penvpn@CONFIG.service approach is also
deprecated by the community - as it does not behave identical across
Linux distributions.
Please migrate to use the openvpn-server@CONFIG.service and
openvpn-client@CONFIG.service unit files. They will in most cases
behave better.
--
kind regards,
David Somm
it be fine to install it separately, but not part of the
OpenVPN install?
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
be avoided. It has poorer
performance, you need to do log rotation manually (requiring the openvpn
to get reloaded, which interrupts tunnel) and without a quite powerful
log query tool.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvp
repositories:
<https://community.openvpn.net/openvpn/wiki/OpenvpnSoftwareRepos#DebianUbuntu:UsingOpenVPNaptrepositories>
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
completely
override the unit file shipped with the OpenVPN package.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
quot;route 172.20.0.0 255.255.255.0"
topology subnet
keepalive 10 120
tls-crypt /etc/openvpn/server/ta.key 0
Wrong usage of tls-crypt. Read the man page, please.
cipher AES-256-GCM
data-ciphers AES-256-GCM
These two lines are not needed with OpenVPN 2.6.
--
kin
Clients and servers enrolled into such a centralized CA infrastructure
will get the CA certificates updated automatically as well.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge
ind regards,
David Sommerseth
OpenVPN Inc
Hello,
Thank you so much.
Do you mean the below lines for "server.conf":
OpenVPN 2.5 ==> push "dhcp-option DNS IP"
OpenVPN 2.6 ==> dns IP
?
I'm pretty sure I said:
>> you can push both --dns and --dhcp-o
-of-the-box and will require additional script hooks to be
enabled (the exception is when starting VPN sessions via
NetworkManager). Hosts running OpenVPN 3 Linux will get DNS setup
out-of-the-box, and that should support the --dns option as well.
--
kind regards,
David Sommerseth
OpenVPN Inc
ich added better systemd
integration so systemd could better understand in which runtime status
the OpenVPN process has. And it adds a lot of hardening, depending on
the use case (client or server config).
Can you please try and see if that works better?
--
kind regards,
David Sommerseth
Open
lient config in play.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
On 26/10/2023 18:22, Gert Doering wrote:
Hi,
On Thu, Oct 26, 2023 at 10:04:18AM +0200, David Sommerseth wrote:
When starting OpenVPN via the openvpn-client@.service or
openvpn-server@.service systemd unit files, some capabilities are granted to
the the OpenVPN process may transition to, like
c and send that traffic to/from the
local virtual interface.
[0] <https://community.openvpn.net/openvpn/wiki/OpenVPN3Linux>
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourc
d here:
<https://github.com/OpenVPN/openvpn3-linux/issues/193>
--
kind regards,
David Sommerseth
OpenVPN Inc
Source tarballs ---
* OpenVPN 3 Linux v21
<https://swupdate.openvpn.net/community/releases/openvpn3-linux-21.tar.xz
this as strong warning. Enough is enough.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
ore questions. Please do your homework and do some
googling and reading first. The terminologies used here are industry
standard.
--
kind regards,
David Sommerseth
OpenVPN Inc
OpenPGP_signature
Description: OpenPGP digital signature
___
Openvpn-us
(Common Name) field in each connecting client certificate is unique per
client.
--
kind regards,
David Sommerseth
OpenVPN Inc
OpenPGP_signature
Description: OpenPGP digital signature
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
ds entirely on your own security needs.
--
kind regards,
David Sommerseth
OpenVPN Inc
OpenPGP_signature
Description: OpenPGP digital signature
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
ion/9781786463128>
<https://www.packtpub.com/product/mastering-openvpn/9781783553136>
<https://www.packtpub.com/product/troubleshooting-openvpn/9781786461964>
Those books are written by trusted OpenVPN community members, so buying
these books supports them.
--
kind regards,
Da
/wiki.openstack.org/wiki/MailingListEtiquette>
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
lt;https://copr.fedorainfracloud.org/coprs/dsommers/openvpn-release-2.6/>
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
" between the
VPN server and client. How you treat the traffic coming out or going
into that cable is up to the host this "cable" is "plugged" into.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mail
market segment
(especially on the consumer VPN service side).
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
Fedora Copr repo for OpenVPN 2.6
will be kept in sync as well.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
arious channels through all these releases. You have
all been important in ensuring this project has evolved and matured. I'm
sorry I don't have a proper list of all you, but you would also deserve
to be mentioned.
