) plaisthos: even with pool code gone you can do it manually with client-conn (12:41:22) dazo: If removing net30 is mainly code cleanup in pool.c ... I'm not sure we're in such a hurry. But I agree, add deprecation warning in 2.5 (12:41:22) cron2: if you insist, yes :) (12:41:51) cron2: dazo: pool.c, helper.c, multi.c. Quite a bit of extra code that needs to be stared at when reworking bits. (12:42:48) dazo: that's a good point, plaisthos ... getting a workaround well documented would ease migration for those who really cannot do anything else currently. And having client support for some time is also reasonable (12:43:13) ordex: dazo: remember that this is not only about "clean up", but about time we have to spend to make sure we don't break this feature when introducing other changes (12:43:25) ordex: +1 for the workaround documentation (12:43:50) dazo: yeah, but I would also avoid getting lots of complaints on "OpenVPN 2.x broke my config!" (12:43:50) cron2: yes (12:44:19) plaisthos: I would assume 90% of config that currently use net30 will also work with subnet (12:44:33) plaisthos: but we have a plan forward (12:44:35) cron2: dazo: this is why we warn now, so people can adjust between 2.5 and 2.6 (12:44:47) plaisthos: cron2/ordex: are you preparing a patch? (12:44:49) dazo: So ... to not spend too much time back-and-forth here .... I think there is consensus that we add net30 deprecation notice in 2.5, clearly stating it will be removed in a future release. But I think we need to see the response in the community if we can remove it on the server side already in 2.6 (12:45:21) plaisthos: for better defaults: Do we want something like config-version x? (12:45:33) cron2: plaisthos: yes (patch) (12:45:44) plaisthos: that would then set a number of default like cipher, explicit-exit-notify etc? (12:45:48) dazo: cron2: there is an urge from the company side to get 2.6 quicker out, primarily with kernel module support as the main feature ... which might be a too quick turn-around for deprecating a feature (12:46:27) ordex: dazo: we can set a timeline "in a year from now" and we remove it at the next release after that date (12:46:40) ordex: which could be 2.6 or 2.10 (12:46:53) dazo: ordex: that's a reasonable plan as well (12:47:29) cron2: we're not going to have 2.10 in a year :-) (12:47:44) ordex: :D think so too, but it was just an example hehe (12:47:48) dazo: plaisthos: that's a good idea ... config-defaults $OVPN_VERSION (would be my vote, if we start painting the bike shed :-P) (12:48:44) cron2: #1288 (12:49:17) ordex: config-defaults << so we're planning to have "different" series of defaults ? (12:49:22) ordex: or is it for backward compatibilities ? (12:49:33) dazo: So ... conclusion is: net30 deprecate warning in 2.5, stating it will be removed a release no later than December 2021? (12:49:35) ordex: this way you can restore the old defaults ? (12:49:55) dazo: ordex: yes, for backward compatibility (12:50:19) ordex: dazo: better state "will be removed in a release not earlier than July 2021" - to guarantee that until that dtae it will work for sure (12:50:35) ordex: after july 20201 will be removed with the first release we have on the roadmap (12:50:35) cron2: "in a future release" is good enough (12:50:50) plaisthos: dazo: $OVPN_VERSION does not work great for ovpn3. (12:51:03) dazo: no commitment on when ... just a "future release ... I'm fine with that (12:51:12) plaisthos: or do we want that same 2.x version in both? (12:52:02) dazo: so ... conclusion: 2.5 Deprecation warning: "Topology net30 support will be removed in a future release. Please migrate to topology subnet as soon as possible" (12:52:31) cron2: dazo: works for me. can you put this text into #1288? (12:53:14) dazo: plaisthos: I think so, yes .... OpenVPN 3.x can use the same 2.x numbering ... and if OpenVPN 3.x adds features not planned to be supported in 2.x, it will have the OpenVPN 3 Core version (12:53:40) dazo: cron2: sure! (12:54:50) ordex: dazo: it sounds like we will enter numbering mess very soon :D how about documenting the various defaults so that somebody can turn them on manually one by one as he see needs ? (12:55:10) ordex: without us maintaining huge compatibility tables (12:56:50) dazo: The alternative is to have a "config level ID" instead .... where we would need to document which releases supports the various config levels ... so instead of documenting that as text, have a mapping table for the OpenVPN versions to such levels in code. (12:58:32) plaisthos: you would need that anyway (12:58:48) plaisthos: like config version 2.5 is supported in openvpn 2.x and openvpn 3.7 (12:59:02) dazo: well, yeah, true (12:59:11) cron2: but we should be careful what we intend to use that for (12:59:15) dazo: (Once this topic is done ... I'd like to bring up the man-page work .... I'd like to hear your input on a change I prepared yesterday) (12:59:33) cron2: for stuff like cipher, having full NCP is much better than maintaining compat tables (12:59:49) plaisthos: yeah (12:59:58) cron2: for stuff like net30, the point of getting rid of it is "get rid of the code", so a compat table won't make us happy campers (13:00:05) plaisthos: for cipher the problem is the hardcoded BF-CBC that a client always has to support (13:00:45) dazo: there are two aspects ... depending on what we call the option .... config-version vs config-defaults .... the former can indicate which options is supported, through documentation (and can set the defaults) ... while the latter one would be more scoped at default values (13:01:04) plaisthos: yeah config-defaults more like it (13:01:09) cron2: this (13:01:47) dazo: agreed (13:03:39) dazo: well, using a single digit indicating the defaults or OpenVPN version ... I'm fine with both. But I think it might be easier to understand OpenVPN versions for users than an unrelated digit (13:04:31) dazo: "I want the default values as defined in OpenVPN 2.6" .... vs "I use config-defaults 2, as that is the defaults in OpenVPN 2.6" (13:04:51) cron2: I wonder if that makes any sense at all, tbh (13:05:16) cron2: if someone is clueful enough so they know "ah, I need those old defaults", they can just set those config options directly (13:05:22) cron2: why is (13:05:25) cron2: config-defaults 2 (13:05:26) cron2: better than (13:05:29) cron2: cipher BF-CBC (13:05:33) cron2: auth SHA1 (13:05:47) cron2: (or whatever defaults are packed in there) (13:06:11) dazo: because existing configs upgrading will keep the old defaults ... users setting up new server only adds --config-defaults 2 and get a lot more options set to sane values by default in one go (13:06:20) plaisthos: We basically never change default in openvpn (13:06:30) dazo: exactly (13:06:41) cron2: so you would leave the defaults *unchanged*, and require "config-defaults 2" to get "more sane defaults"? (13:06:44) plaisthos: the problem with that is that we still in 2020 default to a cipher that nobody should use anymore (13:07:07) dazo: so --config-defaults 2 could mean --topology subnet --auth sha256 --cipher AES-128-GCM (13:07:11) cron2: I totally fail to see under which conditions this option would make sense (13:07:26) plaisthos: cron2: do you have a better idea without killing holy cow of backword compatbility? (13:07:37) cron2: kill holy cow in cases where the cow is dead anyway (13:07:39) dazo: (not that --auth and GCM makes sense, but yeah, you get the picture) (13:08:17) cron2: like, if we have reasonable mechanisms to deal with that cow, like NCP, document change, done (13:08:25) plaisthos: if I submitted a patch now that changed cipher default from BF-CBC to AES-256-GCM I don't think it would get merged (13:08:34) dazo: exactly (13:08:35) cron2: changing cipher default, to stick to that example, will ONLY hurt p2p setups, or --ncp-disable setups (13:08:47) dazo: And we should never deliberately break users configs unless strictly needed (13:09:09) plaisthos: cron2: yeah but the options like subnet (13:09:10) dazo: and if we do default changes which breaks existing configs ... we need to warn well ahead of time (13:09:31) plaisthos: where we want to change the default but do not want to break stuff (13:09:34) cron2: plaisthos: that's an option that you cannot "compat" - if you get rid of that code, it is no longer there (13:09:55) plaisthos: cron2: no as in makeing subnet the default in 2.5 (13:10:04) cron2: but we do not want to do so (13:10:08) plaisthos: while net30 is still supported (13:10:17) cron2: because that would indeed cause surprises (13:10:22) plaisthos: yeah (13:10:39) plaisthos: so we that is why we need some solution to "Apply the current best default defaults" (13:11:00) cron2: anyway. Before we go forward with this, I think it should be clear *which* options we're talking about, who