--
kind regards,
David Sommerseth
OpenVPN Inc
Source ta
ackage, and the 'easyrsa init-pki' kicked
off without issues.
But I'm really curious why you find it valuable to dockerize Easy-RSA.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
On 25/02/2023 16:36, Bo Berglund wrote:
On Thu, 23 Feb 2023 18:34:11 +0100, David Sommerseth
wrote:
Yes, you can issue new certificates using *the same* private and public
keys (essentially re-using the CSR). This will issue a new certificate
with a new expiry date. Since the certificate
his information before signing it. The only
thing the CA cannot change, is the public key attached to the CSR.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourcefo
en on Oct 24, 2027?
Yes, you can issue new certificates using *the same* private and public
keys (essentially re-using the CSR). This will issue a new certificate
with a new expiry date. Since the certificate and CA is the same, it
just works as before.
--
kind regards,
*24*3600)) -in $CERT_FILE
if [ $? -eq 1 ]; then # Certificate is expiring
echo "** EXPIRING ** Certificate dates (current): "
openssl x509 -noout -dates -in $CERF_FILE
fi
This will check if the certificate will expire in less than 40 d
ld
recommend to remove them.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
in this repository.
Further information can be found here:
<https://copr.fedorainfracloud.org/coprs/dsommers/openvpn3/>
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
A new repository for OpenVPN 2.6 has been published:
<https://copr.fedorainfracloud.org/coprs/dsommers/openvpn-release-2.6/>
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourcefor
/TAP close.
So this is probably as expected. You could use --route-pre-down, to run
scripts requiring the VPN interface to be available.
--
kind regards,
David Sommerseth
OpenVPN Inc
OpenPGP_signature
Description: OpenPGP digital
ed a tech-preview. We would like to get
feedback from arm64 users how OpenVPN 3 Linux works here, then
we can remove the tech-preview label for arm64.
--
kind regards,
David Sommerseth
OpenVPN Inc
Source tarballs ---
* OpenVPN 3 Lin
|| echo "NEED
RENEWAL"
--
kind regards,
David Sommerseth
OpenVPN Inc
OpenPGP_signature
Description: OpenPGP digital signature
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
not also charge extra for IPV6.
If so, tunnelbroker.net can work reasonably okay.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn
On 06/09/2022 16:48, Bo Berglund wrote:
On Tue, 6 Sep 2022 16:00:20 +0200, David Sommerseth
wrote:
On 06/09/2022 15:42, Bo Berglund wrote:
On Tue, 6 Sep 2022 15:23:29 +0200, David Sommerseth
wrote:
On 06/09/2022 10:14, Bo Berglund wrote:
2. Find a way to push the blocking of persist-tun
On 06/09/2022 15:42, Bo Berglund wrote:
On Tue, 6 Sep 2022 15:23:29 +0200, David Sommerseth
wrote:
On 06/09/2022 10:14, Bo Berglund wrote:
2. Find a way to push the blocking of persist-tun via a ccd command for this
client only. But it might not be possible if the persisted tun
. This is only possible to
set in the local configuration file. Long story short: It's related to
when this option is parsed; which is before it starts to connect to the
remote server.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn
sion of OpenVPN are your clients running?
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
On 22/06/2022 22:03, Bo Berglund wrote:
On Wed, 22 Jun 2022 15:58:35 +0200, David Sommerseth
wrote:
[...snip...]
I see you get a recommendation to remove '--suppress-timestamp'. That
is only useful if you decide to use --log. If you let the journal do
that job, it will already provide
u picks up.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
art openvpn-server@server
sudo systemctl restart openvpn-server@serverlocal
Correct.
Or is it:
sudo systemctl restart openvpn-server
There exists no 'openvpn-server.service' unit, so this will fail. Only
the "template" version exists, which needs a "value" ...
openvp
On 18/06/2022 10:26, Bo Berglund wrote:
On Wed, 15 Jun 2022 22:58:46 +0200, David Sommerseth
wrote:
[...snip...]
But will journalctl work independently of the openvpn log option settings, like
verbosity etc?
I have this now in the two instance conf files:
log /etc/openvpn/log/openvpn.log
@*.service and openvpn.service unit
files. When you only use the openvpn-client@.service and
openvpn-server@.client, you will have an environment which will be
easier to debug and troubleshoot. I mention this as I saw the
"openvpn@server.service" unit was listed as "failed".
selected Debian and Ubuntu releases are
considered a tech-preview.