exactly would be affected if we change the defaults (13:11:22) dazo: config-defaults in 2.5 would actually make sense ... where config-defaults {2.5|1} would mean --topology subnet being the default (together with a other saner defaults in other options) .... users can then just add a single option to get to a more modern standard default (13:12:18) cron2: users would not upgrade their defaults, because, that would break their setups. No? (13:12:21) dazo: in OpenVPN 2.8 ... we can add a warning "--config-default 0 will be unsupported in the next release" ... then --config-default 1 will be come the new defaults, and slowly over time force users to move forward as well (13:13:20) cron2: this sounds like a very complicated (and labour- and testing-intensive) approach to not getting things done, really. (13:13:28) dazo: Which also means we have a better mechanism to handle a lot of default settings as a group, instead of deprecating modes and defaults on a per-option basis (13:14:28) dazo: using --config-defaults 1 ... then you know, these set of options are expected to break ... so you slim down the scope over time. (13:14:32) cron2: see above: let's be clear what we are talking about. "topology" only makes limited sense, as we want to get rid of the code (so we'd have that "upgrade-default" thing for exactly one release, and then it's gone anyway, so the breakage for all non-upgraded configs would happen all the same) (13:14:53) dazo: but we have closer to 300 options ... all with various defaults defined 20 years ago (13:15:26) plaisthos: cron2: Do you have bettter ideas? (13:15:26) cron2: anything where we are no longer supporting "the thing that used to be default" can not be handled by "option-default $later" without just postponing breakage for everybody who has *not* added said option (13:15:53) cron2: plaisthos: yeah. Understand what we're talking about, add proper negotiation mechanisms, or deprecate "we want to get rid of that code" (13:16:07) cron2: cipher, for example, is solved for standard p2mp setups already (13:16:39) dazo: --tls-cert-profile ... that is still legacy, afair ... that needs to be bumped to preferred at some point (13:16:57) dazo: --tls-ciphers, --tls-ciphersuites ... those also needs to be moved forward (13:17:03) cron2: "legacy" isn't bumped to "preferred" but ripped out :-) (13:17:20) cron2: dazo: the take on that is "leave the default to the SSL library, because there is negotiation already" (13:18:11) dazo: we added tls-cert-profile in the beginning to actually set stricter defaults on what the TLS protocol offered (13:18:43) dazo: (and providing a fallback to users really needing the legacy mode) (13:18:50) cron2: ah, that's what you mean with "preferred" (13:19:01) cron2: indeed, we could upgrade that one eventually (13:19:52) plaisthos: explicit-exit-notify 1 (13:19:57) dazo: yeah (13:20:13) plaisthos: enable auth-token by default when you do user-password auth (13:20:17) dazo: disallowing BF-CBC and related ciphers (13:20:51) cron2: write up a list, agree on what the goal should be, and whether we can get there with negotiations or not (13:21:22) dazo: basically doing lots of the stuff openvpn-nl does now (except they remove lots of that in the code instead) (13:21:41) cron2: (I'm not so sure on "enable auth-token by default" - why? This is a cool feature, but if someone is fine with static passwords and uses a PAM backend to check user validity, this would actually be a drawback fo rthem) (13:22:20) cron2: if it turns out said list has like 30 entries, and we can't negotiate 28 of them (and we actually agree on changing the default!) I'm in (13:22:38) cron2: if it turns out to be "cipher" and "topology", I maintain that this is more effort than useful (13:22:39) dazo: plaisthos and I can discuss internally several default changes ... and propose an overview in a coming meeting (13:22:58) cron2: list, wiki, agenda item. Not just hijacking a meeting :) (13:23:07) dazo: sure (13:23:19) dazo: so ... 7 minutes for man page discussion? :-P (13:23:23) cron2: no (13:23:32) cron2: man page is *not* on the agenda, but 2.5 updates is (13:23:52) dazo: I did ask for it to hit the agenda yesterday ... but okay (13:23:53) cron2: so can we please do the agenda items first? (13:24:12) dazo: well, man page *is* a 2.5 related topic ;-) (13:24:14) cron2: the agenda is in the wiki, things get there because people who want them there put them in... (13:24:35) mattock: MSI = Friday (13:24:49) cron2: anyway, why am I being so annoying about it? because I want agreement on the revised proposed timeline (13:24:58) plaisthos: btw. (13:25:00) plaisthos: https://community.openvpn.net/openvpn/wiki/DeprecatedOptions#Option:--ifconfig-pool-linear (13:25:01) vpnHelper: Title: DeprecatedOptions – OpenVPN Community (at community.openvpn.net) (13:25:14) plaisthos: ifconfig-pool-linear has been deprecated since 2.1 %) (13:25:34) cron2: can we manage to get all code in by end of June? (13:25:50) cron2: which is in 3 weeks (13:25:51) mattock: "no problem" at my end (13:26:09) mattock: on June 30th I will be sobbing and fighting MSI probably after I said that (13:26:33) dazo: I'm pushing to get the man-page patches ready ... then it is the asym compression + async client-connect script support left (13:26:48) cron2: the compression part is easy ("I just need to review and merge") (13:27:04) cron2: ordex, plaisthos: can you get enough focused time to get async-cc done? (13:27:12) cron2: I'll help, of course (13:27:25) cron2: (I'll have to, I'm afraid :) ) (13:27:44) ordex: I guess we have to :D (13:28:13) cron2: if you think this is not going to work out, we can aim for "end of July" but then beta phase would be right in the school holidays here (= less focus for me) (13:28:28) plaisthos: the asym compress has a review from lev, I had some follow up questions to lev about his review and lev went silent (13:28:50) cron2: lev__ disappeared sort of :( (13:29:01) cron2: I have questions on some MSVC warning fixes as well (13:29:02) dazo: 2.5.0 release August 1st might be tight, but not impossible ... Sept 1 is probably more realistic if we aim for people to properly test the beta (13:29:33) dazo: July is holiday season for many of us ... so I think that effectively means some time in August (13:29:53) cron2: Sep 1 will be complicated for me, I'm on family vacation Aug 22 - Sep 8 (13:30:14) dazo: well, before Aug 22 then ;-) (13:30:21) cron2: mattock: what are your vacation plans? (13:30:41) cron2: beta phase will be also testing the MSI installers, and I think there will be lots of installer building happening (13:30:50) mattock: I will be on holiday in July (13:31:00) mattock: starting on 5th July (13:31:02) dazo: I'll have the openvpn-git RPM repos updated as well (13:31:30) dazo: mattock: how long will you be out? (13:31:54) mattock: 5th July - 2nd August (4 weeks as usual) (13:32:09) mattock: that does not mean I cannot do _anything_, but if possible, I'll try avoid work (13:32:14) dazo: alright ... so I would say release Aug 15 as the initial goal (13:32:34) cron2: works for me (13:32:46) mattock: initial goal = first alpha? (13:32:54) dazo: no, full release (13:33:16) mattock: so, first alpha end of this month? (13:33:18) dazo: Code freeze Jun 30, with beta 1 release .... then release in Aug (13:33:20) dazo: no alpha (13:33:22) mattock: ah ok (13:33:47) mattock: sounds reasonable (13:33:55) mattock: I hope things break quickly after that, before my vacation :D (13:34:07) dazo: Then first rc release Aug 3rd (13:34:25) dazo: then we see how it goes from there (13:34:29) cron2: mattock: if you have a MSI installer for people to test early next week, that would be good for your vacation :)) (13:34:56) mattock: that may just be doable if there are no surprises that require rozmansi to take the lead (13:36:42) mattock: ok release schedule set and seems like we can actually make it this time (13:36:54) mattock: 6 minutes overtime (13:36:58) mattock: anything else? (13:37:04) cron2: dazo's man page (13:37:07) cron2: this is also important (13:37:10) mattock: ok do it (13:37:28) dazo: yes, please ... So I've chopped the man page up into pieces and put them in different files ... https://gitlab.com/dazo/openvpn/-/tree/dev/man-reformatting/doc/man-sections (13:37:29) vpnHelper: Title: doc/man-sections · dev/man-reformatting · David Sommerseth / openvpn · GitLab (at gitlab.com) (13:38:16) dazo: I noticed that the existing groups where really not well defined and strictly client options was found in sections not really tied to client related options and so on (13:39:09) cron2: yeah (13:39:11) dazo: These groups I've suggested are not set in stone ... and when generating the man page, all of these parts are "glued" together into a single man page (through ".. include::" statements