--
kind regards,
David Sommerseth
OpenVPN Inc
Source tarballs ---
* OpenVPN 3 Linux v18 beta
<https://swupdate.openvpn.net/community/releases/openvpn3-linux-18_bet
On 18/05/2022 11:59, Aleksandar Ivanisevic wrote:
On 16. May 2022, at 19:49, David Sommerseth
<mailto:open...@sf.lists.topphemmelig.net>> wrote:
I still recommend you to have a look at OpenVPN Cloud and the
split-tunnel support based on domain names feature.
How does that wor
On 14/05/2022 00:32, Bo Berglund wrote:
On Fri, 13 May 2022 17:26:16 +0200, David Sommerseth
wrote:
What kind of firmware is on the device? Does it have a web UI? That
could probably be simpler than an SSH login.
I found out that the router in this case is too simple (low end) so it does
outes goes via
a VPN connector.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
st "rpm -q --changelog openvpn" you would find:
* Thu Jan 27 2022 David Sommerseth - 2.5.5-3
- Fix systemd related scriptlet error (#1887984)
That number in parentheses points at the Red Hat Bugzilla ticket:
<https://bugzilla.redhat.com/show_bug.cgi?id=1887984>
[...snip...]
The .deb p
ic technical reasons for that.
Would you like to elaborate what those "esoteric technical reasons"
are with regards to building the .deb package? Are the "esoteric
technical reasons" confined to Debian only? I ask because David
Sommerseth produced the openvpn package, ve
files. If it
doesn't complain about anything in the configuration file itself, it
will in most cases work just fine.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
to OpenVPN. If no
console is available at that point, it should be possible to complete
this later by manually running systemd-tty-ask-password-agent in a console.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
On 19/01/2022 19:27, Bo Berglund wrote:
On Wed, 19 Jan 2022 16:24:20 +0100, David Sommerseth
wrote:
What are these *.slice items???
The best answer is found in:
man 5 systemd.slice
There is a lot of man pages for systemd, and it is all kept up-to-date
and answers almost everything
On 18/01/2022 15:21, Bo Berglund wrote:
On Tue, 18 Jan 2022 10:58:02 +0100, David Sommerseth
wrote:
On 17/01/2022 23:37, Bo Berglund wrote:
[..snip...]
I have two server instances running with and without Internet routing from conf
files server.conf and serverlocal.conf.
I want to change
status openvpn.service openvpn@*.service
You can also ensure they are all stopped and disabled in a similar way
as enabling services:
systemctl disable --now openvpn.service openvpn@*.service
--
kind regards,
David Sommerseth
OpenVPN Inc
(amd64, arm64)
- Ubuntu 21.10 (amd64, arm64) is available for testing
The arm64 support on selected Debian and Ubuntu releases are
currently considered a tech-preview.
--
kind regards,
David Sommerseth
OpenVPN Inc
Source tarballs
on on its
own, even if gateways changes.
--
kind regards,
David Sommerseth
OpenVPN Inc
OpenPGP_signature
Description: OpenPGP digital signature
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
many thanks, L.
Have you tried OpenVPN 3 Linux? That does DNS seutp out-of-the-box.
With the Fedora builds it also integrates natively with
systemd-resolved.
<https://community.openvpn.net/openvpn/wiki/OpenVPN3Linux>
--
kind regards,
David Sommerseth
OpenVPN Inc
OpenPGP_signature
Debian 11 yet.
Ubuntu 21.10 will also get ovpn-dco packages. This work will
be part of the next release.
--
kind regards,
David Sommerseth
OpenVPN Inc
Source tarballs ---
* OpenVPN 3 Linux v16 beta
<https://swupdate.openvpn.net/com
regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
jor version (feature releases)
Z = Minor version (bug/security fixes)
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
ided repository, using the standard distro repository might be more
than good enough.
On the other hand, it might take a bit longer for a distribution
repository to get an updated package compared to using the community
provided packages.
That's the quicker introduction to this topic.
--
k
to?
If so I cannot find it, I entered the "--connect-retry-max" string in the Ctrl-F
box in Firefox but there was no hit.
Pretty sure he meant the man-page of OpenVPN 2.5
<https://build.openvpn.net/man/openvpn-2.5/openvpn.8.html>
--
kind regards,
Da
x 8
Remember to update the kmod-ovpn-dco package to the latest
available version.
Instructions how to install OpenVPN 3 Linux can be found here:
<https://community.openvpn.net/openvpn/wiki/OpenVPN3Linux>
--
kind regards,
David Sommers
proach.
[1] <https://openvpn.net/access-server/>
[2] <https://openvpn.net/cloud-vpn/>
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
lid for community Trac and
forums) if you don't have one already.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
On 07/06/2021 23:00, Bo Berglund wrote:
On Mon, 7 Jun 2021 11:46:02 +0200, David Sommerseth
wrote:
On 07/06/2021 09:41, Bo Berglund wrote:
2) By adding a service
--
Do the same as above with the client.ovpn file
Then:
sudo systemctl enable openvpn@client.service
sudo
, and you can store
them in a text file, insert into a database or similar things.
More information can be found in the openvpn man page:
<https://github.com/OpenVPN/openvpn/blob/master/doc/man-sections/script-options.rst>
--
kind regards,
David Sommerseth
OpenVPN Inc
OpenPGP_sig
ients restarting, there exists a state already
on the server side which we want to avoid confusing.
--
kind regards,
David Sommerseth
OpenVPN Inc
OpenPGP_signature
Description: OpenPGP digital signature
___
Openvpn-users mailing list
Openvpn-users@lists
than what
the Linux distro provides, our third-party repo is usually good enough.
But the third-party repos should only be used if you have no other
choice to the distro provided packaging.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-use
are the
openvpn-client@.service and openvpn-server@.service unit files; as
described here:
<https://github.com/OpenVPN/openvpn/blob/v2.5.2/distro/systemd/README.systemd>
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailin
Also, OpenVPN 3 Core library already has
explicit-exit-notify as the default (it doesn't even grok this option;
it's hard-coded to always be enabled).
But it needs to be restricted to UDP only and most likely tls-client
mode only.
--
kind regards,
David Sommerseth
OpenVPN Inc
O
am should run with as few
privileges as possible.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
on Oct 13 2020
What I suspect Gert meant was that you can add it in the client config
on the clients - and each client config may have different --mssfix values.
--
kind regards,
David Sommerseth
OpenVPN Inc
OpenPGP_signature
Description: OpenPGP digital signature
e that has been figured out, we can more easily see and understand if
something in the OpenVPN code paths was misbehaving. But from what we
see from these log lines so far, everything is as expected.
--
kind regards,
David Sommerseth
OpenVPN Inc
in the kernel.
You need a stateless protocol layer (UDP) to battle the TCP SYN challenges.
And with --port-share, OpenVPN becomes a (MITM) proxy also for all the
traffic not identified as OpenVPN packets. --port-share needs a
destination port for the non-OpenVPN traffic.
--
kind regards,
David
is entirely handled by the kernel and TCP stack - nothing OpenVPN
(or any other application) will need to or can care about.
This Linux Weekly News article has a nice walk-through of TFO at an
earlier development stage:
<https://lwn.net/Articles/508865/>
--
kind regards,
Da
ll functions, but this matter
will be treated later.)
IPv6 is handled in the same as IPv4, you just need to use the -ipv6
related options in addition. See the man page for details.
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing
to install OpenVPN 3 Linux can be found here:
<https://community.openvpn.net/openvpn/wiki/OpenVPN3Linux>
--
kind regards,
David Sommerseth
OpenVPN Inc
Tech preview: Enable OpenVPN Data Channel Offload --
-
## WARNING
releases, the Python 3 openvpn module did not understand
the --tls-version-min and --tls-version-max options. This has been
resolved and these options are forwarded properly to the
configuration manager.
--
kind regards,
David Sommerseth
OpenVPN Inc
[0] <https://gitlab.com/openvpn/openv
On 02/11/2020 19:22, Gert Doering wrote:
> Hi,
>
> On Mon, Nov 02, 2020 at 03:00:58PM +0100, David Sommerseth wrote:
>>> Then the imported configuration profile must get the DCO feature
>>> enabled:
>>>
>>> $ openvpn3 config-manage --show
On 02/11/2020 14:30, David Sommerseth wrote:
> With the kernel module installed, the configuration file must be
> be imported:
>
> $ openvpn3 config-import --config CONFIG_FILENAME \
> --name CFGNAME \
> --persistent
>
ignals to the Access Server the
downloaded configuration profile is intended to be imported into
a local storage.
--
kind regards,
David Sommerseth
OpenVPN Inc
[0] <https://gitlab.com/openvpn/openvpn3-linux>
<https://github.com/OpenVPN/openvpn3-linux>
--
ty-downloads/>
[2] <https://openvpn.net/client-connect-vpn-for-windows/>
[3] <https://openvpn.net/access-server/>
[4] <https://openvpn.net/cloud-vpn/>
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users
Web page has not been
updated in a long while, but the project does still live and should work fine
with OpenVPN 2.4 servers when using --compat-names. OpenVPN 2.5 servers
support will arrive as soon as I have time to hack more on this project again;
or someone sends
t is a data or control
channel packet.
So depending on what you mean with "SSL VPN", OpenVPN may or may not be an SSL
VPN. OpenVPN has its own protocol, but it does use the standard TLS protocol
for some of its operation.
--
kind regards,
David Sommerseth
OpenVPN Inc
__
as been extended with more region CA certificates used
for the request validations. In addition it will now pick up more of
system CA certificate file locations than before.
--
kind regards,
David Sommerseth
OpenVPN Inc
[0] <https://gitlab.com/openvpn/openvpn3-linux>
<h
fine with the existing unit
files.
[1] <https://en.wikipedia.org/wiki/Forward_secrecy>
[2] <https://github.com/OpenVPN/easy-rsa/>
[3] <https://github.com/OpenVPN/easy-rsa/blob/master/README.quickstart.md>
--
kind regards,
David Sommerseth
OpenVPN Inc
signature.asc
D
e biggest challenge of DoT is that many DNS
servers have not been upgraded to a reasonable solution with this support, and
many who has done that has not configured DoT yet.
--
kind regards,
David Sommerseth
___
Openvpn-users mai
etails:
<https://www.timeanddate.com/worldclock/fixedtime.html?msg=OpenVPN+Access+Server+webinar=20200624T10=224>
--
kind regards,
David Sommerseth
OpenVPN Inc
signature.asc
Description: OpenPGP digital signature
___
Openvpn-users mailing
ble starting point:
<https://community.openvpn.net/openvpn/wiki/GettingStartedwithOVPN>
--
kind regards,
David Sommerseth
OpenVPN Inc
signature.asc
Description: OpenPGP digital signature
___
Openvpn-users mailing list
Openvpn-users@lists.sou
le --client-connect scripts configured, the later one should overwrite
the prior one.
--
kind regards,
David Sommerseth
OpenVPN Inc
signature.asc
Description: OpenPGP digital signature
___
Openvpn-users mailing list
Openvpn-users@lists.so
r tricks
in other setups ages ago)
--
kind regards,
David Sommerseth
OpenVPN Inc
> -Original Message-
> From: Selva Nair
> Sent: Sunday, May 24, 2020 10:04 PM
> To: Morris, Russell
> Cc: openvpn users list (openvpn-users@lists.sourceforge.net)
>
> Subject: Re:
;
(disclaimer: I reviewed it) and "Mastering OpenVPN".
More details here: <https://community.openvpn.net/openvpn/wiki/OpenvpnBooks>
--
kind regards,
David Sommerseth
OpenVPN Inc
___
Openvpn-users mailing list
Openvpn-users@lists.sour
to use the dynamic challenge-response
protocol, where it gets a bit more complicated for the auth-pam module.
Should we do it? We probably should.
IIRC, the PAM module as it is today should support getting the OTP token as an
extension to the password. If it is optional, it would pass on just a correct
On 24/04/2020 09:09, Samuli Seppänen wrote:
> Il 24/04/20 00:15, Simon Deziel ha scritto:
>> On 2020-04-23 5:08 p.m., David Sommerseth wrote:
>>> On 23/04/2020 22:30, Simon Deziel wrote:
>>>> On 2020-04-23 3:55 p.m., David Sommerseth wrote:
>>>>
On 23/04/2020 22:30, Simon Deziel wrote:
> On 2020-04-23 3:55 p.m., David Sommerseth wrote:
>> On 23/04/2020 19:55, Simon Deziel wrote:
>>> On 2020-04-21 1:41 p.m., David Sommerseth wrote:
>>>> On 21/04/2020 18:32, Simon Deziel wrote:
>>>>> Hello,
On 23/04/2020 19:55, Simon Deziel wrote:
> On 2020-04-21 1:41 p.m., David Sommerseth wrote:
>> On 21/04/2020 18:32, Simon Deziel wrote:
>>> Hello,
>>>
>>> I cannot validate the Windows exe files [1] and [2] using the key
>>> advertised in [3].
>>&
1 - 100 of 308 matches
Mail list logo