in the openvpn.8.rst file) (13:39:17) cron2: that's quite a few groups :) (13:39:37) dazo: yeah .... I'm not completely happy about all of them ... but it's a start :) (13:40:00) cron2: this generally looks like a good start. The rendering of the individual chunks is fairly good (13:40:12) cron2: https://gitlab.com/dazo/openvpn/-/blob/dev/man-reformatting/doc/man-sections/advanced-options.rst (13:40:13) vpnHelper: Title: doc/man-sections/advanced-options.rst · dev/man-reformatting · David Sommerseth / openvpn · GitLab (at gitlab.com) (13:40:44) cron2: oh (13:40:47) cron2: --bcast-buffers (13:40:51) cron2: learned something new today (13:40:54) dazo: so ... we don't need to dive into what should go where ... but I would really appreciate if this would get some reviews and I could get comments on how to improve it further (13:42:16) dazo: some options are also tricky to categorize as well ... like --ifconfig-pool ... is that a "network config" option or a "server config" (13:42:49) cron2: I'd group those as "if you can have it on the client or serer, it's 'network', if it's network-options-for-servers, it's "server" (13:42:56) cron2: s/serer/server/ (13:42:57) dazo: I've also merged all the IPv6 stuff into the main categories ... IPv6 should not be an "additional feature" any more. (13:43:16) dazo: yeah, that's what I believe I neded up with (13:43:33) dazo: And I might have overlooked some and pasted wrong :) (13:43:35) cron2: yeah. ordex and I were discussing README.IPv6, and whether to throw that one out (13:43:49) cron2: (I tend to "leave it in for 2.5.x, throw it out right after") (13:43:56) plaisthos: I am off to lunch (13:44:17) dazo: Also .... I've sorted all options alphabetically ... that is also something to ponder on ... if we want some priority of certain options coming first, or alphabetically is fine (13:44:24) plaisthos: I will look through the depracted options wiki page later and send patches for those that we really want to remove in 2.5 but haven't done yet (13:44:29) dazo: I chose alphabetically now to get a better overview (13:44:43) cron2: plaisthos: nice. And enjoy your lunch :) (13:44:48) dazo: cron2: agreed on README.ipv6 (13:44:54) plaisthos: no-replay is porbably one of the candiates (13:45:09) dazo: plaisthos: that's already moved to "unsupported" ;-) (13:45:15) dazo: https://gitlab.com/dazo/openvpn/-/blob/dev/man-reformatting/doc/man-sections/unsupported-options.rst (13:45:16) vpnHelper: Title: doc/man-sections/unsupported-options.rst · dev/man-reformatting · David Sommerseth / openvpn · GitLab (at gitlab.com) (13:45:40) dazo: We also need to un-deprecate comp-lzo in the wiki (13:45:55) ***dazo brb (13:46:00) cron2: dazo: mmmh, need to think about "alphabetically", whether there's options that should be ordered differently ("related options in a longer section") (13:46:25) cron2: for the "advanced expert", alphabetical is perfectly fine, as they are all totally independent (13:50:44) cron2: yeah, I really need to read all of the sections on that (13:51:36) mattock: ok, so "cron2 will read first" (13:51:49) cron2: nah, we all should read and comment (13:51:59) mattock: ok "all should read first" :D (13:52:15) mattock: perhaps we might even get some feedback from openvpn-devel list (13:52:18) ***dazo is back (13:52:24) cron2: yes (13:52:26) cron2: and wiscii :) (13:52:31) mattock: yep (13:52:56) dazo: yeah, getting some critical reviews now would be really good (13:53:16) cron2: wiscii is always super critical :-) (13:53:23) dazo: and nothing is set in stone ... the alphabetical order was primarily to not get lost in all the moving of options from one place to another (13:53:34) mattock: makes sense (13:54:13) mattock: ok, done are we? (13:54:59) dazo: the alphabetical order makes sense when you know what you are looking for, then it's easier to locate the part you need ... but if you need to configure something without knowing the option name, it might be counter-productive (13:55:04) cron2: JFTR, I intend to merge the non-SSO patches "rsn". Wanted to get ipv6-only out of the way (which is done for good now, just pushed the last patches) (13:55:07) dazo: Yeah, I think so (13:55:25) dazo: cron2: cool! (13:56:36) mattock: I wrote those things to the record which I will send now (13:56:46) mattock: speak up now if you have something else! :)
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel